Hey guys!

It’s almost time again for the latest and greatest iterations of Pixel devices, where Google will show off their newest hardware and software upgrades to the masses.

The event will debut on October 4th at 10 AM EST (https://dateful.com/convert/est-edt-eastern-time?t=10am&d=2023-10-04), showcasing what’s to be the Pixel 8, Pixel 8 Pro, and likely the Pixel Watch 2.

Rumors indicate signs pointing to a new Tensor chip in the Pixel devices, temperature sensors, Magic Audio removal features for video clips, and even a Qualcomm-based chip in the Pixel Watch 2.

Feel free to watch the event and sign up to be notified when it’s live, at the following YouTube link: https://www.youtube.com/watch?v=pxlaUCJZ27E

See you all soon!

  • hackitfast@lemmy.worldOPM
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    2
    ·
    10 months ago

    If you yank out an SD card on it from a phone that was forgotten behind:

    1. You now have access to all of the potentially unencrypted files on it
    2. Threat actors can replace trusted files with malicious ones to exploit potential vulnerabilities in applications running on the Android device
    3. In 5 seconds you’ve walked away with it, as opposed to a laptop which requires you to physically unscrew it

    If you have a phone without an SD card they only have access to the USB port, which is locked with software and in some cases hardware. Removing the SD card slot is one less attack vector, it will make the device more secure one way or another.

    Leaving your laptop around someone can also yank the SSD. Modern laptop operating systems generally have the option to encrypt their storage devices.

    You can encrypt microSD cards but you must do file transfers through the phone itself through USB which I guess is no different than having an encrypted drive on a laptop. I haven’t looked into how modern SD encryption works on Android.

    • Dudewitbow@lemmy.ml
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      edit-2
      10 months ago

      Arguing security flaws based on someone having physical acess to a device is on a completely different level of vulnerabilities.

      Thats like treating vulnerabilities like Spectre/Meltdown/Downfall/Zenbleed on the same category as ones that require physical access to the machine, many which dont get names due to being severe is small because they are firmware patched quickly.

      On the topic of SD card encryption, its not native to android, however many companies who offer sd card models(e.g Samsung) have encryption as a setting put in theirselves.

        • Dudewitbow@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          3
          ·
          edit-2
          10 months ago

          You consider them, but they are never treated on the same level of threat.

          Ironic that youd post something from the UK, given they just banned end to end encyption of messaging.