Short news and reviews from the technology world
Searching for that good mobile camera
Which reasonably priced mobile phone has the best camera? To search out this information, I just thought of asking anyone who could help on this via quora.com. These were the answers that came up, quite quickly at that too:
Ranadeep Das, Smartphone Geek said: “Since we are talking about ‘really’ good camera, I suggest you few devices at reasonable price that do pack quite good cameras, having very good low light photography.”
He goes on to give details of the Lenovo ZUK Z1 – Rs 13499; Moto G4 Plus – Rs 13499 (“but terrible overheating issues, especially while recording videos”); LG Nexus 5X – Rs 26990 (Carbon, 32GB); OnePlus 3 – Rs 27999.
If you are thinking of below 10K, he feels you would not get any device that has a ‘really’ good camera. Redmi Note 3 and Coolpad Mega do perform well in the camera department, however, fail to satisfy in low lighting conditions.
A ‘really’ good camera should be able to perform well in all lighting conditions and should record stable and smooth videos, with details. Considering this, you still have the Moto G3.
Pooja Sharma suggests the Samsung Galaxy J7 (2016). She points out that Samsung launched the Samsung Galaxy J7 (2016) on July 20, 2016 an ultra affordable smartphone with good camera quality. The phone has good camera quality and produces nice pictures with 13-megapixel primary camera and 5-megapixel secondary camera. The phone has great camera quality. The phone packs 16GB of internal storage that can be expanded up to 128GB via a microSD card.
Rohit Zedek adds: “I used the iPhone 5s for some time. It has a decently good camera. I never had any photographic issues with that. Dynamic range of sensor is also very good you won’t even see banding with it.”
Smartphone video production
Just came across this video which talks about ‘portable video production’. Useful and good.
It explains: “With the introduction of newer and better video taking options on today’s smartphones, it has opened up a whole new era of semi high-quality production available to both the novice and professional alike. However, there are situations where controlling the sound quality or environment can be a challenge when using a smartphone as your primary tool in video production.”
It would take you 12:17 minutes to go through it. Check it out. This comes from someone who signs his name as the DIY Guy, as do some other interesting and practical videos.
Hacking voting machines
In India, EVMs (electronic voting machines) were accepted without too much debate. In the West, the vulnerabilities of electronic voting is still being debated. Paper-voting don’t have such problems, it has been argued. aol.com highlights this issue, in an article titled ‘An easy-to-find $15 piece of hardware is all it takes to hack a voting machine’. The debate comes up in the backdrop of the upcoming November 2016 elections in the USofA.
And if you forgot the social media while you were distracted by Rio, take a look at the STATS infographic alongside, which gives a good insight into how the Olympics were reflected in cyberspace.
Researchers spot vulnerabilities in Apple iOS
An international team of computer science researchers has identified serious security vulnerabilities in the iOS operating system used in Apple’s iPhone and iPad devices. The vulnerabilities make a variety of attacks possible in Apple devices. “There’s been a lot of research done on Android’s operating systems, so we wanted to take a closer look at Apple’s iOS,” said William Enck, associate professor of computer science at North Carolina State University and co-author of a paper.
The goal was to identify any potential problems before they became real-world problems, he added. The researchers focused on the iOS’s “sandbox” which serves as the interface between applications and the iOS, reports IANS. The iOS sandbox uses a set “profile” for every third-party app. This profile controls the information that the app has access to and governs which actions the app can execute.
To see whether the sandbox profile contained any vulnerabilities that could be exploited by third-party apps, the researchers first extracted the compiled binary code of the sandbox profile. They then decompiled the code, so that it could be read by humans.
Next, they used the decompiled code to make a model of the profile, and ran series of automated tests in that model to identify potential vulnerabilities. The team identified vulnerabilities that would allow them to launch different types of attacks via third-party apps.
Those attacks include methods of bypassing the iOS’s privacy settings for contacts, of learning a user’s location search history and of inferring sensitive information (such as when photos were taken) by accessing metadata of system files. It also includes methods of obtaining the user’s name and media library and of consuming disk storage space that cannot be recovered by uninstalling the malicious app.