The next iPhone update tells users COVID exposure - 19 without downloading the tracking app - The next iPhone update will make it easier for Apple users to know if they have been exposed to coronavirus, just by activating notifications on their phone, and without downloading a third-party app.
Apple's tracking technology, developed with Google, uses the bluetooth of the mobile phone for this purpose. The alert will appear on the screen automatically if you have been near a person who has tested positive for COVID-19. Until now, tech customers could only do this using the apps of health authorities.
For now, iOS 13.7 has been released in beta so developers can try it out. The update allows you to "activate the coronavirus exposure notification system without downloading any applications", as explained by the company and advanced 9to5Mac.
Next iPhone update tells users COVID exposure
For this technology to be effective, a large number of people need to have this configuration. But Apple and Google have an obstacle here, as only a few US states are willing to launch applications that are based on the solution of both technologies, which will determine whether or not the data can be crossed.
However, the proposal of the firm of Cupertino (California, USA) will have limitations. Some of its functions cannot be selected if the user does not have the official applications. "The availability of the system will depend on the assistance of Your Local Health Authority," says Apple. It is not known which options can be enabled and which are not.
The 2 tech giants have said that they will not store health data and that the accounts of their users will be linked to the health authorities and the information they have about contagion. Therefore, iPhone users may have to download the official options if they want to confirm that they have tested positive so that this can be notified to others.
At the moment, Apple has not answered the questions of this medium.
End of Next iPhone update tells users COVID exposure
Tesla employee rejects $ 1 million for facilitating Russian cyber attack and collaborates with FBI to stop attacker
An employee of the factory, Tesla in Reno (Nevada, Usa) became the protagonist of what might seem to be a script of a thriller to avoid a cyber attack Russian against the company led by Elon Musk, rejecting a million dollars in exchange of your collaboration, and alerting the FBI about their suspicions, which ended with the arrest of the alleged attacker.
The story, released by the US Department of Justice in a statement in which it did not indicate that the company attacked was Tesla, but "a Nevada company," was later associated with the electric vehicle company by the specialized portal Teslarati, and later confirmed by Musk himself via Twitter.
"Very grateful. This was a serious attack," Musk said on the micro-message social network, replying to a link with information posted on this portal about the foiled cyberattack to Tesla.
The story before this attempted cyberattack on Tesla is truly cinematic. The alleged attacker, a 27-year-old Russian citizen named Egor Igorevich Kriuchkov, as identified by the FBI in its statement, contacted the Tesla employee in mid-July through a mutual friend through WhatsApp and told him that he would travel from Russia to the United States to visit the country and would like to visit him. Although not specified in the FBI report, Tesla's employee has all his conversations with this person in Russian, so he could also be a national of this country.
On July 28, this alleged tourist arrived in New York, then flew to San Francisco and later rented a car to travel to Nevada, where he visited the Tesla employee. Together with two other mutual friends, they both made a tour of Lake Tahoe, California, on August 2.
During this tourist trip, Tesla's employee began to notice a strange behavior of this alleged Russian tourist, who constantly resisted being portrayed in photographs. "Kriuchkov said that he preferred to remember the beauty of the sunset and for this he did not need a photograph," reveals the FBI report. In addition, he made sure to stop all travel expenses, claiming that he had earned them by betting on his hotel in Nevada.
One day after the trip, Kriuchkov stayed to eat with Tesla's employee to "talk business," according to the worker told the FBI. After that meal, the tourist said that his real motive for going to America was to speak with the worker of Tesla, who said they worked for a group that was doing "special projects", consisting of introducing malware in the systems of large companies, a job he had done on several occasions.
The cyberattack on Tesla was going to look like a denial of service (DDoS) attack, which would force the entire company to take care of it, while below it would occur a second attack, which would leak information from Elon Musk's company systems directly to the attackers, who would end up threatening the company to release that data if they did not receive a ransom amount.
Kriuchkov offered the Tesla employee $ 500,000 for his services, which would consist of inserting a USB into a company computer or sending an email that included the malware. The offer would then go up to a million dollars.
This is when Tesla's employee contacts the FBI, explains the situation and the US federal agency begins to follow his meetings with Kriuchkov and record their conversations, in which the attacker reiterates that they have already made several such attacks on other companies and the employees who helped them continue to work on them.
They come to agree a final payment of one million dollars and an advance of about 10,000 dollars through a bitcoin wallet, although later the attacker claims that they have never paid a contributor in advance. According to the Russian cyberattack, their plans are to get $ 2 million in ransom, and the spy program, specifically designed for the attack on Tesla, was going to cost them about 250,000.
After several conversations, in which the Tesla employee is getting more details about what the cyberattack would look like, the program with which it would be made and other matters, Kriuchkov is arrested on August 22 in Los Angeles (California), for a crime of conspiracy to intentionally cause damage to a protected computer.
In this way, Elon Musk's company was saved from receiving a cyber attack, which although the FBI figures in an impact of about $ 10,000 between the two types of attack, could have generated many doubts about the computer security of the electric vehicle company.