Author: simonmackay

Dell issues a security advisory regarding its SupportAssist software

Article

Dell XPS 13 2-in-1 Ultrabook at Rydges Melbourne

Check that the SupportAssist software on your Dell computer like this XPS 13 2-in-1 is up-to-date to keep a secure computing environment

Dell Computers Exposed to RCE Attacks by SupportAssist Flaws | BleepingComputer

From the horse’s mouth

Dell

DSA-2019-051: Dell SupportAssist Client Multiple Vulnerabilities (Support Notice)

Official Resources

Dell software download site

https://downloads.dell.com/serviceability/Catalog/SupportAssistInstaller.exe (Official software installer)

My Comments

A version of Dell’s SupportAssist computer-maintenance software that is currently installed on most recent-issue Dell desktop and laptop computers, including some of the Dell laptops reviewed on this site, has been found to have a bug that is a security issue. This bug will affect versions of this software prior to 3.2.0.90 .

Here, the bug exposes the SupportAssist software to a vulnerability that allows malicious code to be executed remotely. At the moment, it appears to happen on the same logical network, which can be a vulnerability for users using public-access networks that aren’t properly configured for client isolation.

It was discovered by a teenage software researcher called Bill Demirkapi, but other flaws regarding verification of software provenance were found in the prior versions of this software by another software researcher called John C. Hennessy-ReCar. Here, Dell practised responsible disclosure in reporting the SupportAssist software vulnerability and made sure there were newer properly-patched versions of this software.

A newer version (3.2.0.90) of this software has been released and made available to download from Dell’s servers. I have placed the link to the installer package and Dell’s software download site so you can make sure your computer is up-to-date. The software download site also has a “Detect PC” button to allow the site to properly identify the Dell computer it is being used from incase you find it difficult to properly identify the exact model yourself. You may also find that the existing SupportAssist software may update itself or suggest an update when it checks Dell’s servers for new software versions.

As well, copy the SupportAssist installer application referenced here to a USB memory key or portable hard disk because your system may keep the prior version of this application in its recovery partition and you would be running that version should you have to restore your computer from that partition.

A good practice that I would like to see regarding “recovery partitions” on today’s computers is to have a user-selectable option to “slipstream” or update these partitions with newer software versions. This can be of importance with major or minor revisions to the operating system or updated application, driver and support software.

It may be a good practice when you buy a prebuilt computer to visit its manufacturer’s support resources regularly to check for new software updates for hardware drivers or support software. You may also be alerted to any issues that you might come across with this system. As well, registering your system with the manufacturer may be of value when it comes to being alerted to software or hardware issues.

The battle’s on for streaming-music services

Articles

Spotify Windows 10 Store port

Spotify’s ad-supported free music service faces competition from Amazon and Google

Free ad-supported service tier

Amazon Music’s free ad-supported tier goes live, but only for Alexa users | The Verge

Amazon and Google Are Making Music Free — And That Could Be a Big Headache for Spotify | Rolling Stone

Hi-Fi-grade premium service tier from Amazon

Amazon may be working on a high-fidelity music streaming service | Engadget

Amazon Planning To Hi-Fi Music Streaming Service: Report | Android Headlines

Amazon Music rolls out a lossless streaming tier that Spotify and Apple can’t match | The Verge

From the horse’s mouth

Amazon

Amazon Music HD (Product Page – Sign up here)

My Comments

The Silicon Valley establishment are realising that other companies are offering streaming-music services that offer service options that they don’t provide in their own services.

Ad-supported free-to-end-user service tier

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

The Amazon Echo will benefit from Amazon’s free music service

One of these is a free-to-end-user service option which is supported by audio advertising that plays in a similar manner to commercial free-to-air music radio.

Spotify had, for a long time, established its streaming-music service on a “freemium” model with an ad-supported basic service tier free to the end-user. This is alongside their Premium service tier which can be fully enjoyed on your mobile device or Spotify Connect endpoint audio devices and without advertising.

The advertising models included display advertising on the user interface along with radio-commercial-type audio ads at regular intervals. They also offer to marketers advertising ideas like sponsored playlists or sponsored listening sessions.

Now Amazon and Google are offering a free-music ad-supported streaming tier for their “online jukeboxes” but this will be limited to their smart-speaker platforms rather than a Web-based or mobile-based experience. There will also be a limited music offering available through this music tier.

Premium hi-fi-grade service tier

Cambridge Audio / Rega hi-fi system

Amazon to undercut Tidal and Deezer when delivering a streaming music service fit to play through hi-fi equipment

The other is a premium streaming service that yields at least CD-grade audio fit to be played through that hi-fi system rather than an experience similar to FM radio.

TiDAL and Deezer based their music-streaming service on listeners who value high-quality sound for a long time. You may have heard music streamed from one or both of these services if you have recently attended a hi-fi show like any of the Chester Group hi-fi shows where I have heard TiDAL in action, or visited a boutique hi-fi or home-AV store.

Amazon aren’t taking this lightly and are offering the HD and Ultra HD service tiers which are the hi-fi-grade premium service tiers for their Amazon Music Unlimited streaming-music service. This is priced at US$15 per month with a view to undercut TiDAL and Deezer and is also targeted towards people who use Alexa-platform audio devices with their hi-fi system or use an Alexa-based network multiroom setup.

The Amazon service offers the high-quality service as two tiers – the HD one that is equivalent to CD quality and the Ultra HD one that is equivalent to “master quality”. These use the FLAC codec to trasfer the music to your equipment and you may find that the HD tier is similar to what you get if you are “ripping” a CD to FLAC files with, perhaps, Windows Media Player in Windows 10.  They are working with the record labels to license their music libraries to this service in order to have more high-grade content.

What is this to lead to

I see this opening up the floodgates for a highly-volatile streaming-music service market with companies wanting to cut in with entry-level free tiers driven by advertising or premium hi-fi-grade subscription tiers for those who value high-quality sound. Here, I would see at most of these companies running a three-tier music service for consumers – an ad-supported limited-content free service, a standard package with the whole library delivered ad-free and a premium package that has access to the whole library with CD-grade or master-grade audio.

There will be some factors that will allow each streaming-music service to differentiate themselves in a crowded market. They will become more important as a way to attract new subscribers or retain their existing subscriber base. It will also become important in encouraging people who have subscriptions with all of the services to focus their attention to a particular service.

One of these would be the quantity and quality of music playlists, especially curated playlists. Another would be the richness of information available to the user about the performers, composers, genres and other factors regarding the music library.

There will also be whether the music library contains underrepresented content and how much of this content is available to the users. This includes whether they offer a classical-music service with the expectations of such a service like composer-based searching.

Another issue that will show up is the provision of client-side support in standalone audio equipment so you aren’t running extra software on a computer or mobile device to get the music from that service to the speakers. This will also include having software for these services integrated in your car’s dashboard.

There will be the issue of what kind of partnerships the streaming-music service provider can have with the business community. It ranges from  “business music” service tiers with music properly licensed for public-performance on business premises to advertising and sponsorship arrangements like what Spotify has achieved.

As far as the creative team behind the music is concerned, a differentiation factor that will come about is how each streaming-music service renumerates these teams. It is whether they are the composers, arrangers, lyricists or music publishers behind the songs or the performers and record labels behind the recordings.

There will also be the issue of encouraging other vendors to tie-in streaming-music subscription as part of a package deal. This could be through an ISP or telco providing this service as part of an Internet or mobile-telephony service plan. Or buying a piece of equipment like an Internet radio could have you benefit from reduced subscription costs for a particular streaming-music service.

What I see of the online music-streaming market is something that will be very volatile and competitive.

UPDATE

19 September 2019 – Amazon formally launches the HD and Ultra HD hi-fi-quality service tiers for their Music Unlimited streaming service.

Lifestyle publishing heads towards the online trend

Lifehacker Website

Lifehacker – an example of the new direction in online-based lifestyle publishing

The online life has placed significant changes in the realm of “lifestyle publishing”.

What I would describe as “lifestyle publishing” are print or online publications that primarily cover lifestyle issues like living at and keeping our homes, parenting, personal health and personal / relationship issues. This kind of content is seen as being evergreen and relevant for a long time.

The classic “women’s magazines” maintained this role while running celebrity gossip and similar material. They existed in a position where they were available in the checkout lanes at supermarkets or at general/convenience stores and newsagents. As well, prior issues would exist in the waiting rooms at most medical practices and, of course, they would exist on many coffee tables as casual reading.

Some of these magazines even provide activities like crosswords and other puzzles or provide colouring-in pages and similar activities for children. This is to enhance the value of the magazine across the reader’s household. You may also find a few comic strips in the magazines as another content type.

They have been supported by various magazines that focus on particular topics like cookery, home improvement, parenting and health. It is also along with those salacious gossip magazines filled with lurid details of what the TV stars, the European royal families or other celebrities are up to.

Mamamia Website

… as is Mamamia

But, thanks to the smartphones and tablets, the direction for this kind of publishing has headed towards two major online paths. These devices have provided a portable and discreet means to consume this kind of material whether at home or out and about, in a similar way to how the e-book has been a boon to the romance novel and similar popular “guilty-pleasure” reading.

One of these are the independent blogs and small-time Websites, especially the “mum blogs”. These blogs appear on their own site or purely on a social-media platform like Facebook. People who follow the independent sites and blogs consider them authentic due to them representing the voice of the site’s or article’s author and their experiences.

MillieMummyMelbourne mum blog

… and “mum blogs” like MillieMummyMelbourne

The other fork in the road are the likes of Fusion Media Group and Pedestrian TV who maintain a large powerful blog/Website network with names like Lifehacker and Gizmodo. In this case, Fusion Media Group are franchising some of their mastheads in to other countries in a similar manner to what the Daily Mail and The Guardian are doing. It includes providing localised content for these markets as well as content that appeals across the world.

Another example of the other fork in the road is Mamamia who is becoming a powerful online “women’s magazine” focusing on what women really want. But this masthead is moving away from the traps associated with the salacious celebrity-gossip culture such as relying on imagery supplied by paparazzi photographers.

The online lifestyle publications don’t just provide content in the written form augmented with photos or other imagery. Increasingly these publications are providing audio podcasts or short videos in addition to the written content. Here, it is positioned as another way to present the same information that the site provides.

Lenovo Yoga Tab Android tablet

These mobile tablets play in to the hand of the online lifestyle publishers

Some of these online lifestyle-publishing mastheads are doing some things that aren’t really associated with the traditional women’s mags. One approach has been to review and compare different products that exist on the market and are relevant to their reader base.  This was a practice that was typically saved for car, boat, photo/audio/video and similar magazines or magazines offered by consumer-rights organisations.

But independent bloggers like the “mum blogs” are undertaking this role by reviewing or comparing household and similar goods. In some cases, the vendors supply the review samples of these goods, especially newer products, in order to have them put in the public consciousness.

There will be some continual questions raised about online lifestyle publishing.

One of these will be about monetising the content. This is more so where people are using social media, online content aggregators or email to follow the sites and read the latest content they offer.

Dell Inspiron 13 7000 2-in-1 Intel 8th Generation CPU at QT Melbourne hotel - presentation mode

.. as do the popular 2-in-1 convertible laptops like the Dell Inspiron 13 7000 2-in-1 range

This situation may affect the viability of on-site display advertising as a monetisation strategy. It is even though most of these publishers don’t have difficulty in creating family-friendly brand-safe content which can attract the advertisers to their Website.

One way this issue has been targeted is through the provision of sponsored content on these sites. The article or articles will have some input from a brand and be published with the brand’s identity appearing at various points in the article. This may also include the supply of goods and services at no cost to the blogger in exchange for them to write up a review about them like in the MillieMummyMelbourne blog regarding LEGO Duplo Stories with Amazon Alexa.

Some people see the existence of sponsored content or product reviews based on vendor-supplied samples as not being authentic. This is because they see the vendors or brand owners effectively steering the discussion regarding the goods or services being offered with the publishers extolling the advantages of these goods. This is something that has happened across lifestyle publishing in the traditional media with the use of advertorials within the magazines or infomercials being run during morning TV.

Another approach has been to run an online storefront that offers merchandise promoting the Website or designed by the author. It is more so where the author has the creative ability to design their own merchandise like clothing for example.

Another issue that will crop up is how to position online lifestyle publications in a manner to make them discoverable.

At the moment, discovery of this content is primarily through Google, Bing or other search engines especially where the search engine may surface a list-driven article written somewhere on the Internet that compares and describes the sites you are after. This takes over the role of the browsing-driven Internet directories like Lycos which existed before the Google behemoth came to the fore where Web providers could submit links to their sites to these directories.

As well, some of the online content aggregators like Feedspot or Feedly do provide the ability to search or browse for content of a kind. Similarly Web portals could be used as a tool to place online lifestyle publications “on the map”, perhaps through the use of a dedicated “lifestyle” Web portal promoted through traditional media.

Use of native or Web apps that show up strong with iPads, Android tablets and similar devices cam be a way to keep that “magazine experience” alive when you are “flicking” through these online lifestyle publications or “mum blogs”.

What needs to be done regarding online lifestyle publishing is to raise the profile of this segment to a position comparable with the traditional printed magazines. There was an episode of ABC’s “Media Watch” comparing them against the traditional womens’ magazines but this was showing concern about the sponsorship and brand-interaction issue.

Here, it was a way to use traditional media to put these blogs and sites on the map, but other resources can be used equally as well. For example, a radio or TV talk show could be used as a platform to interview lifestyle bloggers including “mum bloggers” and place them on the map. Or traditional media can exchange content with the lifestyle Websites and blogs to, perhaps, enrich coverage of a particular topic or cross-promote resources.

What needs to happen is to increase the profile of the online publications and blogs in the context of lifestyle-focused publishing especially in the eyes of the casual readers.

Now lifestyle publishing has headed towards the online direction and is coming to a tablet computer near you.

Yale uses modules to extend smart-lock functionality

Article

Use of a user-installable module allows these Yale smart locks to work with different connected-home systems

Yale Expands Assure Lock Line With New Smart Lever Lock | Z-Wave Alliance

My Comments

Yale have implemented the smart-lock approach in a very interesting way ever since that company released their Real Living Connected Deadbolt in to the North-American market.

Here, they designed an electronic lock as a basic platform device but built an expansion-interface arrangement in to this lock’s design. Here, users could install a retrofit module in to the battery compartment on the door’s inside to add on Zigbee, Z-Wave or August smart-lock connectivity to their lockset.

This approach has been rolled out to the Assure range of electronic deadbolt locks and lever locksets with the use of the same module type for the whole range. It also applies to the Lockwood Secure Connect product range offered in Australia which is based on the Yale designs.

A similar approach has been implemented in the UK for some of the Yale electronic door locks sold in that market. But the modules used with the UK locksets are different to the North-American modules due to the regional differences that affect how Z-Wave and Zigbee operate and the country’s preferred building-hardware form factors. One of these units is infact designed to replace the outside cylinder on a rim-mounted nightlatch or deadlatch to enable “smart lock” functionality to this common class of door lock.

All these modules are expected to be installed in a “plug-and-play” fashion where they simply add the extra functionality to the lock or bridge it to the smart-home ecosystem once you install the module. After you install these modules in the lockset, the only thing you need to do is to pair them with the smart-home or integrated-security ecosystem.

Even within the same form-factor, the electrical interface for these modules may be varied for later products which can raise compatibility issues. Similarly, some of the home-automation integrators tend to presume that a particular module will only work with their system.

They also work on a particular “Internet-of-Things” wireless interconnection rather than an IP-based home network, requiring them to use a network bridge to work with an online service. This bridge is typically provided as part of a security-and-home-automation ecosystem whether offered by a telco, security services firm or similar company.

What have I liked about this approach is the use of user-installable modules that are designed to work across a particular Yale smart-lock range. Here, these modules interlink with Yale or third-party smart-home setups with the ability to be replaced should you decide to move to a better home-automation system that uses a different Internet-of-Things interface.

It underscores the fact that, once installed, a door lock is expected to be in service for a very long time and this same requirement will be placed upon smart locks. This is even though new smart-home or smart-building technologies will appear on the horizon.

It is similar to how central-heating systems are being enabled for smart-home operation through the use of a room thermostat that has the “smarts” built in to it. These thermostats are designed to be powered by the host HVAC system and connect to that system according to industry-standard wiring practices that have been determined and evolved over a long time.

This approach can be taken further with other devices like major appliances that are expected to serve us for a long time. Even if a manufacturer wants to create an ecosystem around its products and accessories, it needs to keep the specifications for interlinking these products and accessories the same to allow users to implement newer devices in to the system.

It can also work properly with a self-install approach where the customer installs the necessary aftermarket modules themselves or a professional-install approach which involves a technician installing and commissioning these modules. The latter approach can also work well with manufacturers who offer “functionality” or “upgrade” kits that enable the use of these modules.

The ASSA Abloy approach to making sure your smart lock works with the smart-home system by using user-replaceable modules makes sense for this class of product. Here, you are never worried about the smart-lock ability being “out of date” just because you install a home-automation setup that suits newer needs.

What needs to happen with the retrofit approach is that the physical and electrical interface for add-on modules has to be consistent across the product range or device class for the long haul. There also has be be some form of compatibility should any design revisions take place. Similarly, using a common application-level standard can work well with allowing the same device and retrofit module to work with newer systems that adhere to the relevant standards.

These expectations may not really work well with system integrators, telcos and the like who prefer to be the only source for products that work with a smart-home system.

Here, it is the first time I have noticed a smart-home device designed to be upgraded over its long service life.

WPA3-Personal security–What does this mean for your Wi-Fi network

Article

Telstra Gateway Frontier modem router press picture courtesy of Telstra

Expect the next-generation Wi-Fi network to have WPA3 security

What is WPA3? And some gotchas to watch out for in this Wi-Fi security upgrade | Network World

My Comments

Over the next few years, Wi-Fi routers, access points and client devices like computers and smartphones will be supporting WPA3 as a media-specific network security protocol.

At the moment, I will be focusing on the WPA3-Personal variant which is relevant to small networks like the typical home or small-business network. This kind of network security is also implemented in an increasing number of venue-based public-access networks in order to allow the venue owner to protect and authenticate the network and preserve its role as an amenity for the venue’s customers.

The WPA3-Personal network security protocol has the same method of operation as for a WPA2-Personal network. This is using a “Wi-Fi password” commonly known across all access points and client devices that use the network segment.

But it describes this “Wi-Fi password” as Simultaneous Authentication Of Equals rather than the previous Pre-Shared Key used in previous WPA-Personal implementations. It also affects how this “Wi-Fi password” is represented and encrypted in order to protect it against an off-site brute-force cracking attempt.

As well, each connection between the client device and the access point is encrypted in a manner unique to that connection.

The initial onboarding process will be typically based on the traditional password-entry method. But it will also implement Wi-Fi EasyConnect which uses a QR code or WPS-based push-button setup.

The Wi-Fi WPA3 security protocol may take years to become mature while a secure surefire codebase for client-side and access-point-side implementations is worked out. The initial codebase was found to have software weaknesses in the early Personal-setup implementation and is being debugged now.

A question that will be raised is whether an upgrade to WPA3 security will require new hardware for either the client device or the access point or if this can be performed using revised firmware that has the necessary software code. This may depend on whether the hardware uses a purely software-defined approach for managing its functionality.

There will be situations that will take place regarding existing equipment and WPA3-capable equipment. Here, a WPA3 client like a smartphone can work with an existing WPA2-compliant Wi-Fi network segment but not have the full benefits. Similarly, a WPA3-capable Wi-Fi network segment will need to be operated in a “transition mode” to allow existing WPA2-compliant client devices to connect. Again, this doesn’t provide all the benefits of a Wi-Fi network segment secure to WPA3 standards.

You can also work around this limitation by implementing two Wi-Fi network segments that have separate ESSIDs. One of these could be configured to work the current WPA2-Personal standard while the other is set up purely for WPA3-Personal. This practice may come in to its own if you have a Wi-Fi network using the latest standards while you maintain another using tried-and-trusted standards.

Gigaset Alexa smart speaker is a cordless phone

Articles

Gigaset L800HX Alexa DECT smart speaker press picture courtesy of Gigaset AG

This Gigaset smart speaker works as a DECT handset for fixed-line telephony services

Gigaset reinvents the landline phone – Gigaset smart speaker L800HX | Business Insider

German language / Deutsche Sprache

Gigaset L800HX: Smart Speaker mit DECT- und Amazon-Alexa-Anbindung | Caschy’s Blog | Stadt.Bremerhaven.de

Gigaset L800HX: Alexa-Lautsprecher mit Festnetztelefonie | Computerbild.de

Gigasets Smart Speaker ist auch ein Telefon | Netzwoche (Schweiz / Switzerland)

From the horse’s mouth

Gigaset Communications

L800HX Smart Speaker

German language / Deutsche Sprache

Product Page

Press Release

Blog Post

My Comments

Amazon effectively licensed the Alexa client software that is part of the Echo smart speakers that they sell for third parties to use. This opens up a path for these third-party companies to design smart speakers and similar products to work with the Alexa voice-driven assistant ecosystem.

This kind of licensing opens up paths towards innovation and one of the first fruits of this innovation was Sonos offering a smart speaker that worked with multiple voice-driven home assistant platforms that they licensed. But I will be talking about another approach that links the traditional fixed-line telephone to the smart speaker.

Amazon Echo Connect adaptor press picture courtesy of Amazon

The Amazon Echo Connect box enables your Amazon Echo speakers to be your traditional household telephone

When faced with Google offering telephony functionality in their Home speaker, Amazon one-upped them with the Echo Connect box. This box connects to your home network and your fixed telephone line so you can make and take telephone calls through the traditional fixed telephone service or its VoIP equivalent using an Echo smart speaker or similar device. The device had to connect to the telephone socket you would connect the traditional telephone to as though it was an extension telephone and if you implemented a VoIP setup using a VoIP-enabled router, you would connect it to the telephone-handset port on this device.

Now Gigaset Communications, a German telecommunications company who is making innovative telephony devices for the European market, has approached this problem in a different way. Here, they have premiered the Gigaset L800HX smart speaker that works on the Alexa ecosystem. But this uses functionality similar to the Amazon Echo Connect box but by working as a DECT cordless handset.

The Gigaset L800HX can be paired up with any DECT base station or DECT-capable VoIP router to become a telephony-capable smart speaker. It is exploiting the fact that in competitive telecommunications markets in Continental Europe, the telcos and ISPs are offering multiple-play residential telecommunications packages involving voice telephony, broadband Internet and multiple-channel TV service on fixed and/or mobile connection.

Increasingly the fixed-line telephony component is provided in a VoIP manner with the carrier-supplied home-network router having VoIP functionality and an integrated DECT base station along with one or two FXS (telephone handset) connections for this service. This is due to use of dry-loop xDSL, cable-modem or fibre-optic technology  to provide this service to the customer and a drift away from the traditional circuit-based telephony service.

Onboarding this speaker requires you to interlink it to your Wi-Fi home network and your DECT-based cordless base station or VoIP router. Then you also set it up to work with the Amazon Alexa ecosystem using the Amazon app or Webpage associated with this ecosystem. A separate Gigaset mobile-platform app provides further functionality for managing this device like synchronising contacts from your mobile or DECT base-station contacts list to the Amazon Alexa Calling And Messaging service. It provides all the other expectations that this service offers like the Drop In intercom function. Let’s not forget that this device can do all the other tricks that the standard Echo can do like play music or manage your smart home under command equally as well.

The German-speaking tech press were raving about this device more as tying in with the current state of play for residential and small-business telecommunications in the German-speaking part of Europe. They also see it as a cutting-edge device combining the telephony functionality and the smart-speaker functionality in one box that fits in with the Continental-Europe ecosystem tightly.

Here, it is another example of what the licensing approach can do for an ecosystem like Amazon Alexa or Google Assistant. This is where there is an incitement for innovation to take place regarding how the products are designed.

Australian Electoral Commission weighs in on online misinformation

Article

Australian House of Representatives ballot box - press picture courtesy of Australian Electoral Commission

Are you sure you are casting your vote or able to cast your vote without undue influence?

Australian Electoral Commission boots online blitz to counter fake news | ITNews

Previous coverage

Being cautious about fake news and misinformation in Australia

From the horse’s mouth

Australian Electoral Commission

Awareness Page

Press Release

My Comments

I regularly cover the issue of fake news and misinformation especially when this happens around election cycles. This is because it can be used as a way to effectively distort what makes up a democratically-elected government.

When the Victorian state government went to the polls last year, I ran an article about the issue of fake news and how we can defend ourselves against it during election time. This was because of Australia hosting a run of elections that are ripe for a concerted fake-news campaign – state elections for the two most-populous states in the country and a federal election.

It is being seen as of importance due to fact that the IT systems maintained by the Australian Parliament House and the main Australian political parties fell victim to a cyber attack close to February 2019 with this hack being attributed to a nation-state. This can lead to the discovered information being weaponised against the candidates or their political parties similar to the email attack against the Democrat party in the USA during early 2016 which skewed the US election towards Donald Trump and America towards a highly-divided nation.

The issue of fake news, misinformation and propaganda has been on our lips over the last few years due to us switching away from traditional news-media sources to social media and online search and news-aggregation sites. Similarly, the size of well-respected newsrooms is becoming smaller due to reduced circulation and ratings for newspapers and TV/radio stations driven by our use of online resources. This leads to poorer-quality news reporting that is a similar standard to entertainment-focused media like music radio.

A simplified low-cost no-questions-asked path has been facilitated by personal computing and the Internet to create and present material, some of which can be questionable. It is now augmented by the ability to create deepfake image and audio-visual content that uses still images, audio or video clips to represent a very convincing falsehood thanks to artificial-intelligence. Then this content can be easily promoted through popular social-media platforms or paid positioning in search engines.

Such content takes advantage of the border-free nature of the Internet to allow for an actor in one jurisdiction to target others in another jurisdiction without oversight of the various election-oversight or other authorities in either jurisdiction.

I mentioned what Silicon Valley’s online platforms are doing in relation to this problem such as restricting access to online advertising networks; interlinking with fact-check organisations to identify fake news; maintaining a strong feedback loop with end-users; and operating robust user-account-management and system-security policies, procedures and protocols. Extant newsrooms are even offering fact-check services to end-users, online services and election-oversight authorities to build up a defence against misinformation.

But the Australian Electoral Commission is taking action through a public-education campaign regarding fake news and misinformation during the Federal election. They outlined that their legal remit doesn’t cover the truthfulness of news content but it outlines whether the information comes from a reliable or recognised source, how current it is and whether it could be a scam. Of course there is the issue of cross-border jurisdictional issues especially where material comes in from overseas sources.

They outlined that their remit covers the “authorisation” or provenance of the electoral communications that appear through advertising platforms. As well, they underscore the role of other Australian government agencies like the Australian Competition and Consumer Commission who oversee advertising issues and the Australian Communications And Media Authority who oversee broadcast media. They also have provided links to the feedback and terms-and-conditions pages of the main online services in relationship to this issue.

These Federal agencies are also working on the issue of electoral integrity in the context of advertising and other communication to the voters by candidates, political parties or other entities; along with the “elephant in the room” that is foreign interference; and security of these polls including cyber-security.

But what I have outlined in the previous coverage is to look for information that qualifies the kind of story being published especially if you use a search engine or aggregated news view; to trust your “gut reaction” to the information being shared especially if it is out-of-touch with reality or is sensationalist or lurid; checking the facts against established media that you trust or other trusted resources; or even checking for facts “from the horse’s mouth” such as official press releases.

Inspecting the URL in your Web browser’s address bar before the first “/” to see if there is more that what is expected for a news source’s Web site can also pay dividends. But this can be a difficult task if you are using your smartphone or a similarly-difficult user interface.

I also even encourage making more use of established trusted news sources including their online presence as a primary news source during these critical times. Even the simple act of picking up and reading that newspaper or turning on the radio or telly can be a step towards authoritative news sources.

As well, I also encourage the use of the reporting functionality or feedback loop offered by social media platforms, search engines or other online services to draw attention to contravening content This was an action I took as a publisher regarding an ad that appeared on this site which had the kind of sensationalist headline that is associated with fake news.

The issue of online misinformation especially during general elections is still a valid concern. This is more so where the online space is not subject to the kinds of regulation associated with traditional media in one’s home country and it becomes easy for foreign operators to launch campaigns to target other countries. What needs to happen is a strong information-sharing protocol in order to place public and private stakeholders on alert about potential election manipulation.

Celebrity voices to become a new option for voice assistants

Article

How to Make John Legend Your Google Assistant Voice | Tom’s Guide

Google Assistant launches first celebrity cameo with John Legend | CNet

How to make John Legend sing to you as your new Google Assistant voice | CNet

From the horse’s mouth

Google

Hey Google, talk like a Legend {Blog Post)

Video – Click or tap to play

My Comments

Google is trying out a product-differentiating idea of using celebrity voices as an optional voice that answers you when you use their Google Assistant.

This practice of using celebrity voices as part of consumer electronics and communications devices dates back to the era of telephone answering machines. Here, people could buy “phone funnies” or “ape tapes” which featured one-liners or funny messages typically recorded by famous voices such as some of radio’s and TV’s household names. It was replaced through the 90s with downloadable quotes that you can use for your computer’s audio prompts or, eventually, for your mobile phone’s ringtone.

Now Google has worked on the idea of creating what I would call a “voice font” which uses a particular voice to annunciate text provided in a text-to-speech context. This is equivalent to the use of a typeface to determine how printed text looks. It also encompasses the use of pre-recorded responses that are used for certain questions, typically underscoring the particular voice’s character.

The technology Google is using is called WaveNet which implements the neural-network and machine-learning concept to synthesise the various voices in a highly-accurate way. But to acquire the framework that describes a particular voice, the actor would have to record predefined scripts which bring out the nuances in their voices. It is part of an effort to provide a natural-sounding voice-driven user experience for applications where the speech output is varied programmatically such as voice-driven assistants or interactive voice response.

At the moment, this approach can only happen with actors who are alive and can come in to a studio. But I would see WaveNet and similar technologies eventually set up to work from extant recordings where the actor isn’t working to a special script used for capturing their voice’s attributes, including where the talent’s voice competes with other sounds like background music or sound effects . By working from these recordings, it could be about using the voices of evergreen talent that had passed on or using the voices that the talent used while performing in particular roles that underscored their fame. A good example of this application are the actors who performed in those classic British TV sitcoms of the 1970s or using Peter Sellers’, Spike Milligan’s, Harry Secombe’s and Michael Bentine’s voices as they sounded in the Goon Show radio comedy.

Google is presenting this in the form of a special-issue “voice font” representing John Legend, an actor and singer-songwriter who sung alongside the likes of Alicia Keys and Janet Jackson. Here, it is being used as a voice that one can implement on their Google Home, Android phone or other Google-Assistant device, responding to particular questions you ask of that assistant.

Amazon and others won’t take this lying down especially where the voice-driven assistant market is very competitive. As well, there will be the market pressure for third parties to implement this kind of technology in their voice-driven applications such as navigation systems in order to improve and customise the user experience.

IKEA to provide an affordable path to the Sonos ecosystem

Articles IKEA SYMFONISK speaker range press picture courtesy of Inter IKEA Systems B V

IKEA’s Sonos-powered lamp and bookshelf are speakers in disguise | Engadget

Sonos And IKEA Made Some Wacky Speaker Furniture | Gizmodo

IKEA’s Sonos-powered SYMFONISK lamp-speaker gets confirmed for Australia | PC World

Sonos Ikea Symfonisk speakers officially revealed, starting at €99.95 | Pocket-Lint

From the horse’s mouth

IKEA

Meet our new family member, SYMFONISK {Product Page)

IKEA and Sonos shine a new light on sound {Press Release)

Sonos

How Sonos and IKEA Plan to Furnish Homes Through Sound And Design (Blog Post)

SYMFONISK Product Page

My Comments

IKEA have introduced a wireless multiroom speaker system that doesn’t need to be assembled with that allen key. Here, it is actually a multiroom system that is totally based on the SONOS platform and can interwork with a set of SONOS speakers.

It isn’t the first time IKEA have dabbled in technology, especially marrying it with furniture. A previous example was to offer some tables and lamps that have integrated wireless charging mats for smartphones.But the SYMFONISK speaker range are based on the Sonos multiroom platform and can easily integrate with Sonos multiroom speakers and devices. It is part of IKEA’s way of seeking outside help to design tech-focused products rather than “reinventing the wheel” and taking a huge gamble with tech devices they design themselves.

IKEA SYMFONISK multiroom speaker press picture courtesy of Inter IKEA Systems B V

IKEA SYMFONISK Sonos-compatible network multiroom speaker

The Wi-Fi-based multiroom speakers, presented at the Salone Del Mobile which is Italy’s premier furniture design show, are known as the SYMFONISK speakers. They come in two forms – a traditional speaker that looks very similar to one of the small bookshelf speakers of the 60s and 70s; and a table lamp that has an integrated speaker implementing the 360-degree speaker approach.

The SYMFONISK speaker can be used as a shelf, whether with the KUNGFORS kitchen-rack hardware or not, or parked in a bookcase like one of the many IKEA bookcases you may have assembled. The expected price for these speakers is EUR€99 and it also has local volume and play-pause buttons on the front.

IKEA SYMFONISK multiroom speaker lamp press picture courtesy of Inter IKEA Group

IKEA SYMFONISK network multiroom speaker lamp

The SYMFONISK table-lamp speaker has the 360-degree speakers in the lamp-base and is able to be part of IKEA’s Tradfri Zigbee-driven smart-lighting system. The expected price for these lamp/speaker units would be EUR€179 each.

The fact that these work with the Sonos multi-room platform may open up various use cases concerning affordability. Here, you could “put your foot in the door” for a Sonos-based multiroom setup using the IKEA SYMFONISK bookshelf speaker compared to buying the cheapest Sonos multiroom speaker. Then, as you can afford it, you could buy more Sonos or IKEA SYMFONISK speakers to build out your multiroom audio system.

If you do have Sonos speakers, you could use the IKEA SYMFONISK speakers as a way to build out your Sonos multiroom system such as to “expand” in to a kitchen, bedroom or secondary lounge area. Similarly, Sonos suggested in their press release the idea of running two of the SYMFONISK bookshelf speakers as companion surround-sound speakers for a Sonos soundbar. It also underscores the idea with the Sonos multiroom platform of configuring a pair of like speakers to work as a stereo pair in one logical room with the wide stereo separation that this offers.

If you have a favourite sound system with its existing sources and want to play it through the IKEA SYMFONISK speakers, you would need to purchase the Sonos Connect box. This box, as well as being an “off-ramp” to play our Sonos-provided audio content through the sound system, also has a line input to connect the sound system’s tape output or an audio source to this device so you can stream that source to the IKEA SYMFONISK or Sonos speakers.

What I like of IKEA’s partnership with Sonos in developing the SYMFONISK speakers as though they are part of the Sonos multiroom ecosystem is that they bring affordability to that ecosystem. It is an approach that companies involved in network multiroom audio platforms need to perform in order to increase the ubiquity of their platform and avoid the attitude of their platform being so ethereally expensive that it ends up as a status symbol.

Could a logical network be a data-security attribute?

Telstra Gateway Frontier modem router press picture courtesy of Telstra

The local network created by one of these routers could be seen as a way to attest proximity or effective control of these devices

In data security, there has to be a way to attest that a user has effective control of their computing devices when they are authenticating with a device or service. Increasingly, most of us are handling two or more devices in this context such as to move data between them, use one of them as an authentication factor or to verify mutual trust between two or more people.

The logical network, also called a subnet, represents the devices connected to the same router irrespective of what media they use to connect to this network like Ethernet or Wi-Fi wireless. It is represented at Layer 3 (Network Layer) on the OSI network model stack and is represented by IP (Internet Protocol) whether version 4 or 6. Routers that implement guest or hotspot/community network functionality create a separate logical network for the guest or hotspot network.

But a hotspot network can be set up to cover a large public area like a bar or cafe’s dining room or even the whole of a hotel or apartment block. As well, if a hotspot network is properly set up for the end users’ data security, it shouldn’t be feasible to discover other devices on that same logical network. This is thanks to IP-based isolation functionality that the router that serves the hotspot offers.

Here, the existence of devices on the same logical network can be used as a way to attest proximity of these devices or to attest effective control over them.

Use cases

Enhanced two-factor authentication

Increasingly, most of us who implement two-factor authentication use an app on a smartphone to provide the random key number that confirms what we have along with what we know. But in a lot of situations, we have the smartphone and the computer we want to use to gain access to the resources existing on the same network. This may be our home or business network, a public-access hotspot or tethering our laptop to a smartphone for Internet access via the mobile network.

Having both devices on the same network could be seen as a way to assess the security level of a multifactor authentication setup by assessing the proximity of the devices to each other. It is more so if the devices are communicating to each other behind the same Wi-Fi access point or Ethernet switch. This concept would be to prove that both devices are effectively being controlled by the same user.

It can also work as an alternative to Bluetooth or NFC as a device-to-device link for a transcription-free multi-factor authentication setup if you are thinking of two devices that are able to connect to a network via Wi-Fi. This is more so where the issue of phishing of multi-factor authentication setups involving the transcription of a one-time passcode has been raised.

Discovery of devices in the same network

The same concept can also be examined in the context of interlinking between devices that exist on the same network or even determining one’s “home” domain in the context of AV content rights. In some ways, the concept could also be about tokenised login for online services where a user’s credentials are held on one device like a smartphone but a session-based token is passed to another device like a set-top box to facilitate login from that device.

It is a practice that has been used with UPnP and Bonjour technologies primarily for device and content discovery. The most obvious situation would be to use Apple AirPlay or Google Chromecast to throw content to the big screen from a compatible mobile device. It also works in the same context when you set up and use a network-based printer from your computer or smartphone.

Across-the-room discovery and mutual-user authentication

Another use case this concept can apply to is “across-the-room” device discovery and mutual-user authentication. This would be used for data transfer, social networks or online gaming where you intend to share a resource with someone you talked with, invite them as a friend / follower in a social network or engage them in an online game.

Proof of presence at a particular location

Use of a logical network’s attributes can be a tool for proving one’s presence at a particular location. This is more so where the Internet service for that network is being provided using a wired-broadband or fixed-wireless-broadband approach for its last-mile, like with most home and business networks. It may not work with “Mi-Fi” setups where a mobile broadband network is being implemented for the last-mile connection.

Here, it could be used for time-and-attendance purposes including “proof of presence” for home-based carers. Or it could be used to conditionally enable particular functionality like app-based on-premises food-and-beverage ordering at a venue. To the same extent, it could be used to protect delivery services against orders that were instigated at one location being sent to another location.

Methods

Both devices existing on the same network

In a premises-specific network like most small networks, testing that both devices are on the same subnet / logical network behind the same gateway device (router) could be a way to attest that both devices are in the same premises. The same test can be performed by the use of a “hop count” on Layer 3 of the OSI network-layer tree, which also determines the number of logical networks passed.

It is a method used with a wide range of network-based AV and printing applications to constrain the discovery and control of devices by controller software to what is local to you.

But assessing whether the two devices are connecting to the same access point on a Wi-Fi network can be used to attest whether both devices are in the same room in a large Wi-Fi setup. It may not work in a network setup where different devices connect to a network using different connection media like Ethernet, Wi-Fi Wireless or HomePlug powerline. This also includes situations where multiple access points cover the same room or floor such as with large rooms or open-plan areas.

Another approach that can be used for Wi-Fi hotspot networks honouring the Hotspot 2.0 / Passpoint setup would be to read the “venue” metadata for that network and compare whether both devices are in the same venue. If this technology is able to support subdividing of a logical venue such as based on floors or rooms, this could work as a way of further attesting whether both devices are in close proximity.

A Wi-Fi wireless network can be attested through the use of the BSSID which identifies the same access point that the devices are connecting through or the ESSID which is the network’s “call sign”. The BSSID could be used for a public hotspot network including a “hotzone” network ran by a local government or ISP,or a large network that uses many access points while the ESSID approach could be used simply for a small network with a few access points.

Trusted networks with authentication certificates

On the other hand, there could be the concept of creating “trusted networks” where authentication certificates relating to the network are stored in the network’s gateway device or in infrastructure devices associated with that network. It could be used to work against man-in-the-middle attacks as well as a stronger approach to attesting trust between the client device and the network it proposes to access.

The initial appeal for this concept could be to attest the authenticity of a business’s network especially in the face of business partners or customers who want to use that network as a gateway to the Internet or use the host business’s resources.

It could have some appeal to the food, beverage and hospitality industry where particular cafes and bars are often seen by individuals and workgroups as favoured hangouts. In this context, if an individual wants to use the Wi-Fi public-access network in their favourite “watering hole” or “second office”, the “trusted network” approach can be used to verify to the customer that they have connected to the venue’s network at the venue to avoid “man-in-the-middle” attacks.

This approach is being implemented with the Wi-Fi Passpoint / Hotspot 2.0 technology to provide for the simple yet secure public-access Wi-Fi network.

The same approach can be used with a home network if the router can store data like digital certificates in onboard non-volatile memory. Then this data could be created by the ISP as a “known trusted network” with a network-specific certificate relating to the router and network equipment. Such a service could be offered by an ISP as a value-added service especially to cater for “proof-of-presence” applications.

Conclusion

Using a logical network as a data-security attribute can be effective as a security tool for some use cases. With current network equipment, this can be a surefire way of assessing device proximity.to other devices. But use of certificates stored on network-infrastructure devices like routers and provided by ISPs or similar entities can be of use for authenticated-network or proof-of-presence applications.