Connect with us

Biz & IT

Fleksy’s keyboard grabs $800k+ via equity crowdfunding

Published

on

The dev team that’s now engineering the Fleksy keyboard app has raised more than $800,000 via an equity crowdfunding route.

As we reported a year ago, the development of Fleksy’s keyboard has been taken over by the Barcelona-based startup behind an earlier keyboard app called ThingThing.

The team says their new funding raise — described as a pre-Series A round — will be put towards continued product development of the Fleksy keyboard, including the core AI engine used for next word and content prediction, plus additional features being requested by users — such as swipe to type. 

Support for more languages is also planned. (Fleksy’s Android and iOS apps are currently available in 45+ languages.)

Their other big push will be for growth: Scaling the user-base via a licensing route to market in which the team pitches Android OEMs on the benefits of baking Fleksy in as the default keyboard — offering a high degree of customization, alongside a feature-set that boasts not just speedy typing but apps within apps and extensions. 

The Fleksy keyboard can offer direct access to web search within the keyboard, for example, as well as access to third party apps (in an apps within apps play) — to reduce the need for full app switching.

This was the original concept behind ThingThing’s eponymous keyboard app, though the team has refocused efforts on Fleksy. And bagged their first OEMs as licensing partners.

They’ve just revealed Palm as an early partner. The veteran brand unveiled a dinky palm-sized ‘ultra-mobile’ last week. The tiny extra detail is that the device runs a custom version of the Fleksy keyboard out of the box.

With just 3.3 inches of screen to play with, the keyboard on the Palm risks being a source of stressful friction. Ergo enter Fleksy, with gesture based tricks to speed up cramped typing, plus tried and tested next-word prediction.

ThingThing CEO Olivier Plante says Palm was looking for an “out of the box optimized input method” — and more than that “high customization”.

“We’re excited to team up with ThingThing to design a custom keyboard that delivers a full keyboard typing experience for Palm’s ultra mobile form factor,” adds Dennis Miloseski, co-founder of Palm, in a statement. “Fleksy enables gestures and voice-to-text which makes typing simple and convenient for our users on the go.”

Plante says Fleksy has more OEM partnerships up its sleeve too. “We’re pending to announce new partnerships very soon and grow our user base to more than 25 million users while bringing more revenue to the medium and small OEMs desperately looking to increase their profit margins — software is the cure,” he tells TechCrunch.

ThingThing is pitching itself as a neutral player in the keyboard space, offering OEMs a highly tweakable layer where the Qwerty sits as its strategy to compete with Android’s keyboard giants: Google’s Gboard and Microsoft-owned SwiftKey. 

“We changed a lot of things in Fleksy so it feels native,” says Plante, discussing the Palm integration. “We love when the keyboard feels like the brand and with Palm it’s completely a Palm keyboard to the end-user — and with stellar performance on a small screen.”

“We’ve beaten our competitor to the punch,” he adds. 

That said, the tiny Palm (pictured in the feature image at the top of this post) is unlikely to pack much of a punch in marketshare terms. While Palm is a veteran — and, to nerds, almost cult — brand it’s not even a mobile tiddler in smartphone marketshare terms.

Palm’s cute micro phone is also an experimental attempt to create a new mobile device category — a sort of netbook-esque concept of an extra mobile that’s extra portable — which looks unlikely to be anything other than extremely niche. (Added to its petite size, the Palm is a Verizon exclusive.)

Even so ThingThing is talking bullishly of targeting 550M devices using its keyboard by 2020.

At this stage its user-base from pure downloads is also niche: Just over 1M active users. But Plante says it has already closed “several phone brands partnerships” — saying three are signed, with three more in the works — claiming this will make Fleksy the default input method in more than 20-30 million active users in the coming months. 

He doesn’t name any names but describes these other partners as “other major phone brands”.

The plan to grow Fleksy’s user-base via licensing has attracted wider investor backing now, via the equity crowdfunding route. The team had initially been targeting ($300k). In all they’ve secured $815,119 from 446 investors.

Plante says they went down the equity crowdfunding route to spread their pitch more widely, and get more ambassadors on board — as well as to demonstrate “that we’re a user-centric/people/independent company aiming big”.

“We are keen to work and fully customize the keyboard to the OEM tastes. We know this is key for them so they can better compete against the others on more than simply the hardware,” he says, making the ‘Fleksy for OEMs’ pitch. “Today, the market is saturated with yet another box, better camera and better screen…. the missing piece in Android ecosystem is software differences.”

Given how tight margins remain for Android makers it remains to be seen how many will bite. Though there’s a revenue share arrangement that sweetens the deal.

It is also certainly true that differentiation in the Android space is a big problem. That’s why Palm is trying its hand at a smaller form factor — in a leftfield attempt to stand out by going small.

The European Union’s recent antitrust ruling against Google’s Android OS has also opened up an opportunity for additional software customization, via unbundled Google apps. So there’s at least a chance for some new thinking and ideas to emerge in the regional Android smartphone space. And that could be good for Spain-based ThingThing.

Aside from the licensing fee, the team’s business model relies on generating revenue via affiliate links and its fleksyapps platform. ThingThing then shares revenue with OEM partners, so that’s another carrot for them — offering a services topper on their hardware margin.

Though that piece will need scale to really spin up. Hence ThingThing’s user target for Fleksy being so big and bold.

“We’re working with brands in order to bring them into any apps where you type, which unlocks brand new use cases and enables the user to share conveniently and the brand to drive mobile traffic to their service,” says Plante. “On this note, we monetize via affiliate/deep linking and operating a fleksyapps Store.”

ThingThing has also made privacy by design a major focus — which is a key way it’s hoping to make the keyboard app stand out against data-mining big tech rivals.

Source link

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Biz & IT

3 iOS 0-days, a cellular network compromise, and HTTP used to infect an iPhone

Published

on

Getty Images

Apple has patched a potent chain of iOS zero-days that were used to infect the iPhone of an Egyptian presidential candidate with sophisticated spyware developed by a commercial exploit seller, Google and researchers from Citizen Lab said Friday.

The previously unknown vulnerabilities, which Apple patched on Thursday, were exploited in clickless attacks, meaning they didn’t require a target to take any steps other than to visit a website that used the HTTP protocol rather than the safer HTTPS alternative. A packet inspection device sitting on a cellular network in Egypt kept an eye out for connections from the phone of the targeted candidate and, when spotted, redirected it to a site that delivered the exploit chain, according to Citizen Lab, a research group at the University of Toronto’s Munk School.

A cast of villains, 3 0-days, and a compromised cell network

Citizen Lab said the attack was made possible by participation from the Egyptian government, spyware known as Predator sold by a company known as Cytrox, and hardware sold by Egypt-based Sandvine. The campaign targeted Ahmed Eltantawy, a former member of the Egyptian Parliament who announced he was running for president in March. Citizen Lab said the recent attacks were at least the third time Eltantawy’s iPhone has been attacked. One of them, in 2021, was successful and also installed Predator.

“The use of mercenary spyware to target a senior member of a country’s democratic opposition after they had announced their intention to run for president is a clear interference in free and fair elections and violates the rights to freedom of expression, assembly, and privacy,” Citizen Lab researchers Bill Marczak, John Scott-Railton, Daniel Roethlisberger, Bahr Abdul Razzak, Siena Anstis, and Ron Deibert wrote in a 4,200-word report. “It also directly contradicts how mercenary spyware firms publicly justify their sales.”

The vulnerabilities, which are patched in iOS versions 16.7 and iOS 17.0.1, are tracked as:

  • CVE-2023-41993: Initial remote code execution in Safari
  • CVE-2023-41991: PAC bypass
  • CVE-2023-41992: Local privilege escalation in the XNU Kernel

According to research published Friday by members of Google’s Threat Analysis Group, the attackers who exploited the iOS vulnerabilities also had a separate exploit for installing the same Predator spyware on Android devices. Google patched the flaws on September 5 after receiving a report by a research group calling itself DarkNavy.

“TAG observed these exploits delivered in two different ways: the MITM injection and via one-time links sent directly to the target,” Maddie Stone, a researcher with the Google Threat Analysis Group wrote. “We were only able to obtain the initial renderer remote code execution vulnerability for Chrome, which was exploiting CVE-2023-4762.”

The attack was complex. Besides leveraging three separate iOS vulnerabilities, it also relied on hardware made by a manufacturer known as Sandvine. Sold under the brand umbrella PacketLogic, the hardware sat on the cellular network the targeted iPhone accessed and monitored traffic passing over it for his phone. Despite the precision, Citizen Lab said that the attack is blocked when users turn on a feature known as Lockdown, which Apple added to iOS last year. More about that later.

There’s little information about the iOS exploit chain other than it automatically triggered when a target visited a site hosting the malicious code. Once there, the exploits installed Predator with no further user action required.

To surreptitiously direct the iPhone to the attack site, it only needed to visit any HTTP site. Over the past five years or so, HTTPS has become the dominant means of connecting to websites because the encryption it uses prevents adversary-in-the-middle attackers from monitoring or manipulating data sent between the site and the visitor. HTTP sites still exist, and sometimes HTTPS connections can be downgraded to unencrypted HTTP ones.

Once Eltantawy visited an HTTP site, the PacketLogic device injected data into the traffic that surreptitiously connected the Apple device to a site that triggered the exploit chain.

Network diagram showing the Spyware Injection Middlebox located on a link between Telecom Egypt and Vodafone Egypt.
Enlarge / Network diagram showing the Spyware Injection Middlebox located on a link between Telecom Egypt and Vodafone Egypt.

Predator, the payload installed in the attack, is sold to a wide array of governments, including those of Armenia, Egypt, Greece, Indonesia, Madagascar, Oman, Saudi Arabia, and Serbia. Citizen Lab has said that Predator was used to target Ayman Nour, a member of the Egyptian political opposition living in exile in Turkey, and an Egyptian exiled journalist who hosts a popular news program and wishes to remain anonymous. Last year researchers from Cisco’s Talo security team exposed the inner workings of the malware after obtaining a binary of it.

Continue Reading

Biz & IT

Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters

Published

on

Getty Images

Incomplete information included in recent disclosures by Apple and Google reporting critical zero-day vulnerabilities under active exploitation in their products has created a “huge blindspot” that’s causing a large number of offerings from other developers to go unpatched, researchers said Thursday.

Two weeks ago, Apple reported that threat actors were actively exploiting a critical vulnerability in iOS so they could install espionage spyware known as Pegasus. The attacks used a zero-click method, meaning they required no interaction on the part of targets. Simply receiving a call or text on an iPhone was enough to become infected by the Pegasus, which is among the world’s most advanced pieces of known malware.

“Huge blindspot”

Apple said the vulnerability, tracked as CVE-2023-41064, stemmed from a buffer overflow bug in ImageIO, a proprietary framework that allows applications to read and write most image file formats, which include one known as WebP. Apple credited the discovery of the zero-day to Citizen Lab, a research group at the University of Toronto’s Munk School that follows attacks by nation-states targeting dissidents and other at-risk groups.

Four days later, Google reported a critical vulnerability in its Chrome browser. The company said the vulnerability was what’s known as a heap buffer overflow that was present in WebP. Google went on to warn that an exploit for the vulnerability existed in the wild. Google said that the vulnerability, designated as CVE-2023-4863, was reported by the Apple Security Engineering and Architecture team and Citizen Lab.

Speculation, including from me, quickly arose that a large number of similarities strongly suggested that the underlying bug for both vulnerabilities was the same. On Thursday, researchers from security firm Rezillion published evidence that they said made it “highly likely” both indeed stemmed from the same bug, specifically in libwebp, the code library that apps, operating systems, and other code libraries incorporate to process WebP images.

Rather than Apple, Google, and Citizen Lab coordinating and accurately reporting the common origin of the vulnerability, they chose to use a separate CVE designation, the researchers said. The researchers concluded that “millions of different applications” would remain vulnerable until they, too, incorporated the libwebp fix. That, in turn, they said, was preventing automated systems developers use to track known vulnerabilities in their offerings from detecting a critical vulnerability that’s under active exploitation.

“Since the vulnerability is scoped under the overarching product containing the vulnerable dependency, the vulnerability will only be flagged by vulnerability scanners for these specific products,” Rezillion researchers Ofri Ouzan and Yotam Perkal wrote. “This creates a HUGE blindspot for organizations blindly relying on the output of their vulnerability scanner.”

Google has further come under criticism for limiting the scope of CVE-2023-4863 to Chrome rather than in libwebp. Further, the official description describes the vulnerability as a heap buffer overflow in WebP in Google Chrome.

In an email, a Google representative wrote: “Many platforms implement WebP differently. We do not have any details about how the bug impacts other products. Our focus was getting a fix out to the Chromium community and affected Chromium users as soon as possible. It is best practice for software products to track upstream libraries they depend on in order to pick up security fixes and improvements.”

The representative noted that the WebP image format is mentioned in its disclosure and the official CVE page. The representative didn’t explain why the official CVE and Google’s disclosure did not mention the widely used libwebp library or the likelihood that other software was also likely to be vulnerable.

The Google representative didn’t answer a question asking if CVE-2023-4863 and CVE-2023-41064 stemmed from the same vulnerability. Citizen Lab and Apple didn’t respond to emailed questions before this story went live.

Continue Reading

Biz & IT

Signal preps its encryption engine for the quantum doomsday inevitability

Published

on

Getty Images

The Signal Foundation, maker of the Signal Protocol that encrypts messages sent by more than a billion people, has rolled out an update designed to prepare for a very real prospect that’s never far from the thoughts of just about every security engineer on the planet: the catastrophic fall of cryptographic protocols that secure some of the most sensitive secrets today.

The Signal Protocol is a key ingredient in the Signal, Google RCS, and WhatsApp messengers, which collectively have more than 1 billion users. It’s the engine that provides end-to-end encryption, meaning messages encrypted with the apps can be decrypted only by the recipients and no one else, including the platforms enabling the service. Until now, the Signal Protocol encrypted messages and voice calls with X3DH, a specification based on a form of cryptography known as Elliptic Curve Diffie-Hellman.

A brief detour: WTF is ECDH?

Often abbreviated as ECDH, Elliptic Curve Diffie-Hellman is a protocol unto its own. It combines two main building blocks. The first part involves the use of elliptic curves to form asymmetric key pairs, each of which is unique to each user. One key in the pair is public and available to anyone to use for encrypting messages sent to the person who owns it. The corresponding private key is closely guarded by the user. It allows the user to decrypt the messages. Cryptography relying on a public-private key pair is often known as asymmetric encryption.

The security of asymmetric encryption is based on mathematical one-way functions. Also known as trapdoor functions, these problems are easy to compute in one direction and substantially harder to compute in reverse. In elliptic curve cryptography, this one-way function is based on the Discrete Logarithm problem in mathematics. The key parameters are based on specific points in an elliptic curve, which is defined as the field of integers modulo prime P.

When someone knows the starting point (A) in the above image showing an elliptic curve and the number of hops required to get to the endpoint (E), it’s easy to know where (E) is. But when all someone knows is the starting and end points, it’s next to impossible to deduce how many hops are required.

As explained in an Ars article from 2013:

Let’s imagine this curve as the setting for a bizarre game of billiards. Take any two points on the curve and draw a line through them; the line will intersect the curve at exactly one more place. In this game of billiards, you take a ball at point A and shoot it toward point B. When it hits the curve, the ball bounces either straight up (if it’s below the x-axis) or straight down (if it’s above the x-axis) to the other side of the curve.

We can call this billiards move on two points “dot.” Any two points on a curve can be dotted together to get a new point.

A dot B = C

We can also string moves together to “dot” a point with itself over and over.

A dot A = B

A dot B = C

A dot C = D

It turns out that if you have two points, an initial point “dotted” with itself n times to arrive at a final point, finding out n when you only know the final point and the first point is hard. To continue our bizarro billiards metaphor, imagine that one person plays our game alone in a room for a random period of time. It is easy for him to hit the ball over and over following the rules described above. If someone walks into the room later and sees where the ball has ended up, even if they know all the rules of the game and where the ball started, they cannot determine the number of times the ball was struck to get there without running through the whole game again until the ball gets to the same point. Easy to do, hard to undo. This is the basis for a very good trapdoor function.

Continue Reading

Trending