Connect with us

Biz & IT

Huawei says two-thirds of 5G networks outside China now use its gear

Published

on

As 5G networks begin rolling out and commercializing around the world, telecoms vendors are rushing to get a headstart. Huawei equipment is now behind two-thirds of the commercially launched 5G networks outside China, said president of Huawei’s carrier business group Ryan Ding on Tuesday at an industry conference.

Huawei, the world’s largest maker of telecoms gear, has nabbed 50 commercial 5G contracts outside its home base from countries including South Korea, Switzerland, the United Kingdom, Finland and more. In all, the Shenzhen-based firm has shipped more than 150,000 base stations, according to Ding.

It’s worth noting that network carriers can work with more than one providers to deploy different parts of their 5G base stations. Huawei offers what it calls an end-to-end network solution or a full system of hardware, but whether a carrier plans to buy from multiple suppliers is contingent on their needs and local regulations, a Huawei spokesperson told TechCrunch.

In China, for instance, both Ericsson and Nokia have secured 5G contracts from state-run carrier China Mobile (although Nokia’s Chinese entity, a joint venture with Alcatel-Lucent Shanghai Bell, is directly controlled by China’s State-owned Assets Supervision and Administration Commission).

Huawei’s handsome number of deals came despite the U.S’s ongoing effort to lobby its allies against using its equipment. In May, the Trump administration put Huawei on a trade blacklist over concerns around the firm’s spying capabilities, a move that has effectively banned U.S. companies from doing businesses with the Shenzhen-based giant.

Huawei’s overall share in the U.S. telecoms market has so far been negligible, but many rural carriers have long depended on its high-performing, cost-saving hardware. That might soon end as the U.S. pressures small-town network operators to quit buying from Huawei, Reuters reported this week.

To appease potential clients, Huawei has gone around the world offering no-backdoors pacts to local governments of the U.K. and most recently India.

Huawei is in a neck and neck fight with rivals Nokia and Ericsson. In early June, Nokia CEO Rajeev Suri said in an interview with Bloomberg that the firm had won “two-thirds of the time” in bidding contracts against Ericcson and competed “quite favorably with Huawei.” Nokia at the time landed 42 5G contracts, while Huawei numbered 40 and Ericsson scored 19.

Huawei’s challenges go well beyond the realm of its carrier business. Its fast-growing smartphone unit is also getting the heat as the U.S. ban threatens to cut it off from Alphabet, whose Android operating system is used in Huawei phone, as well as a range of big chip suppliers.

Huawei CEO and founder Ren Zhengfei noted that trade restrictions may compromise the firm’s output in the short term. Total revenues are expected to dip $30 billion below estimates over the next two years, and overseas smartphone shipment faces a 40% plunge. Ren, however, is bullish that the firm’s sales would bounce back after a temporary period of adjustment while it works towards self-dependence by developing its own OS, chips and other core technologies.

Source link

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published.

Biz & IT

Netflix’s ad-supported plan likely to have another drawback: No video downloads

Published

on

Getty Images | Bloomberg

The presence of advertisements apparently won’t be the only major difference between Netflix’s ad-supported and ad-free plans. Text reportedly found in the code of Netflix’s iPhone app suggests the ad-supported plan won’t let users download movies and shows for offline viewing.

The text says, “Downloads available on all plans except Netflix with ads,” according to a Bloomberg report yesterday. The text was discovered by iOS developer Steve Moser, who wrote about it on his blog. Unsurprisingly, the Netflix app “code also suggests that users won’t be able to skip ads—a common move in the streaming world—and playback controls won’t be available during ad breaks,” Bloomberg wrote.

Netflix has been offering video downloads in its apps since late 2016. A Netflix spokesperson told Ars, “We are still in the early days of deciding how to launch a lower-priced, ad-supported tier and no decisions have been made. So this is all just speculation at this point.”

Moser’s blog post said he also found Netflix app text from a setup process for new subscribers who select the ad-supported plan. The text refers to the use of personalized ads. “Now, let’s set up your ad experience. We just need a few details to make sure you get the most relevant ads on Netflix. It’ll be really quick, we promise!” the text says.

Hulu similarly makes downloads available only to users on its no-ads plans. HBO Max also requires an ad-free plan for downloads.

Ad tier planned for early 2023

After years of resisting ads, Netflix Co-CEO Reed Hastings announced in April that the streaming service will offer an ad-supported tier. Netflix says it plans to launch the ad-supported tier in early 2023.

Netflix prices in the US range from $9.99 for “Basic” to $19.99 a month for “Premium.” Netflix says the “lower priced ad-supported subscription plan” will be offered “in addition to our existing ads-free basic, standard, and premium plans.”

Netflix hasn’t said what the ad-supported plan will cost or whether it will have other limits like the ones in Netflix’s cheapest current plan. The Basic plan, which is currently the cheapest option, does not provide high-definition video and has two other notable limits: Basic users can’t watch on more than one screen at a time, and they can only download videos on one phone or tablet.

The $15.49-per-month Standard plan allows HD video and lets subscribers watch on two screens simultaneously and download videos on two devices. The $19.99 Premium plan allows 4K viewing, the ability to watch on four screens simultaneously, and downloads on up to four devices.

Netflix losing subscribers

Netflix is also cracking down on account-sharing by testing an “extra member” fee in some countries and an “extra home” fee in others. A Netflix letter to shareholders said the company aims to complete a broader rollout of sharing fees next year.

Netflix last month reported a loss of 970,000 paid streaming subscribers in Q2 earnings after having lost 200,000 customers in the first quarter of 2022. Worldwide paid memberships decreased from 221.64 million to 220.67 million in Q2, and revenue growth has slowed dramatically.

Netflix says the ad-supported tier is key to improving revenue and profits. “While it will take some time to grow our member base for the ad tier and the associated ad revenues, over the long run, we think advertising can enable substantial incremental membership (through lower prices) and profit growth (through ad revenues),” Netflix’s quarterly letter to shareholders said.

Netflix hired Microsoft to provide advertising technology, saying that “Microsoft offered the flexibility to innovate over time on both the technology and sales side, as well as strong privacy protections for our members.”

Continue Reading

Biz & IT

Zoom patches critical vulnerability again after prior fix was bypassed

Published

on

Enlarge / A critical vulnerability in Zoom for MacOS, patched once last weekend, could still be bypassed as of Wednesday. Users should update again.

Getty Images

It’s time for Zoom users on Mac to update—again.

After Zoom patched a vulnerability in its Mac auto-update utility that could give malicious actors root access earlier this week, the video conferencing software company issued another patch Wednesday, noting that the prior fix could be bypassed.

Zoom users on macOS should download and run version 5.11.6 (9890), released August 17. You can also check Zoom’s menu bar for updates. Waiting for an automatic update could leave you waiting days while this exploit is publicly known.

Zoom’s incomplete fix was reported by macOS security researcher Csaba Fitzl, aka theevilbit of Offensive Security. Zoom credited Fitzl in its security bulletin (ZSB-22019) and issued a patch the day before Fitzl tweeted about it.

Neither Fitzl nor Zoom detailed how Fitzl was able to bypass the fix for the vulnerability first discovered by Patrick Wardle, founder of the Objective-See Foundation. Wardle spoke at Def Con last week about how Zoom’s auto-update utility held onto its privileged status to install Zoom packages but could be tricked into verifying other packages. That meant malicious actors could use it to downgrade Zoom for better exploit access or even to gain root access to the system.

Continue Reading

Biz & IT

Ring patched an Android bug that could have exposed video footage

Published

on

Enlarge / Ring camera images give you a view of what’s happening and, in one security firm’s experiments, a good base for machine learning surveillance.

Ring

Amazon quietly but quickly patched a vulnerability in its Ring app that could have exposed users’ camera recordings and other data, according to security firm Checkmarx.

Checkmarx researchers write in a blog post that Ring’s Android app, downloaded more than 10 million times, made an activity available to all other applications on Android devices. Ring’s com.ring.nh.deeplink.DeepLinkActivity would execute any web content given to it, so long as the address included the text /better-neighborhoods/.

That alone would not have granted access to Ring data, but Checkmarx was able to use a cross-site scripting vulnerability in Ring’s internal browser to point it at an authorization token. Next, Checkmarx obtained a session cookie by authorizing that token and its hardware identifier at a Ring endpoint and then used Ring’s APIs to extract names, email addresses, phone numbers, Ring device data (including geolocation), and saved recordings.

Checkmarx’s video, featuring footage tests and a hoodie-wearing hacker.

And then Checkmarx kept going. With access to its own example users’ recordings and any number of machine-learning-powered computer vision services (including Amazon’s own Rekognition), the security firm went wide-angle. You could, the firm found in its tests, scan for:

  • Safes, and potentially their combinations
  • Images of documents containing the words “Top Secret” or “Private”
  • Known celebrities and political figures
  • Passwords and passcodes
  • Children, alone, in view of a Ring camera

To be clear, the vulnerability was seemingly never exploited in the wild. Checkmarx reported it on May 1, Amazon confirmed its receipt the same day, and a fix was released (3.51.0 for Android, 5.51.0 for iOS). Checkmarx says that Amazon responded to the high-severity issue with acknowledgment but also deferral. “This issue would be extremely difficult for anyone to exploit because it requires an unlikely and complex set of circumstances to execute,” Amazon told Checkmarx.

Erez Jalon, VP of security research at Checkmarx, told The Record that taped-together vulnerabilities are coveted among hackers.

“Each would be problematic, but chaining them together, something hackers always try to do, made it so impactful.”

Continue Reading

Trending