Connect with us

Gadgets

Krisp reduces noise on calls using machine learning, and it’s coming to Windows soon – TechCrunch

Published

on

If your luck is anything like mine, as soon as you jump on an important call, someone decides it’s a great time to blow some leaves off the sidewalk outside your window. 2Hz’s Krisp is a new desktop app that uses machine learning to subtract background noise like that, or crowds, or even crying kids — while keeping your voice intact. It’s already out for Macs and it’s coming to Windows soon.

I met the creators of Krisp, including 2Hz co-founder Davit Baghdasaryan, earlier this year at UC Berkeley’s Skydeck accelerator, where they demonstrated their then-prototype tech.

The tech involved is complex, but the idea is simple: If you create a machine learning system that understands what the human voice sounds like, on average, then it can listen to an audio signal and select only that part of it, cutting out a great deal of background noise.

Baghdasaryan, formerly of Twilio, originally wanted to create something that would run on mobile networks, so T-Mobile or whoever could tout built-in noise cancellation. This platform approach proved too slow, however, so they decided to go straight to consumers.

“Traction with customers was slow, and this was a problem for a young startup,” Baghdasaryan said in an email later. However, people were loving the idea of ‘muting noise,’ so we decided to switch all our focus and build a user-facing product.”

That was around the time I talked with them in person, incidentally, and just six months later they had released on Mac.

It’s simple: You run the app, and it modifies both the outgoing and incoming audio signals, with the normal noisy signal going in one end and a clean, voice-focused one coming out the other. Everything happens on-device and with very short latency (around 15 milliseconds), so there’s no cloud involved and nothing is ever sent to any server or even stored locally. The team is working on having the software adapt and learn on the fly, but it’s not implemented yet.

Another benefit of this approach is it doesn’t need any special tweaking to work with, say, Skype instead of Webex. Because it works at the level of the OS’s sound processing, whatever app you use just hears the Krisp-modified signal as if it were clean out of your mic.

They launched on Mac because they felt the early-adopter type was more likely to be on Apple’s platform, and the bet seems to have paid off. But a Windows version is coming soon — the exact date isn’t set, but expect it either late this month or early January. (We’ll let you know when it’s live.)

It should be more or less identical to the Mac version, but there will be a special gaming-focused one. Gamers, Baghdasaryan pointed out, are much more likely to have GPUs to run Krisp on, and also have a real need for clear communication (as a PUBG player I can speak to the annoyance of an open mic and clacky keys). So there will likely be a few power-user features specific to gamers, but it’s not set in stone yet.

You may wonder, as I did, why they weren’t going after chip manufacturers, perhaps to include Krisp as a tech built into a phone or computer’s audio processor.

In person, they suggested that this ultimately was also too slow and restrictive. Meanwhile, they saw that there was no real competition in the software space, which is massively easier to enter.

“All current noise cancellation solutions require multiple microphones and a special form factor where the mouth must be close to one of the mics. We have no such requirement,” Baghdasaryan explained. “We can do it with single-mic or operate on an audio stream coming from the network. This makes it possible to run the software in any environment you want (edge or network) and any direction (inbound or outbound).”

If you’re curious about the technical side of things — how it was done with one mic, or at low latency, and so on — there’s a nice explanation Baghdasaryan wrote for the Nvidia blog a little while back.

Furthermore, a proliferation of AI-focused chips that Krisp can run on easily means easy entry to the mobile and embedded space. “We have already successfully ported our DNN to NVIDIA GPUs, Intel CPU/GNA, and ARM. Qualcomm is in the pipeline,” noted Baghdasaryan.

To pursue this work the company has raised a total of $2 million so far: $500K from Skydeck as well as friends and family for a pre-seed round, then a $1.5 M round led by Sierra Ventures and Shanda Group.

Expect the Windows release later this winter, and if you’re already a user, expect a few new features to come your way in the same time scale. You can download Krisp for free here.

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Gadgets

Apple invests $45 million more in Gorilla Glass-maker Corning

Published

on


Apple has invested an additional $45 million in US-based Corning Incorporated, the maker of Gorilla Glass, the companies announced today.

A news release from Apple says the investment will help “expand Corning’s manufacturing capacity in the US” and “drive research and development into innovative new technologies that support durability and long-lasting product life.”

The investment will come out of Apple’s $5 billion Advanced Manufacturing Fund, which was established in 2017 to invest in manufacturing jobs and infrastructure in the United States related to Apple’s products like the iPhone.

Up to this point, Corning has received $450 million from that fund. The prior cash influx played a role in the development of the ceramic shield, a new screen material that made the new iPhone 12 lineup more drop-resistant than prior iPhone models.

Apple describes the technology, its use, and the process behind it this way:

The new material was enabled by a high-temperature crystallization step which forms nano-crystals within the glass matrix. Those specialized crystals are kept small enough that the material is transparent. The resulting material makes up the revolutionary Ceramic Shield, which Apple used to fashion the new front cover featured on iPhone in the iPhone 12 lineup. Prior to Ceramic Shield, embedded crystals have traditionally affected the material’s transparency, a crucial factor for the front cover of iPhone because so many features, including the display, the camera, and sensors for Face ID, need optical clarity to function.

Apple’s relationship with Corning goes back to the very first iPhone, when a last-minute change to that product before launch replaced a scratch-prone plastic screen with a brand-new kind of comparatively scratch-resistant glass called Gorilla Glass from Corning.

Gorilla Glass has since been refined to be more durable, and it appears not just in iPhones but in numerous other mobile products from Samsung and others.

Apple hasn’t said how Corning will use this new investment. Corning is known to be working on new forms of durable, bendable glass that could be suitable to a hypothetical future foldable iPhone, but there’s no guarantee that’s what’s going on here.

We also don’t know if whatever Corning will develop with these funds will be exclusive to Apple’s products. It is likely, however, that the investment will lead to at least some new jobs at Corning, probably in the US state of Kentucky, where glass for Apple products is manufactured.

Listing image by Apple

Continue Reading

Gadgets

Google: We put YouTube TV in the main YouTube app. What now, Roku?

Published

on

Enlarge / Google tells users where they can find YouTube TV now: inside the regular YouTube app.

Google

Previously on Google versus Roku: Roku and Google needed to renew the contract for YouTube TV, Google’s $65-per-month cable TV replacement, on Roku’s TV platform. The two companies weren’t able to come to an agreement on the new contract, resulting in YouTube TV being pulled from the Roku store. Oh no! While existing customers could still use the YouTube TV app they had already installed, new users couldn’t sign up. Will the two companies ever be able to settle their differences, or is their friendship ruined forever?

The next exciting episode in this saga aired on Friday, when Google announced in a blog post that it was just going to run an end-around on Roku and stick the YouTube TV app in the YouTube app. YouTube and YouTube TV exist as separate apps, and while the YouTube TV contract expired and the app was taken off the Roku store, the YouTube contract does not expire until December.

Since the YouTube app is still running, Google was able to quickly shove YouTube TV functionality into it. On the side navigation menu, the last link in the list reads, “Go to YouTube TV.” This is not unprecedented—it’s actually the way YouTube Music works, too, with a sort of app-within-an-app interface.

Google says it is “still working to come to an agreement with Roku to ensure continued access to YouTube TV for our mutual customers.” But Google threatened Roku with another escalation, saying, “We’re also in discussions with other partners to secure free streaming devices in case YouTube TV members face any access issues on Roku.”

A few weeks ago, Google offered to “renew the YouTube TV deal under the existing reasonable terms” with Roku, so Roku seems to be the current aggressor. In response to this latest move, Roku sent the following statement to The Verge.

Google’s actions are the clear conduct of an unchecked monopolist bent on crushing fair competition and harming consumer choice. The bundling announcement by YouTube highlights the kind of predatory business practices used by Google that Congress, Attorney Generals and regulatory bodies around the world are investigating. Roku has not asked for one additional dollar in financial value from YouTubeTV. We have simply asked Google to stop their anticompetitive behavior of manipulating user search results to their unique financial benefit and to stop demanding access to sensitive data that no other partner on our platform receives today. In response, Google has continued its practice of blatantly leveraging its YouTube monopoly to force an independent company into an agreement that is both bad for consumers and bad for fair competition.

These are the same claims Roku has made before, and Google has already responded to them, saying, “To be clear, we have never, as they have alleged, made any requests to access user data or interfere with search results. This claim is baseless and false.”

The real reason for the rift between the two companies seems to be over Google’s AV1 video codec requirements for YouTube (presumably only for new devices), and it seems these requirements would start in December, when the mainline YouTube app contract expires.

AV1 is a cutting-edge, royalty-free video codec that will likely be the next de facto video standard, since it’s backed by Google, Apple, Amazon, Netflix, Microsoft, Samsung, Intel, Facebook, Arm, Hulu, and a ton of other companies. AV1 would save on bandwidth for streaming companies and customers, but it requires hardware decode support on cheaper devices like a Roku box. Google wants to make AV1 a requirement for YouTube, but that requires new chips, which are probably more expensive than the older chips Roku would prefer to use.

Google says, “Separately, we are also in ongoing, long-term conversations with Roku to certify that new devices meet our technical requirements. This certification process exists to ensure a consistent and high-quality YouTube experience across different devices, including Google’s own—so you know how to navigate the app and what to expect. We’ll continue our conversations with Roku on certification, in good faith, with the goal of advocating for our mutual customers.”

Continue Reading

Gadgets

Security researcher successfully jailbreaks an Apple AirTag

Published

on

This weekend, German security researcher stacksmashing declared success at breaking into, dumping, and reflashing the microcontroller of Apple’s new AirTag object-location product.

Breaking into the microcontroller essentially meant being able both to research how the devices function (by analyzing the dumped firmware) and to reprogram them to do unexpected things. Stacksmashing demonstrated this by reprogramming an AirTag to pass a non-Apple URL while in Lost Mode.

Lost Mode gets a little more lost

When an AirTag is set to Lost Mode, tapping any NFC-enabled smartphone to the tag brings up a notification with a link to found.apple.com. The link allows whoever found the lost object to contact its owner, hopefully resulting in the lost object finding its way home.

After breaching the microcontroller, stacksmashing was able to replace the found.apple.com URL with any other URL. In the demonstration above, the modified URL leads to stacksmashing.net. By itself, this is pretty innocuous—but it could lead to an additional minor avenue toward targeted malware attacks.

Tapping the AirTag won’t open the referenced website directly—the owner of the phone would need to see the notification, see the URL it leads to, and elect to open it anyway. An advanced attacker might still use this avenue to convince a specific high-value target to open a custom malware site—think of this as similar to the well-known “seed the parking lot with flash drives” technique used by penetration testers.

AirTag’s privacy problems just got worse

AirTags already have a significant privacy problem, even when running stock firmware. The devices report their location rapidly enough—thanks to using detection by any nearby iDevices, regardless of owner—to have significant potential as a stalker’s tool.

It’s not immediately clear how far hacking the firmware might change this threat landscape—but an attacker might, for instance, look for ways to disable the “foreign AirTag” notification to nearby iPhones.

When a standard AirTag travels near an iPhone it doesn’t belong to for several hours, that iPhone gets a notification about the nearby tag. This hopefully reduces the viability of AirTags as a stalking tool—at least if the target carries an iPhone. Android users don’t get any notifications if a foreign AirTag is traveling with them, regardless of the length of time.

After about three days, a lost AirTag will begin making audible noise—which would alert a stalking target to the presence of the tracking device. A stalker might modify the firmware of an AirTag to remain silent instead, extending the viability window of the hacked tag as a way to track a victim.

Now that the first AirTag has been “jailbroken,” it seems likely that Apple will respond with server-side efforts to block nonstandard AirTags from its network. Without access to Apple’s network, the utility of an AirTag—either for its intended purpose or as a tool for stalking an unwitting victim—would become essentially nil.

Listing image by stacksmashing

Continue Reading

Trending