Today’s Tech Sightings:
Kim Jong Un Has His Own Cellular Network
According to a former technical director at North Korea’s cellular network Koryolink, Kim Jong Un and other high-ranking officials have their own private cellular network to secure their communications. The 3G network, according to the source, has its own algorithms and operating system.
Many Apps Bloom in China as Millions Use Phones to Bank
Digital finance is making strides in China as technology companies push financial apps to attract a market with 1.3 billion people to bank on mobile, instead of relying on the country’s clunky traditional banking system. And according to consulting firm Accenture, up to 390 million people in China have registered to use mobile banking, with Alibaba and Baidu’s digital wallets leading the way.
10 Surprising Things Technology Will Make Obsolete by 2025
The dizziying pace of technological progress is quickly changing how everything works in the world we know. Writer Evan Dashevsky offers 10 things he projects will be obsolete by 2025.
Google Gives World a Peek at Its Secret Servers
Using off-the-shelf hardware parts, Google built an impressive array of servers to keep with the massive growth in its search business. The company’s Jupiter Network, for example, deliver a petabit per second of total throughput.What that means is that each of the network’s 100,000 servers can communicate at a speed of 10Gb/s – 100 times faster than its 2005 first-generation network.
New Data Uncovers Surprising Predictability of Android Lock Patterns
Seems like whatever you do, you can’t win the cybersecurity race. In a recent study of Android lock patterns (ALPs), Marte Løge, a 2015 graduate of the Norwegian University of Science and Technology, found that new ALPs follow the same predictable rules as their predecessors, with minimum complexity, making them easy targets for hackers.
Researchers Can Steer Emails Away From Hostile Nations
Nothing is private on the Internet. That includes email traffic passing through countries that censor data. But researchers at the University of Maryland have come up with a system called Alibi Routing, which allows data traffic to bypass certain regions, using peer-to-peer routing.
Everything You Say, Do Is Public: Five Rules for Living With the Internet
Millions of marriages could be devastated as a result of Wednesday’s hacker dump of the personal information of more than 30 million people who use the adultery dating website Ashley Madison. You might not be one of those people, but being on the Internet means you have to keep certain things in mind.