How smartphones became our personal portable data banks

During last couple of decades, it is stating the obvious to say that mobile telecommunications has entirely changed the world we live in. Over this period we have gradually switched from handwritten paper contact notebooks to electronic contact records in our mobile phones, however it is not only the phone numbers we store in our phones anymore: with the development of smartphones, they became or own personal data banks.

Alongside the contacts, our small electronic friends now store so much data (passwords, photos, music, sometimes even medical records and biometric parameters etc.) that losing our device would most likely be a total disaster for one’s day-to-day routine. Some people even don’t remember their passwords from social media accounts, because their phones keep them securely stored in their memory.

Loss of that sensitive data may be a problem, but it is transfer to another device is even more problematic.

Everyone has, least once in their life, switched from one mobile phone to another. Back in 2000’s it wasn’t such a big deal: you switched the SIM card and all your data is easily transferred to the new phone. Those were the good old days when the contacts were stored on the SIM card and there was no hassle with gigabytes of photos and music. These earlier phones pretty much were meant to ring and exchange texts back then: no cameras, no players, not even mentioning the mobile internet.

It was later in 2006-2007, when the smartphone market started to emerge, the problem of data transfer between two devices became bigger when different mobile operating systems decided to develop in completely different directions.

By the beginning of 2010’s it became obvious that data transfer between Android and iOS devices became so difficult and time consuming, that leading developers could not ignore consumers’ complaints anymore, and a revolutionary step was taken.

 As one of the market leaders and most innovative consumer electronics companies, Apple made iPhone owners’ life easier, by launching of the “Move to iOS” app that provided an easy way to move contacts and other data from an Android phone to an iPhone.

Google, as Apple’s biggest rivals on mobile operating systems market, developed similar technology in their own mobile device, called Pixel. They even included a dedicated adapter to make data transfer procedure easier.

According to Google, the new Pixel phones ship with a dedicated Switch capability that allows users to transfer contacts, calendar events, photos, videos, music, SMS messages, iMessages and more from one device to the other. Quick Switch Adapter technology is a dedicated On the Go adapter that is shipped within the Pixel box, which Google confirms within its Pixel specs.

Google describes the switch as a three-step process. Older phones have to run on Android 5.0 and up, or iOS 8 and above for iPhones.

If data has to be transferred from an older Android phone, the process is relatively simple. For iPhone users, they turn off iMessage and FaceTime, then remove the SIM card. Then it is required to sign into your Google Account from the Pixel. Finally, Google will ask the user to select what data needs to be imported.

Once that’s all decided, Google takes over and migrates the requested data. It’s as simple as that.

These developments are a great example of how consumers benefit from a healthy market competition and innovative thinking about how to secure personal data that smartphones carry nowadays. Anyone who is somehow related to IT industry will tell you: ALWAYS do backups of your data. No matter how secure you think all the cloud technology systems and personal hard drives are, just remember one thing: once data is lost – it is lost forever.

Therefore, as a conclusion to this article, we at Falcon Technologies International strongly recommend to use dedicated archival optical media solutions to store all the sensitive and valuable data, that you would like to keep secure for a long time. It doesn’t take too much time to burn couple of DVDs, but it will ensure that your data is insured.

GITEX Technology Week in Dubai

In search for future technologies that can enable companies to achieve efficiency and cost effectiveness for business? Well, the 36th Gulf Information Technology Exhibition (Gitex) provided just that.

This 5 day event opened its doors from Sunday 16th October, 2016. It was the largest ICT exhibition in the Middle East, Africa and South Asia, that took place at Dubai world trade centre. The event was inaugurated by Shaikh Hamdan Bin Mohammad Bin Rashid Al Maktoum, Crown Prince of Dubai and Chairman of the Dubai Executive Council.

 

1

 

So, what was the Gitex technology exhibition all about? This event showed live demonstrations of future generation technology solutions from various government and international companies that can transform Middle East businesses. Key industry verticals of marketing, healthcare, finance, intelligent cities, retail, education and energy were discussed by industry leaders.

Over 200 investors and influential tech investment companies from Silicon Valley, Europe, Asia and the Middle East, including SoftBank Group International, 500 Startups, and many other venture partners arrived in Dubai to explore, evaluate and potentially fund start up businesses with talent. These ventures also included globally giant investors like Facebook, Dropbox and Spotify.

Key highlights included a large indoor VR activation powered by Samsung logo, Game-changing tech from 4,000 solution providers including AR, VR, AI, Wearables, Drones and more. GITEX Startup Movement examined the global startup movement featuring 350+ breakthrough startups from 52 countries. Customized networking programmes were also on offer for startups to discover how global contemporaries have been there, done that and created an impact.

In today’s era of technology, there is an ever increasing need for entrepreneurs to harness technologies that can enable companies to achieve efficiency and cost effectiveness. FTI has always believed that a strong culture of innovation, in all areas of the company, is an essential contributor to business success. FTI prioritize R&D and technology over cost, as we firmly believe that these functions are critical to ensure our products represent the best quality within the optical media industry.

In line with new innovation for business and services Dubai’s Roads and Transport Authority (RTA) showcased a smart streetlight system at GITEX 2016. According to Eng Maitha bin Adai, CEO of RTA’s traffic and roads agency, there are three systems showcased at Gitex this year and this combination of systems will help sustain green economy requirements by reducing carbon emissions. These systems include the Central Wireless Road Lighting Control System that sets multiple synchronized timetables for dimming streetlights. “A new feature in the smart lighting system is a tentative WiFi service installed in Dubai Water Canal at Sheikh Zayed Road.

 

2

 

RTA also displayed high-definition pedestrian detection camera systems with a twist. These new generation cameras produce pedestrian statistics in terms of number, sex, and age group.

Dubai Customs‘ Smart Virtual Agent initiative was also showcased at GITEX 2016. This venture represents a smart channel for communication with customers, which allows their queries about customs services, procedures and regulations to be answered more efficiently. Without the need for any physical employee the Smart Virtual Agent is an intelligent tool which operates 24/7. This cost effective measure helps efficiently redirect resources to other duties by reducing support cost. The self-improving platform utilizes Dubai Customs’ database and memory of similar cases to answer customer inquiries.

Many GITEX visitors had the opportunity to try out the Smart Inspection Glasses on display at the Dubai Customs stand. These tech heavy glasses facilitate containers’ field inspection, as customs inspectors can browse the customs declaration and x-ray images of the shipment simultaneously as well as its risk level. Inspectors can submit inspection reports using either the virtual keyboard or voice input feature.

 

3

 

Furthermore Dubai Customs showcased 8 happiness-led initiatives and innovations under the umbrella of Ports, Customs and Free Zone Corporation pavilion. Other innovations included the Authorized Economic Operator, Smart Inspection Lab, Smart Customs Route, Bags Smart Customs Inspection System and the Endangered Species Exhibition.

Five seminal trends have caught the eye at this Gitex event namely; Robotics and artificial intelligence (AI), Biometrics, 3-D Printing, Mixed reality and drones. With artificial intelligence on the rise and the need for huge amounts of data to be stored, the progression and development of cloud storage is on the horizon. Cloud storage is a cloud computing model in which data is stored remotely on servers accessed from the World Wide Web, or “cloud.” Storage servers are built on virtualization techniques all maintained, managed, and backed-up online.

The technology world is increasingly realizing that Optical Digital Media is a safer way to store data compared to cloud technology solutions – this is evidenced by multiple data breaches where personal photographs and other information has been hacked and distributed to the public, and by the fact that Facebook has publicly stated that they have chosen to store their data with Optical Digital Media rather than cloud.

Falcon Technologies International (FTI) leads the way with regard to Optical Digital Media security and memory technology, and is conducting potentially ground-breaking research in this field with academic partners.

Cloud Storage Leaks – A Serious Issue Affecting Personal Data Security.

Smart cloud-based storage technologies such as Apple’s iCloud, Google’s Drive, Dropbox and many others available out there have become part of our daily activities, both in our personal and professional lives. It is certainly very convenient to have all your files stored somewhere “in the cloud” and accessible from al the devices connected to the Internet (well, literally any device – everything is hooked up to the web nowadays – right?) It is certainly a great technology that makes our life so easier, but in the euphoria of excitement we maybe forgot about one of the major issues with “clouds” – their security. The area where most of the consumer-oriented cloud-based storages is still very vulnerable.

 

Cloud-based storage is usually an array of hard discs connected to a high-speed Internet channel
Cloud-based storage is usually an array of hard discs connected to a high-speed Internet channel

 

On August 31, 2014, a collection of almost 500 private pictures of various celebrities, mostly women, were posted on the 4chan image board, and later disseminated by other users on websites and social networks. The images were believed to have been obtained via a breach of Apple’s cloud services suite iCloud, but it later turned out that the hackers could have taken advantage of a security issue in the iCloud API which allowed them to make unlimited attempts at guessing victims’ passwords. On September 20, 2014, a second batch of similar private photos of additional celebrities was leaked by hackers. Less than a week later, on September 26, a third batch was also leaked.

The leak prompted increased concern from analysts surrounding the privacy and security of cloud-based services such as iCloud—with a particular emphasis on their suitability to store sensitive, private information.

 

Due to a targeted attack, tens of celebrities became victims of hackers.
Due to a targeted attack, tens of celebrities became victims of hackers.

 

Apple reported that the leaked images were the result of compromised accounts, using “a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet”.

In October 2014, the FBI searched a house in Chicago and seized several computers, cell phones and storage drives after tracking the source of a hacking attack to an IP address linked to an individual named Emilio Herrera. A related search warrant application mentioned eight victims with initials A.S., C.H., H.S., J.M., O.W., A.K., E.B., and A.H., which supposedly points to stolen photos of Abigail Spencer, Christina Hendricks, Hope Solo, Janette McCurdy, Olivia Wilde, Anna Kendrick, Emily Browning and Amber Heard. According to law enforcement officials, Herrera is just one of several people under investigation and the FBI has carried out various searches across the US.

A more recent incident happened in the UK, where one of the major tabloids reported that it was offered private images featuring the Duchess of Cambridge’s sister Pippa Middleton. It was said that the images also feature Duchess’s children, Prince George (the future King of England) and Princess Charlotte.

The Police are investigating the case, their main lead being iCloud account hack. It is also said that the leak includes approximately 3000 private photographs that were stored on Pippa Middleton’s iCloud account.

 

Keeping your sensitive data safe - the only way to prevent being hacked.
Keeping your sensitive data safe – the only way to prevent being hacked.

 

As you can see from the facts and the events described above, cloud-based storage solutions are certainly not the most reliable data storage solutions. They are very flexible and accessible from any device, but it is important to keep in mind that sometimes they may be accessed by unauthorised parties, that may use sensitive and private information against its holders.

One of the reasons why offline data storage is still used today is that some information sources are containing data that should be stored offline due to security reasons. Private images, spreadsheets with secret data, classified investigation files and many other kinds of sensitive information will never be accessed by any hacker in the world if it is stored on optical disc that is locked down in the safe. There is no way it could be accessed, unless the disc is in physical possession of the person that wants to access the data. And physical access to the information is easier to control.