Headline

The value of network signal strength in smartphones may disappear with Android P

It seems that Google has communicated with mobile operators, and in Android P (9.0) will introduce a rather controversial change. It is about turning off the option of showing the signal strength of the network.


It seems that Google has communicated with mobile operators, and in Android P (9.0) will introduce a rather controversial change. It is about turning off the option of showing the signal strength of the network.
A group of people with XDA Developers found an intriguing change in the Android Open Source Project software, most likely enforced by a small group of American mobile operators. It's about a modification that in smartphones of selected operators in Android P (9.0) will allow you to hide the signal strength values. How does it work now?
The value of the network signal power is shown in the settings of each Android smartphone (Settings -> About phone -> Information about the phone (Status) -> SIM card status) and is expressed in dBM. dBm is the logarithmic unit of measure of power related to the power of 1 mW. The power expressed in dBm informs about how much decibel this power is greater (or lower) than the power of 1 mW. For example: -100 dBM is a signal weaker than -77 dBM. This is illustrated by the graph below, on which you can see how many "bars" of the signal power illustrate a given signal strength range.
It seems that Google has communicated with mobile operators, and in Android P (9.0) will introduce a rather controversial change. It is about turning off the option of showing the signal strength of the network.

Most of you do not even pay attention to the signal strength, but it is a pretty good indicator of how the quality of connection with different networks on the same device looks like in different places. Alternatively, it gives a good view of the connection quality offered by different devices in the same place, using one SIM card. Why would the network operators want to hide this parameter? Here you can speculate forever.
The easiest way would probably be to assume that operators want to hide the signal strength due to shortcomings in their infrastructure. An uninformed user is in the end a user submitting fewer complaints about the service. In fact, no other rational explanation comes to my mind, and you?
Interestingly, the people responsible for finding changes informed that the programs enabling the measurement of the connection quality will continue to work properly, despite the introduced change. The signal strength will not be visible in the settings menu and can potentially be removed from the upper notification bar, but selected applications can still use the API and "pull" this information on top. The question is whether this function will not be blocked soon.
Source: XDA

Enable / Disable Graphics Video Card in 15-inch MacBook Pro 2016/2017

The MacBook Pro 2016 and 2017 ( Touch Panel ) 15-inch display come with a separate graphics card (Graphics Card), In addition to "On Board", Intel HD Graphics Card. 
Radeon Pro 555 ,graphics processor

I have seen that many users have bought their first MacBook Pro or those who have upgraded from the older model, I'm a little confused about how to make a dedicated graphics card . Others are accepted in error, and in " About this Mac ," " Graphics, " your graphics card does not appear as present on the MacBook Pro.
In our case we are dealing with the MacBook Pro (15-inch, 2017) , a graphics card Integrated graphics card Intel HD 630 and the discrete graphics card Radeon Pro 555 .
If you go to Apple's logo → "About this Mac ", the La tab ul "Overview" one obviously can not be seen than Intel HD Graphics. No tracks on Radeon.
"On Board", Intel HD Graphics Card.
This is caused at this point, the system uses graphics cards . It is not necessary for its operation. 
When you open Adobe Photoshop (and we have it set to use a graphics processor ), the dedicated graphics card will automatically start working, and it will be present in "About this Mac ".
So, on MacBook Pro with MacOS high Sierra, the graphics processor works only if it is needed.

So, on MacBook Pro with MacOS high Sierra, the graphics processor works only if it is needed.
How to activate a permanently dedicated graphics processor / dedicated graphics cards on MacOS high Sierra
I do not know why someone would like the highest graphics performance when you do not need them But if you want to do this, you can activate a standing graphics processor from: Uncheck System Preferences → Energy Saving →: " Automatic Graphic Switching ".
Auto Switching Graphics It's an Exquisite Trying
Note, however, that once a dedicated graphics card is activated, the battery usage time will drop significantly .
Auto Switching Graphics It's an Exquisite Trying, How It Will Help You Allow Your MacBook To Use Your So Many Time When Not Connected To Power Source. MacOS management graphics cards and turn them on and off only when needed, Save a lot of battery.

Enable / Disable Graphics Video Card in 15-inch MacBook Pro 2016/2017

Google Chrome without ads. New settings from February 15

In February 2018, Google will allow default ad blocking in the Chrome browser. For now, this tool will allow you to turn off only the most annoying creations. This, however, can change.
In 2018, browser users will be able to disable, among others pop-up windows.

In 2018, browser users will be able to disable, among others pop-up windows. (East News)


According to Google, the company will introduce new facilities next year, in the interest of the user.
The new functionality will allow default blocking of ads in the Chrome browser - not all of them yet, only the most aggressive and invasive for Internet users.
Invasive ads include those that do not meet the requirements of the Coalition for Better Ads initiative.
What will really change? Quite a lot for both users and publishers. Google approaches invasive advertising quite restrictively. If at least one of your ads is found to be annoying and obstructing your users, all promotional ads on your site will be blocked.
Publishers will have time to react. If one of the ads on their site is found to be non-compliant with Coalition for Better Ads, they will be able to remove it or adjust to the appropriate standards.

LiberiOS: the iOS 11 jailbreak is available even on iPhone X

LiberiOS The iOS 11 jailbreak is finally available, after weeks of shortages and a fabulous hope since the discovery of fault in iOS 11.1.2 by Google. A few days ago, Masri proposed a jailbreak tool for developers while announcing a consumer version by Morpheus (Jonathan Levin). It is now done with LiberiOS which is the tool to jailbreak iOS 11 until iOS 11.1.2


Here's how to jailbreak iOS 11 on iPhone X, iPhone 8, iPhone 7, iPad Pro, iPad Air 2 and others:

After H3lix for 32-bit devices under iOS 10.3.3 and LiberTV for TvOS 11 , here is the third Christmas jailbreak 2017. A madness! 
Based on  To.Panga , LiberiOS obviously uses the security holes unveiled by Ian Beer from Google. For the record, Apple has plugged the flaw since iOS 11.2.

 Attention, LiberiOS does not include Cydia because it is not yet compatible but Saurik works there . In addition, Jonathan Levin said that an update will correct this.

Read Also: Apple unveils list of slowdowns of the iPhone affected by #BatteryGate

HOW TO JAILBREAK IOS 11, EVEN ON IPHONE 8 AND IPHONE X 

Here's how to jailbreak iOS 11 on iPhone X, iPhone 8, iPhone 7, iPad Pro, iPad Air 2 and others:


  • Download the IPA file directly on  the LiberiOS website
  • Download Cydia Impactor on your PC / Mac  
  • Connect your iPhone to USB 
  • Open Cydia Impactor
  • Drag the downloaded IPA into Cydia Impactor
  • Enter your Apple ID (email) and password to generate a certificate for installation. If you have an Apple Developer Account, your certificate will be valid for 1 year, if not 7 days. Once you have access to Cydia.
  •  After installation, accept the certificate by going to Settings> General> Profile Management and make "trust". 
  • Open LiberiOS on your iPhone / iPad and launch the jailbreak! 


While waiting for the beta 2 of LiberiOS, you have an open device with full access to the entire system including SSH. 

Apple unveils list of slowdowns of the iPhone affected by #BatteryGate

#BatteryGate has updated a strange strategy of Apple that bridles the performance of iPhone whose batteries have a certain age, the company Tim Cook does not sit idly and returns to the charge for the third time this week.


#BatteryGate has updated a strange strategy of Apple that bridles the performance of iPhone whose batteries


 After explaining the reasons for this management  (the iOS system "protects" the components of a sudden extinction) and a battery change offer to 29 $ , Apple details the effects of this clamping in case of low battery.

 For the record, this affects the iPhone 6 and iPhone 6S for the most part.


A PAGE SPECIFICALLY DEDICATED TO #BATTERYGATE

 Apple has just added a page dedicated to this problem of power management and batteries  at this address .  

 THE MOST VISIBLE CASES 

  • Slower application launches
  • Lower frame rates when scrolling
  • Backlight dimming (which can be canceled in the control center) 
  • Speaker volume reduced to -3 dB
  • Gradual reduction of frame rate in some apps
  • In the most extreme cases, the camera's flash will be disabled,
  • and this will be indicated in the camera's user interface 
  • Apps that refresh in the background may need to be reloaded at launch 

CASES LESS VISIBLE (BUT NOT LESS TROUBLESOME) 

  • Mobile call quality and network throughput performance 
  • The quality of captured photos and videos 
  • GPS performance 
  • The accuracy of geolocation 
  • The accuracy of the sensors: gyroscope, accelerometer, barometer 
  • Apple Pay slower Gift, Apple gives some tips to keep a battery healthy

 HOW TO MAXIMIZE BATTERY PERFORMANCE

The battery life is how long your device can work before needing to be recharged. What is known as "battery life" is the total life of your battery before you need to replace it. One factor that affects battery life and battery life is all the things you do with your device. No matter how you use it, you can make improvements. The life of a battery is a function of its "chemical age", which is more than just the passage of time. It brings together different factors, such as the number of charge cycles and maintenance that the battery has received. Follow these tips to maximize battery performance and extend its useful life. For example, when you store your iPhone for a long time, store it half full. Also, avoid charging your iPhone in a hot environment, or exposing it to high temperatures or leaving it in the sun for long periods of time.

How to protect your personal data on the Internet

protect your personal data on the web

But the most important is surely the protection of our personal data. We will see today the 3 most common ways to protect you.

In a world where the presence of digital is ubiquitous in everyday life, we must pay attention to all our actions on the Internet. But the most important is surely the protection of our personal data. We will see today the 3 most common ways to protect you.


This is an understanding course and not a tutorial for implementing the presented solutions.

Private navigation, but not so much

For starters, a browser is a program that interprets data received through the network through clicks, addresses, or searches.

For ease of navigation, it will remember the pages visited, cookies (the equivalent of a small text file stored on the user's computer) It allows site developers to retain user data to to facilitate their navigation and to allow certain functionalities ). It keeps this data (including images) in its temporary files (the cache). So when you return to the site, the images do not need to be retrieved and the site opens faster.

So be aware that spyware located between your computer and the website server can potentially capture all your data.

"Okay, but how does private navigation work and what does it serve? "
The impact of private browsing is local, so it has a direct impact on what's happening on your computer but not on the Internet.

At first, and the use for which people discover private browsing, it is so that other users of the device can not follow your activity.

During a private browsing session, the browser does not record your browsing history or the information entered in the forms. Cookies and site data are saved as long as your browsing session is active and then deleted.

Your navigation is private only if you use a private browser window.

BUT BEWARE !!!

Your activity is not secure
When using incognito mode, the browser does not record your browsing activity. However, your activity may remain visible for different Internet players:
  • the websites you visit , including ads and resources used on those sites
  • your employer, your school or the administrators of the network you use;
  • your Internet service provider.

The web proxy (http)

During an Internet search, your computer is directly connected to it through your box. It is he who will reach the pages as in the diagram below:

The problem of this operating system is precisely that it is directly connected to the Internet and at the same time, directly exposed to threats.

This is where the usefulness of the "proxy" will make sense! As a protector, it will come between your computer and the Internet.

Well, if you put a proxy server between your computer and the Internet, the schema will change slightly:

"  What is it going to serve?  »Will you say to me ...

Well, if you put a proxy server between your computer and the Internet, the schema will change slightly:
  • Your computer is connected to the proxy server,
  • The proxy is directly connected to the Internet,
  • The pages you request go through the proxy server,
  • The proxy will search for the page you request, on the Internet,
  • The proxy sends you the requested page.
Thus your computer has access to Internet services but it is not directly connected to it. The proxy comes as an intermediary. At this moment, the browser knows only one address, that of the proxy  !

Advantages :
  • Anonymous surfing: This is not your address that is seen on the sites, but the proxy address . You are thus "almost anonymous" or "completely anonymous".
  • Protection of your computer: you are not directly exposed to the Internet, it is an additional security in case of attack.
  • Anonymous connection location : The proxy may be in a different country than yours. When connecting to a site, it is the geolocation of the proxy that is seen. This can be useful on some sites that filters connections after geolocation.
  • Filtering: As all requests and responses go through the proxy, it is possible to filterwhat is allowed to go out or to enter.

The inconvenients :

If there are advantages, there are also disadvantages. As we have seen above, it is he who is the intermediary between you and the web, so he sees and can record everything that goes between your computer and the web, it can be risky! Just imagine that the person who manages this server is malicious. It has access to all of your browsing history.

If you use a proxy, it must be flawless because when you connect to your bank, your proxy could very well register your codes (even if they are issued in https feeds)! So you have to use a proxy so you are sure, or not use it.

If the proxy server is very busy (especially true for those who are free), it will take longer to respond, so browsing through a proxy is a little slower than direct surfing on the Internet.
You have to choose between security and performance!

The Virtual Private Network (VPN)

What is a VPN?

Your IP address and your location are "untraceable"

A VPN can hide your IP address and your location. Locate yourself in the United States, the United Kingdom, Australia or the network location of your choice and it is an IP address of this country that will be visible on the network.

Encrypted communications

A VPN always uses encryption (more or less depending on the VPN) to protect your data from prying eyes. So you can connect without apprehension from any free wi-fi access point by staying on a secure connection.
Advantages :
  • Your Internet Service Provider (ISP) no longer has access to your browsing data (unlike proxy)
  • The website does not have access to your real IP address (protects against targeted advertising ...)

Disadvantages:
  • The VPN can have access to your navigation data if it wants
  • Slowness of navigation due to encryption when sending data and returning
For me, I think that the service of a VPN is the easiest to use, it is often enough to simply download an application, choose the country of the VPN server and click on a button "Connect" and it is party for private navigation!

What you should know about Namib GNU / Linux

Namib GNU / Linux : Laurent Rabez submits his discovery of a new GNU / Linux distribution with a GNU / Linux based graphical installer based on ArchLinux. All the details and his experience.

Namib GNU / Linux : Laurent Rabez submits his discovery of a new GNU / Linux distribution with a GNU / Linux based graphical installer based on ArchLinux. All the details and his experience.
Namib GNU / Linux : Laurent Rabez submits his discovery of a new GNU / Linux distribution with a GNU / Linux based graphical installer based on ArchLinux. All the details and his experience.

As with most other GNU / Linux distributions. Here you - the user - are the center of interest, we do not try to make money, sell your data or take control of your machine. "
Namib is a user-friendly and open-source Linux distribution. It offers all the benefits of state-of-the-art software, combined with a focus on usability and accessibility, making it suitable for newcomers as well as experienced GNU / Linux users.

Namib GNU / Linux : Main Features:

Simplified and easy 
to install 
Pre- installed desktop environment Pre- installed graphics applications to easily install software and update your system 
Pre-installed codecs for reading multimedia files 
Accessing the latest software version 
Accessing the Arch User Repository (AUR) for more experienced users
It's a new distribution based on Arch Linux It's called Namib GNU / LinuxIt only offers the desktop MATE only in 64 bits. It has a graphic installer, Calamarès. The rolling release system means that there is only one version of Namib GNU / Linux that updates over time and that the user does not have to reinstall the system regularly.
Namib GNU / Linux : Laurent Rabez submits his discovery of a new GNU / Linux distribution with a GNU / Linux based graphical installer based on ArchLinux. All the details and his experience.

The installation of Namib GNU / Linux is done quickly and very easily.

The MATE desktop comes with the theme of windows and Numix controls and Arc icons. The presentation of MATE is with a dashboard at the bottom and a classic menu. The cast is perfectly translated into French.
The software is recent; the very classic library. A 4.12 kernel, the most recent kernel this day (early October 2017). The distribution is stable as much as PCLinuxOS. Another myth that collapses on the instability of rolling release. Pacmac is a package manager used primarily developed by Arch Linux developers. It is used to install, upgrade, configure and remove software (ie to manage software).
Software search and installation
Search Pamac in the menu of your application and open it. Browse the list by categories or search using the search bar. Right-click on the entry and select install. Click the apply button or a button with a check mark
Personally, I added some additional software in graphics with this software manager: k3b caliber ufraw-gimp ufraw glabels darktable gramps filezilla inkscape audacity sigil kdenlive psensor clementine transmageddon ffdiaporama youtube-dl qopenvpn qtox blender gthumb testdisk bleachbit.
We find the deposit AUR (Arch User Repository) to expand the repository significantly (but not active by default).
The deposit of the specific distribution of Namib is placed at the end of the list of deposits, so it does not take precedence over the official deposits of the distribution. It contains just a dozen software.
Last advice? Update at least once a week.

Eelo project is going to provide an alternate mobile operating system


eelo-project-is-going-to-provide-an-alternate-mobile-operating-system
Eelo project is going to provide an alternate mobile operating system and associated web-services, including email, cloud storage space, online office tools... eelo will be for everyone, with a much better value of his personal data privacy. eelo is an open up source, and non-profit task in the public interest.
Gael Duval, the daddy of Linux Mandrake, has launched a new project called EELO, which wants to be a response to an increasingly closed IOS and an Android that continues to suck our data.
Eelo will offer an operating system for smartphones and associated web services, including email, cloud storage, online office tools ... eelo will be aimed at the greatest number, and will focus on better protection of personal data. eelo is an open-source project, non-profit, and in the public interest.
Eelo project  will be derived from LineageOS (an operating system that replaces Android on my phone, and eliminates the need for Google services) and will use existing bricks (such as F-Droid and APKPure).
The MicroG project - which replaces Google libraries (all the little bits of code that make it possible to run the GPS, wifi, sms) by free libraries - will probably also be integrated.
The default search engines could be Qwant and DuckDuckGo. And we imagine that most applications based on free (OpenStreetMap, LibreOffice, NextCloud) will be integrated natively.
The system will not use Google's DNS. For those who do not know what a Domain Name System (DNS) is, you have to see it as a directory. When I write an address in my browser (www.tkpx.eu for example), the DNS will look for the IP address which is associated with the domain (in the case of my site, it is 217.70.184.38), for then to show me the right page. This prevents Internet users from memorizing these series of numbers. However, Internet service providers (and Google too) can "lie" when asked to access a site. We are talking about a liar DNS, which will send us back to a different page, pretending that the site does not exist, or that it is blocked.
So here is a nice project to support via Kickstarter by following this link !

YouTube deletes more than 150,000 children's videos


YouTube deletes more than 150,000 children's videos

YouTube  has erased tens of thousands of children's videos that were accompanied by very inappropriate comments, even pedophile, said Thursday the platform that tries to reassure its advertisers.

Everything started with an article published last Friday in the British newspaper The Times claiming that ads for major brands (Adidas, Amazon or Mars in particular) appeared on YouTube alongside videos of children or teenagers, most often innocently published by those concerned but arousing pedophile comments from users.

According to other media, several advertisers have decided to stop placing ads on YouTube for this reason. The American computer group HP has confirmed to AFP "have immediately asked Google to suspend all advertising on YouTube."

When asked, YouTube said it had "removed several hundred accounts and more than 150,000 videos" that were problematic. The platform owned by Google, whose digital advertising represents the bulk of revenue, also banned advertising on "over 2 million videos and 50,000 channels that were family content but were not." The company also blocked "comments for 625,000 videos".

Read also: 20 Most Interesting Websites Kill Your Time On The WEB

"We have clear policies against videos and comments on YouTube that sexualize or exploit children, and we apply them drastically every time we are alerted to such content," said a spokesperson for YouTube.

Not the first time

The site claims to have "recently strengthened (its) approach to videos and comments featuring children who, although they would not be illegal, remain concerned".
Asked whether the platform was being boycotted by some advertisers, the spokesman simply replied that "no advertising should be broadcast on this content and we are working to remedy this situation as soon as possible".

This is the second time this year that YouTube is facing this type of controversy. An article in the Times already said in the spring that ads were placed close to anti-Semitic content, inciting hatred or apologizing for terrorism.

Google then promised that it would ensure that the ads of its advertisers are not placed near polemical content.

The British subsidiary of Havas, the HSBC or the BBC and even the British government, among others, later joined in the United States by AT & T or Verizon, had decided to suspend their advertising on several Google platforms, including YouTube.

Wireless charging for electric cars


Presentation of the principle of wireless charging to solve the problem of autonomy of connected electric cars

Wireless charging electric cars: Presentation of a technology still in the prototype stage, which could well develop in the future to solve the problem of autonomy of electric cars. Current electric vehicles
With the announcement of the French Government to no longer sell cars by 2040 (neither gasoline nor diesel), it will be necessary to find an alternative to the current means of transport. Today, everyone imagines a future made of electric vehicles but nobody wants to recharge his car with a cable after each trip. If the autonomy tends to improve, we are still far from being able to cross France in Renault Zoe without waiting tens of hours next to the charging station. The solution would it then to find an alternative solution to fill the battery of his car?
If the current BMW i8 is a hybrid sports car with only 37km of autonomy with its electric motor, prototypes come out of Munich with the ambition to revolutionize the use of the electric carThe German sports coupe has already demonstrated wireless induction charging and magnetic field
Presentation of the principle of wireless charging to solve the problem of autonomy of connected electric cars

Thus we may soon have charging bases placed on the ground or integrated on the surface of a parking space or garage. It will obviously be necessary to define standards that all manufacturers will have to apply in order not to kill a promising technology in the first place.
And here's how wireless charging works on a BMW i8 in the Form E safety car, thanks to a Qualcomm Halo charger. This video in English popularises the technical terms and it is possible to choose the subtitles translated into French to better understand.