China’s mobile giants to take on Google’s Play Store

China’s Xiaomi, Huawei Technologies, Oppo and Vivo are joining forces to create a platform for developers outside China to upload apps onto all of their app stores simultaneously, in a move analysts say is meant to challenge the dominance of Google’s Play store. I’m glad Android is open enough to allow alternative application stores to exist, but whether or not non-Chinese application makers would want to partake in a Chinese state-run application store effort is another issue altogether.

Deprecated kernel extensions and system extension alternatives

Just another heads up that kernel extensions on macOS will soon stop working. This has been known for a while, but you might not even know you’re using kernel extensions in the first place. System extensions on macOS Catalina (10.15) allow software like network extensions and endpoint security solutions to extend the functionality of macOS without requiring kernel-level access. At WWDC19, we announced the deprecation of kernel extensions as part of our ongoing effort to modernize the platform, improve security and reliability, and enable more user-friendly distribution methods. Kernel programming interfaces (KPIs) will be deprecated as alternatives become available, and future OS releases will no longer load kernel extensions that use deprecated KPIs by default. If you use macOS, run kextstat | grep -v com.apple to see how many third party kernel extensions you have running. Things like VirtualBox, controller support for Steam, DropBox, Little Snitch, and more all come with kernel extensions, so there’s definitely chances you might be running some without even realising it.

Wacom drawing tablets track the name of every application that you open

I suspect that Wacom doesn’t really think that it’s acceptable to record the name of every application I open on my personal laptop. I suspect that this is why their privacy policy doesn’t really admit that this is what that they do. I imagine that if pressed they would argue that the name of every application I open on my personal laptop falls into one of their broad buckets like “aggregate data” or “technical session information”, although it’s not immediately obvious to me which bucket. Does Wacom have any competitors? Can you even vote with your wallet, or is this yet another market that isn’t really a market at all?

The app that broke the Iowa Caucuses was sent out through an Android test platform

So the Democratic party of Iowa tried to use an untested app to report caucus results during the Iowa primary caucus, and… It went as well as you’d expect. Digging deeper into the app, it should’ve been obvious this was never going to work. In this case, however, it looks like Shadow used a test platform for the app’s public distribution. Installing software through a test platform or sideloading onto your device manually both come with security risks, as app store review processes are designed to discover whether a piece of software is hiding malware or does something behind the scenes it’s not supposed to. In the event you do sideload an app or try installing an unofficial version, your smartphone typically warns you of the risks and asks if you want to proceed. It’s also a less stable model for deploying software at scale, which might explain the difficulty precinct chiefs had in downloading the program. The screenshot from Motherboard also shows that the app was distributed using the platform’s free tier and not its enterprise one. That means Shadow didn’t even pony up for the TestFairy plan that comes with single sign-on authentication, unlimited data retention, and end-to-end encryption. Instead, it looks like the company used the version of TestFairy anyone can try for free, which deletes any app data after 30 days and limits the number of test users that can access the app to 200. What an unmitigated disaster. We’re in 2020 right? Not in 1783?

Some Google Photos videos in ‘Takeout’ backups were sent to strangers last November

With Google Takeout, you can download your data from Google apps as a backup or for use with another service. Unfortunately, a brief issue with the tool last November saw your videos in Google Photos possibly get exported to strangers’ archives. How does this even happen? Too bad companies like this have armies of lawyers and obtuse terms of service to hide behind – since software is a special little butterfly that isn’t held to the same standards as any other product we use – so nobody will ever be held accountable for this.

Is Catalina a good upgrade yet?

We’re now past Catalina’s midpoint: with four versions already released, there’s only three more to go before we prepare for the first release of 10.16. That’s a stark fact, that we’re now at the point where the more cautious should consider whether they’ll run 10.15. Unusually for macOS, there are many Mac users with Catalina-compatible Macs who are no more able to upgrade now than they were back in October. These include the many who still have to rely on 32-bit apps, and those whose Mac doesn’t start up from an SSD. There’s still a lot of trepidation about Catalina, even among the Apple faithful in popular podcasts like ATP.

Britain knows it’s selling out its national security to Huawei

The real reason for Britain’s nonexclusion of Huawei was kept under wraps by its government: fear of retaliation. After Brexit, London sees itself as dependent on Beijing’s goodwill. In an interview with the Global Times on Jan. 20, the Chinese ambassador to Britain made it clear that an exclusion of Huawei would severely damage economic and political relations. And for Johnson, the threats from Beijing—a government with expansive control over its national economy—were more credible than those of U.S. President Donald Trump’s administration. Of course, fear isn’t much of an appealing public justification, especially for someone such as Johnson, who wants to project the image of a fearless leader. That’s why the government has come up with an extensive technical justification for the decision—an explanation that’s full of contradictions. Wait, you mean to tell me that going alone instead of being part of the biggest trade and power block after the US opens you up to manipulation and spying by and subservience to the likes of China and Russia? This should make it clear to the US and the EU that the UK should not be trusted with intelligence data.

UnitySync: this week’s sponsor

We’re very grateful to this week’s sponsor: UnitySync®. For a unified GAL and more, UnitySync helps sync objects between LDAP and cloud directories with this highly scalable and customizable tool. Directory Wizards offers responsive technical support before and after your purchase, as well as other directory tools to simplify directory maintenance. A free evaluation available to test drive your solution. Please visit their website to learn more: https://www.dirwiz.com/unitysync .

USB-IF announces publication of USB4 specification

USB Implementers Forum, the support organization for the advancement and adoption of USB technology, today announced the publication of the USB4 specification, a major update to deliver the next-generation USB architecture that complements and builds upon the existing USB 3.2 and USB 2.0 architectures. The USB4 architecture is based on the Thunderbolt protocol specification recently contributed by Intel Corporation to the USB Promoter Group. It doubles the maximum aggregate bandwidth of USB and enables multiple simultaneous data and display protocols. As the USB Type-C connector has evolved into the role as the external display port of many host products, the USB4 specification provides the host the ability to optimally scale allocations for display data flow. Even as the USB4 specification introduces a new underlying protocol, compatibility with existing USB 3.2, USB 2.0 and Thunderbolt 3 hosts and devices is supported; the resulting connection scales to the best mutual capability of the devices being connected. How many years until USB4 (or later) replaces HDMI and DisplayPort? Since everything is data packets now – analog is a thing of the past – do we really need to have separate video cables? I’d love to one day build a PC that just has an array of USB-C ports on the back, with the ability to plug anything – monitor, keyboard, mouse, serial port adapter for the Windows CE mini laptop I’ve been craving to buy for ages, you know, the usual stuff – into any of the ports. One can dream.

RISC-V OS using Rust

System calls are a way for unprivileged, user applications to request services from the kernel. In the RISC-V architecture, we invoke the call using the ecall instruction. This will cause the CPU to halt what it’s doing, elevate privilege modes, and then jump to whatever function handler is stored in the mtvec (machine trap vector) register. Remember, this is the “funnel” where all traps are handled, including our system calls. We have to set up our convention for handling system calls. We can use a convention that already exists, so we can interface with a library, such as newlib. But, let’s make this ours! We get to say what the system call numbers are, and where they will be when we execute a system call. This is part 7 in a long series about writing a RISC-V operating system in Rust.

EU lawmakers, with eye on Apple, call for common mobile charger

EU lawmakers overwhelmingly called on Thursday for rules to establish a common charger for all mobile device makers across Europe, a drive that iPhone maker Apple has criticised. Members of the European Parliament voted by 582-40 for a resolution urging the European Commission, which drafts EU laws, to ensure that EU consumers are no longer obliged to buy new chargers with each new device. This story is a case of government regulation done extremely well. This whole process started with a voluntary agreement in the industry to standardise on one charger and port, and if they failed, the EU would step in and enforce it by law. This agreement has worked out quite well – first micro USB, now USB-C. However, one popular phone maker decided to not adhere to the agreement, and so, more than ten years after the agreement, and thus ample time for this phone maker to follow suit, the EU will now have to step in. Apple has already moved all of its devices to USB-C, save for one – the iPhone. Now they won’t have much of a choice but to follow along. Much like with RoHS, the rest of the world has only benefited from this push for a charging standard, as anyone who remembers the feature phone and PDA days can only attest to (you should see my mutually incompatible collection of just PDA chargers – I must have dozens of them!). And no, this won’t stifle innovation. This whole process is done in collaboration with the industry and standards bodies, so if newer options come along that the sector wants to standardise on, they can – just as they did with the move from micro USB to USB-C. Apple will just have to suck it up – maybe while they’re at it, they can finally make a charging cable that doesn’t suck?

Google releases open-source 2FA security key platform called OpenSK

Two-factor security is a basic requirement these days if you want to take your digital responsibilities seriously, but some hardware lacks the sort of public documentation that some privacy advocates feel is truly necessary to provide ideal security. Open source enthusiasts will be glad to hear that Google has just announced the release of OpenSK, an open-source implementation for security keys, supporting both FIDO U2F and FIDO2. I’ve always loved the idea of carrying a small piece of hardware to serve as an authentication device, but I’ve never done any serious research into the concept. Of course, and such system would need to be 100% open source, so maybe OpenSK is a contender.

A deep dive into the Apollo Guidance Computer, and the hack that saved Apollo 14

Under hard time pressure, the ground had to quickly figure out what was wrong and devise a workaround. What they came up with was the most brilliant computer hack of the entire Apollo program, and possibly in the entire history of electronic computing. To explain exactly what the hack was, how it functioned, and the issues facing the developers during its creation, we need to dig deep into how the Apollo Guidance Computer worked. Hold onto your hats, Ars readers—we’re going in. Amazing story.

IBM names Arvind Krishna CEO, replacing Ginni Rometty

IBM named Arvind Krishna as chief executive officer, replacing longtime CEO Virginia Rometty. Krishna is currently the head of IBM’s cloud and cognitive software unit and was a principal architect of the company’s purchase of Red Hat, which was completed last year. Rometty, 62, will continue as executive chairman and serve through the end of the year, when she will retire after almost 40 years with the company, IBM said in a statement Thursday. Good luck to the man, I guess. IBM isn’t exactly the most exciting company in the world.

Starlink is a big deal

Today, I watched a SpaceX Falcon 9 rocket leave Cape Canaveral and deliver 60 small Starlink satellites to Low Earth Orbit (LEO) on the Starlink L3 mission. For those not with us last week, SpaceX has a subsidiary, known as Starlink, which is presently endeavoring to blanket the majority of the inhabited latitudes of Earth with orbiting satellites to provide wireless internet access and private-line communications services. This is a Big Deal, the consequences of which I will explain momentarily. But first, some background. Out of all of Elon Musk’s crazy projects, this is the only one that interests me. This project can have huge consequences.

The failure of the iPad

The iPad is now ten years old, and people still have to write articles about how, no, really, you can do real work on an iPad! In 1994, ten years after the Mac was originally introduced, I got my first computer, a Performa 450. Nobody wrote any articles about how, actually, real work on a Mac is possible. Everybody who had a Mac used it for real work. There was no need to write articles about how you could use Macs for real work, because for Macs, it was – and still is – actually true. There are countless people who work on iPads, but the central thread in almost all of the articles and stories about these people is that they involve countless, extensive compromises to make it work – whether that’s resorting to a PC for a lot of tasks, or using complex, hacky Shortcuts to accomplish things any other computer can do without you even thinking about it. I see no reason an iPad can’t be a full, proper computer that can replace many a laptop and desktop, but Apple will need to put some serious weight behind iOS as a platform. The hardware is more than capable – it’s the software that holds it back. The fact we’re ten years into this thing and there’s still no Xcode for iPad tells you all you need to know about how Apple sees the iPad.

Thunderbird’s new home

There was a time when Thunderbird’s future was uncertain, and it was unclear what was going to happen to the project after it was decided Mozilla Corporation would no longer support it. But in recent years donations from Thunderbird users have allowed the project to grow and flourish organically within the Mozilla Foundation. Now, to ensure future operational success, following months of planning, we are forging a new path forward. Moving to MZLA Technologies Corporation will not only allow the Thunderbird project more flexibility and agility, but will also allow us to explore offering our users products and services that were not possible under the Mozilla Foundation. The move will allow the project to collect revenue through partnerships and non-charitable donations, which in turn can be used to cover the costs of new products and services. Thunderbird’s focus isn’t going to change. We remain committed to creating amazing, open source technology focused on open standards, user privacy, and productive communication. The Thunderbird Council continues to steward the project, and the team guiding Thunderbird’s development remains the same. I’m glad Thunderbird and its users found a way forward for the application, but I’ve never been a fan of these complex, overloaded e-mail/groupware applications like Thunderbird, Evolution, and Kmail. I use Geary because it focuses on one thing and does it well – e-mail – and it doesn’t try to also do all sorts of stuff I don’t want an e-mail client to do. As a side note, KDE could really use a Geary-like simple e-mail client – because Kmail is not in a great state.

KnightOS was an interesting operating system

KnightOS is an operating system I started writing about 10 years ago, for Texas Instruments line of z80 calculators — the TI-73, TI-83+, TI-84+, and similar calculators are supported. It still gets the rare improvements, but these days myself and most of the major contributors are just left with starry eyed empty promises to themselves that one day they’ll do one of those big refactorings we’ve been planning… for 4 or 5 years now. Still, it was a really interesting operating system which was working under some challenging constraints, and overcame them to offer a rather nice Unix-like environment, with a filesystem, preemptive multiprocessing and multithreading, assembly and C programming environments, and more. The entire system was written in handwritten z80 assembly, almost 50,000 lines of it, on a compiler toolchain we built from scratch. The things people can squeeze out of these limited devices astounds me every single time.

Installing NextStep OS (OpenStep) in VirtualBox

I’ll be setting my system up on a Windows machine, but you could just as easily set it up on a macOS or Linux machine. When I first attempted this install, I used VMware Workstation 14 Pro for Windows. After going through most of the installation process I couldn’t get OpenStep in to a color screen mode no matter how much I tried. I eventually found out that VMware Workstation doesn’t support the proper VESA display modes, and try as you might you’ll get an error on boot that says “VESA Mode Not Supported.” Fortunately, Virtual Box – which is cross-platform between Windows, macOS, and Linux and completely free – does support the proper VESA mode and works great for the installation of OpenStep. Still, there are some quirks when setting up your VirtualBox VM initially. The VM must have 1 processor with 1 core, 64MB of RAM, and a 2.0GB hard disk on an IDE controller. You will need to configure one IDE CD-ROM drive and one floppy drive. The hard drive must be at IDE 0:0 (Primary Master), and the CD-ROM drive must be at IDE 0:1 (Primary Slave). You will have to edit the properties of the VM upon creation to ensure you adhere to these standards. All other default options of the VM during the creation wizard can be left alone. NextStep is a lot of fun to explore and play around with, since you can clearly see the early days of Mac OS X in there, for obvious reasons. It’s definitely worth it to set an evening apart and follow this tutorial.