Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×
Medicine

Scientists Develop a Breathalyzer That Detects 17 Diseases With One Breath From a Patient (qz.com) 99

randomErr quotes a report from Quartz: In the last 10 years, researchers have developed specific sniff tests for diagnosing tuberculosis, hypertension, cystic fibrosis, and even certain types of cancer. A group of global researchers led by Hossam Haick at the Israel Institute of Technology have taken the idea a step further. They've built a device -- a kind of breathalyzer -- that is compact and can diagnose up to 17 diseases from a single breath of a patient. The breathalyzer has an array of specially created gold nanoparticles, which are sized at billionths of a meter, and mixed with similar-sized tubes of carbon. These together create a network that is able to interact differently with each of the nearly 100 volatile compounds that each person breaths out (apart from gases like nitrogen, oxygen, and carbon dioxide). Haick's team collected 2,800 breaths from more than 1,400 patients who were each suffering from at least one of 17 diseases (in three classes: cancer, inflammation, and neurological disorders). Each sample of the disease was then passed through the special breathalyzer, which then produced a dataset of the types of chemicals it could detect and in roughly what quantities. The team then applied artificial intelligence to the dataset to search for patterns in the types of compounds detected and the concentrations they were detected at. As they report in the journal ACS Nano, the data from the breathalyzer could be used to accurately detect that a person is suffering from a unique disease nearly nine out of ten times.
Android

Some Google Pixel Devices Are Shutting Down At 30% Battery (androidauthority.com) 130

An anonymous reader quotes a report from Android Authority: It seems that some Pixel devices are affected by the same infamous shutdown bug that plagued the Nexus 6P where the device would prematurely turn off at 25 to 35 percent. The Huawei Nexus 6P has finally received the Nougat update. But ever since, Google's last ever Nexus device has been on the news, and for all the wrong reasons. Among the problems was a shutdown bug: the phone would shut down when the battery is at 30 percent or so. Well, it looks like the issue isn't unique to those Nexus 6P users. A few Reddit users are reporting that their Pixel devices are also suffering from the same shutdown bug. Some Pixel phones would prematurely shut down at or around 30 percent and would not turn back on until a charger is connected. A user by the name of vrski_15, who started the thread explains: "Twice in last 5 days, has the phone shutdown abruptly while I am in middle of something. In both instances, battery was between 25-35%, and the phone under normal conditions should have lasted for at least next 3-4 hours." With the Nexus 6P, Huawei first ruled that this was not a hardware problem but a software-related one. However, users found that the problem persisted even after downgrading to Android Marshmallow. This led Huawei to investigate further with Google, and although the company hasn't revealed the cause yet, it is probably related to the problem that these Pixel users have been experiencing.
Android

North Korea's Android Tablet Takes a Screenshot Every Time You Open an App (vice.com) 85

An anonymous reader quotes a report from Motherboard: When you think of North Korea, the first thing that springs to mind is probably not a well-featured tablet PC. But that's just what researchers at the Chaos Communication Congress hacking festival revealed on Tuesday. Called Woolim, this tablet is designed to limit the distribution of contraband media, track its users, and generally act as a propaganda platform for the Democratic People's Republic of Korea (DPRK). Woolim is a small, white Android device that looks like a fairly standard tablet. The hardware itself is made by Chinese manufacturer Hoozo, but the North Korean government has removed some components such as those for wi-fi and bluetooth, and put its own bespoke software on top. After the researchers presented work covering RedStar OS, North Korea's Linux-based operating system, a South Korean NGO offered the tablet to the group. Woolim is just one of several tablets designed for North Korea, but Woolim appears to be the most recent, likely dating from 2015. The tablet has PDFs on how to use it; various propaganda texts for users to read as well as the capability to play local TV and connect to the country's own internet, and it also comes with a slew of educational apps, such as French, Russian, and Chinese dictionaries. There's even an app for kids which teaches them how to type with a keyboard, and video games such as Angry Birds that have been lightly customized. The tablet only allows specific files to be used or played: users cannot just load whatever they want onto the device. Woolim also constantly keeps tabs on what its users are up to. Whenever a user opens an app, the tablet takes a screenshot. These screenshots are then available for viewing in another app, but they can't be deleted.
Government

FDA Releases New Cybersecurity Guidelines For Medical Devices (theverge.com) 40

An anonymous reader quotes a report from The Verge: The U.S. Food and Drug Administration released its recommendations for how medical device manufacturers should maintain the security of internet-connected devices, even after they've entered hospitals, patient homes, or patient bodies. Unsecured devices can allow hackers to tamper with how much medication is delivered by the device -- with potentially deadly results. First issued in draft form last January, this guidance is more than a year in the making. The 30-page document (PDF) encourages manufacturers to monitor their medical devices and associated software for bugs, and patch any problems that occur. But the recommendations are not legally enforceable -- so they're largely without teeth. The FDA issued an earlier set of recommendations in October 2014 (PDF), which recommended ways for manufacturers to build cybersecurity protections into medical devices as they're being designed and developed. Today's guidance focuses on how to maintain medical device cybersecurity after devices have left the factory. The guidelines lay out steps for recognizing and addressing ongoing vulnerabilities. And they recommend that manufacturers join together in an Information Sharing and Analysis Organization (ISAO) to share details about security risks and responses as they occur. Most patches and updates intended to address security vulnerabilities will be considered routine enhancements, which means manufacturers don't have to alert the FDA every time they issue one. That is, unless someone dies or is seriously harmed because of a bug -- then the manufacturer needs to report it. Dangerous bugs identified before they harm or kill anyone won't have to be reported to the FDA as long as the manufacturer tells customers and device users about the bug within 30 days, fixes it within 60 days, and shares information about the vulnerability with an ISAO.
Stats

Apple Tops Holiday Sales With 44 Percent of All New Device Activations (macrumors.com) 188

An anonymous reader quotes a report from Mac Rumors: Apple's iPhone and iPad were the most popular mobile devices gifted during the holidays this year, according to new data shared by Yahoo-owned mobile analytics firm Flurry. Flurry examined device activations by manufacturer between 12/19 and 12/25, finding Apple devices to be twice as popular as Samsung devices. 44 percent of all new phone activations were Apple iPhones, while Samsung smartphones accounted for 21 percent of activations. Huawei, LG, Amazon, Oppo, Xiaomi, and Motorola trailed behind with between two and three percent of activations each. Google's Pixel smartphone, which came out in October, did not make Flurry's list. Last year, Flurry released a similar report, and Apple devices made up 49.1 percent of all device activations, while Samsung devices came in at 19.8 percent. Phablets, or smartphones and tablets ranging in size from 5 inches to 6.9 inches, continued to grow in popularity. In 2016, the phablets category, which includes the 5.5-inch iPhone 6 Plus, 6s Plus, and 7 Plus, was responsible for 37 percent of total device activations. Medium-sized phones, like the 4.7-inch iPhone 6, iPhone 6s, and iPhone 7, were responsible for 45 percent of all activations. Activations of full-sized tablets, like the iPad, have continued to wane. From Flurry's report: "While Samsung is slowly growing in popularity throughout the holiday season, up 1% from last year, Apple devices continue to be the gift to give. Holding the third and fourth positions for activations are Huawei and LG; which is remarkable, as both manufacturers do not have an individual device within the top 35 devices activated. Their high rank is likely due to the fact that they have wide variety of devices and affordable options (hundreds of phablet and medium phones) for consumers to choose from."
Communications

Researchers Send Information Using a Single Particle of Light (vice.com) 56

An anonymous reader quotes a report from Motherboard: According to research published Thursday in Science, physicists at Princeton University have designed a device that allows a single electron to pass its quantum information to a photon in what could be a big breakthrough for silicon-based quantum computers. The device designed by the Princeton researchers is the result of five years of research and works by trapping an electron and a photon within a device built by HRL laboratories, which is owned by Boeing and General Motors. It is a semi-conductor chip made from layers of silicon and silicon-germanium, materials that are inexpensive and already widely deployed in consumer electronics. Across the top of this wafer of silicon layers were laid a number of nanowires, each smaller than the width of a human hair, which were used to deliver energy to the chip. This energy allowed the researchers to trap an electron in between the silicon layers of the chip in microstructures known as quantum dots. The researchers settled on photons as the medium of exchange between electrons since they are less sensitive to disruption from their environment and could potentially be used to carry quantum information between quantum chips, rather than within the circuits on a single quantum chip. The ability to scale up this device would mean that photons could be used to pass quantum information from electron to electron in order to form the circuits for a quantum computer. "We now have the ability to actually transmit the quantum state to a photon," said Xiao Mi, a graduate student in Princeton's Department of Physics. "This has never been done before in a semiconductor device because the quantum state was lost before it could transfer its information."
Communications

Dutch Market Regulator Bans T-Mobile's 'Free' Streaming Music Service (reuters.com) 61

The Dutch Consumer and Markets regulator ordered T-Mobile to shut down its zero-rated music streaming service because it violates the country's net neutrality rules. T-Mobile launched the Music Freedom service in October, allowing customers to stream music on their mobile devices without it impacting their data plans. Reuters reports: The AFM said the practice, often called "zero rating" is a violation of Dutch net neutrality rules, because it puts rival services such as Spotify at a competitive disadvantage. Deutsche Telekom subsidiary T-Mobile Netherlands, which had introduced the product on Oct. 10, must stop offering it or face penalty of 50,000 euros ($52,000) per day, the AFM said. Zero rating is shaping up as one of the major battlegrounds for European telecommunications companies as they seek ways to attract customers. The Dutch net neutrality law unambiguously forbids the practice, but European Union rules are less clear.
Encryption

Leaked Files Reveal Scope of Cellebrite's Smartphone-Cracking Technology (zdnet.com) 37

An anonymous reader quotes a report from ZDNet: Earlier this year, we were sent a series of large, encrypted files purportedly belonging to a U.S. police department as a result of a leak at a law firm, which was insecurely synchronizing its backup systems across the internet without a password. Among the files was a series of phone dumps created by the police department with specialist equipment, which was created by Cellebrite, an Israeli firm that provides phone-cracking technology. We obtained a number of these so-called extraction reports. One of the more interesting reports by far was from an iPhone 5 running iOS 8. The phone's owner didn't use a passcode, meaning the phone was entirely unencrypted. The phone was plugged into a Cellebrite UFED device, which in this case was a dedicated computer in the police department. The police officer carried out a logical extraction, which downloads what's in the phone's memory at the time. (Motherboard has more on how Cellebrite's extraction process works.) In some cases, it also contained data the user had recently deleted. To our knowledge, there are a few sample reports out there floating on the web, but it's rare to see a real-world example of how much data can be siphoned off from a fairly modern device. We're publishing some snippets from the report, with sensitive or identifiable information redacted.
The Almighty Buck

Worldwide Gaming Market Hits $91 Billion In 2016, Says Report (venturebeat.com) 76

According to a new SuperData Research report, the worldwide gaming market was worth a whopping $91 billion this year, with mobile gaming leading the way with a total estimated market value of $41 billion. The PC gaming market did very well too, as it pulled in nearly $36 billion over the year. PC Gamer reports: The mobile game segment was the largest at $41 billion (up 18 percent), followed by $26 billion for retail games and $19 billion for free-to-play online games. New categories such as virtual reality, esports, and gaming video content were small in size, but they are growing fast and holding promise for 2017, SuperData said. Mobile gaming was driven by blockbuster hits like Pokemon Go and Clash Royale. The mobile games market has started to mature and now more closely resembles traditional games publishing, requiring ever higher production values and marketing spend. Monster Strike was the No. 1 mobile game, with $1.3 billion in revenue. VR grew to $2.7 billion in 2016. Gaming video reached $4.4 billion, up 34 percent. Consumers increasingly download games directly to their consoles, spending $6.6 billion on digital downloads in 2016. PC gaming continues to do well, earning $34 billion (up 6.7 percent) and driven largely by free-to-play online titles and downloadable games. Incumbents like League of Legends together with newcomers like Overwatch are driving the growth in PC games. PC gamers also saw a big improvement with the release of a new generation of graphics cards, offering a 40 percent increase in graphics power and a 20 percent reduction of power consumption.
Android

Barnes & Noble's Latest Tablet Is Running Spyware From Shanghai (linuxjournal.com) 63

Long-time Slashdot reader emil writes about how ADUPS, an Android "firmware provisioning" company specializing in both big data collection of Android usage and hostile app installation and/or firmware control, has been found pre-loaded on Barnes and Noble's new $50 tablet: ADUPS was recently responsible for data theft on BLU phones and an unsafe version of the ADUPS agent is pre-loaded on the Barnes and Noble BNTV450. ADUPS' press releases claim that Version 5.5 of their agent is safe, but the BNTV450 is running 5.2. The agent is capable of extracting contacts, listing installed apps, and installing new apps with elevated privilege. Azzedine Benameur, director of research at Kryptowire, claims that "owners can expect zero privacy or control while using it."
Businesses

Chicago Electronics Recycler Faked Tear-Downs, Sent Hazardous Waste To Overseas Landfills (arstechnica.com) 91

Federals agents have accused Brian Brundage, the former owner of Chicago-based electronics recycling company Intercon Solutions and current owner of EnviroGreen Processing, of fraud for failing to properly break down and recycle electronic devices according to federal guidelines. Brundage allegedly shipped Cathode Ray Tubes (CRTs) from old computer and TV monitors, which contained "hazardous amounts of lead," and batteries to overseas landfills for disposal. The leftover electronics that weren't shipped overseas were destroyed inappropriately at his businesses or stored in warehouses, which is forbidden by federal guidelines. Ars Technica reports: According to the indictment (PDF), Brundage also improperly resold many of the electronics he acquired. Between 2009 and 2015, Brundage received shipments of calculators from an unnamed technology company in Texas with instructions to disassemble the calculators and recycle them accordingly. But Brundage apparently resold the calculators to another company based in Tampa, Florida, which purchased and sold used electronics. In exchange for the shipments of calculators, Brundage allegedly had the company in Tampa directly pay some of Brundage's personal expenses. Those expense include between $31,000 and $39,000 per year for a nanny and $26,000 to $42,000 per year for a housekeeper, as well as tens of thousands of dollars for jewelry expenses and payments to an Indiana-based casino. Among the more colorful accusations in the US government's indictment of Brundage: the businessman allegedly went to lengths to fool third-party auditors into giving his companies the certifications necessary to keep doing business as an e-recycler. Brundage allegedly invited unknowing customers on sham tours of Intercon's facility. Once there, he "directed Intercon's warehouse staff to set up a staged disassembly line to make it falsely appear as though Intercon regularly processed e-waste in a manner that was consistent with its public representations." The Chicago Tribune published a feature on Intercon in 2007. In it, Brundage is quoted saying, "We put old products on a disassembly line. We break each item down to raw materials and send them off to be smelted and reused." He added, "nothing that leaves here goes to a landfill."
AT&T

AT&T Is Adding a Spam Filter For Phone Calls (theverge.com) 66

An anonymous reader quotes a report from The Verge: Today, ATT introduced a new service for automated blocking of fraud or spam calls. Dubbed ATT Call Protect, the system identifies specific numbers believed to be sources of fraud, and will either deliver those calls with a warning or block them outright. Users can whitelist specific numbers, although temporary blocks require downloading a separate Call Protect app. The feature is only available on postpaid iOS and Android devices, and can be activated through the MyATT system. Phone companies have allowed for manual number blocking for years, and third-party apps like Whitepages and Privacystar use larger databases of untrustworthy numbers to preemptively block calls from the outside. But ATT's new system would build in those warnings at the network level, and give operators more comprehensive data when assembling suspected numbers. More broadly, marketing calls are subject to the national Do Not Call registry. Specific instances of fraud can still be reported through carriers or directly to police.
Desktops (Apple)

A $300 Device Can Steal Mac FileVault2 Passwords (bleepingcomputer.com) 88

An anonymous reader writes: Swedish hardware hacker Ulf Frisk has created a device that can extract Mac FileVault2 (Apple's disk encryption utility) passwords from a device's memory before macOS boots and anti-DMA protections kick in. The extracted passwords are in cleartext, and they also double as the macOS logon passwords. The attack requires physical access, but it takes less than 30 seconds to carry out. A special device is needed, which runs custom software (available on GitHub), and uses hardware parts that cost around $300. Apple fixed the attack in macOS 10.12.2. The device is similar to what Samy Kamker created with Poison Tap.
AI

Google May Prevent Samsung From Adding Viv AI Assistant To Galaxy S8 (ibtimes.co.uk) 60

New submitter drunkdrone quotes a report from International Business Times: Samsung is reported to be equipping its upcoming Galaxy S8 flagship with all manner of technical marvels in its attempt to erase the Note 7 catastrophe from memory. However, Google may throw a wrench into the works by potentially prohibiting Samsung from imbuing the phone with one of its most compelling features (Warning: source may be paywalled; alternate source) -- its AI personal assistant. Reports have suggested that Samsung planned to load the Galaxy S8 with Viv, a smartphone-based digital assistant similar to Apple's Siri and Google Assistant. Because of an ongoing non-compete pact between Samsung and Google, however, Samsung may be forced to exclude Viv from its upcoming flagship as would challenge Google's digital helper. The report adds: "According to Recode, the restriction forms part of a patent-sharing agreement Samsung signed with Google in 2014. While the pact will allow the two companies to put up a stronger, united front against Apple, it may hinder Samsung's ambitions for independence and its attempts to differentiate itself from the wider Android crowd."
Advertising

Malvertising Campaign Infects Your Router Instead of Your Browser (bleepingcomputer.com) 137

An anonymous reader quotes a report from BleepingComputer: Malicious ads are serving exploit code to infect routers, instead of browsers, in order to insert ads in every site users are visiting. Unlike previous malvertising campaigns that targeted users of old Flash or Internet Explorer versions, this campaign focused on Chrome users, on both desktop and mobile devices. The malicious ads included in this malvertising campaign contain exploit code for 166 router models, which allow attackers to take over the device and insert ads on websites that didn't feature ads, or replace original ads with the attackers' own. Researchers haven't yet managed to determine an exact list of affected router models, but some of the brands targeted by the attackers include Linksys, Netgear, D-Link, Comtrend, Pirelli, and Zyxel. Because the attack is carried out via the user's browser, using strong router passwords or disabling the administration interface is not enough. The only way users can stay safe is if they update their router's firmware to the most recent versions, which most likely includes protection against the vulnerabilities used by this campaign. The "campaign" is called DNSChanger EK and works when attackers buy ads on legitimate websites and insert malicious JavaScript in these ads, "which use a WebRTC request to a Mozilla STUN server to determine the user's local IP address," according to BleepingComputer. "Based on this local IP address, the malicious code can determine if the user is on a local network managed by a small home router, and continue the attack. If this check fails, the attackers just show a random legitimate ad and move on. For the victims the crooks deem valuable, the attack chain continues. These users receive a tainted ad which redirects them to the DNSChanger EK home, where the actual exploitation begins. The next step is for the attackers to send an image file to the user's browser, which contains an AES (encryption algorithm) key embedded inside the photo using the technique of steganography. The malicious ad uses this AES key to decrypt further traffic it receives from the DNSChanger exploit kit. Crooks encrypt their operations to avoid the prying eyes of security researchers."
Music

Microsoft Xbox One and Windows 10 Getting Dolby Atmos Surround Sound (betanews.com) 37

BrianFagioli quotes a report from BetaNews: When people think of the technology behind video games and movies, they often just focus on the visuals. True, when creating an immersive experience, the video is probably the most important aspect from a technological perspective. With that said, audio quality is very important too. Today, Microsoft announces that both Xbox One And Windows 10 will be getting Dolby Atmos support in future updates. If you aren't familiar, it is a surround sound technology with a focus on immersion. Don't have compatible audio hardware? Don't worry -- the Windows-maker is promising a "virtual" Atmos experience too. Larry Hryb, Xbox Live's Major Nelson said in a statement, "Xbox will be the first game console to feature Dolby Atmos and game developers are excited about using the new capabilities to make their games richer and more engaging. Atmos support for the Blu-ray app on Xbox is already available in Preview and will be released to GA soon -- and we're very excited now to offer Atmos support to games on Xbox One and Windows 10."
AMD

AMD Unveils First Zen Desktop Processor Details, Picks 'Ryzen' To Brand Zen CPU (hothardware.com) 113

MojoKid writes from a report via HotHardware: AMD has just officially unveiled that desktop variants of its Zen processor family will now be branded RYZEN. Zen-based processors will eventually target desktops, servers, and mobiles device, but the first wave of products will be targeted at the performance desktop market, where gamers and VR continue to spur growth. AMD is positioning RYZEN as a high-performance option and though there will be other core configurations as well, AMD has disclosed that one of the high-end options in the initial RYZEN line-up will feature 8 cores (16 threads with SMT) and at minimum a 3.4 GHz base clock, with higher turbo frequencies. That processor will also be outfitted with 20MB of cache -- 4MB of L2 and 16MB of L3 -- and it will be infused with what AMD is calling SenseMI technology. SenseMI is essentially fancy branding for the updated branch predictor, prefetcher, and power and control logic in Zen. AMD's upcoming AM4 platform for RYZEN will be outfitted with all of the features expected of a modern PC enthusiast platform. AM4 motherboards will use DDR4 memory and feature PCIe Gen 3 connectivity, and support for USB 3.1 Gen 2, NVMe, and SATA Express. Performance demos of RYZEN shown to members of the press pit a stock Intel Core i7-6900K (3.2GHz base, 3.7GHz turbo) with Turbo Boost that was enabled on the 6900K, versus RYZEN with boost disabled running at 3.4GHz flat. In the demo, the RYZEN system outpaced the Core i7-6900K by a few seconds.
XBox (Games)

Xbox One Games Arrive On Oculus Rift With New Streaming App (theverge.com) 16

Microsoft has released its Xbox One streaming app to the Oculus Store today, allowing Xbox One owners to stream games to their Oculus Rift virtual-reality headset via a Windows 10 PC. The Verge reports: The app itself looks just like the Windows 10 version of Xbox streaming, with the ability to select different consoles on a network before streams are launched. Microsoft has also added the ability to open the Xbox One guide and control the orientation of games in the virtual environment. If you're interested in streaming Xbox One games to the Oculus Rift then you'll need a Windows PC to take advantage of the streaming, and games will be streamed directly from a console that's powered on and not in use. The Xbox streaming app is available immediately in the Oculus Store. The streaming app is a far cry from full VR gaming, but the app will let you simulate playing games on a large screen in a virtual environment. "Whether you're taking on Gears of War 4, Forza Horizon 3, or any other Xbox One game, you'll be able to play in three different environments from the start -- each titled 'Citadel,' 'Retreat,' and 'Dome,'" reports Windows Central.
Botnet

US Think Tank Wants To Regulate The Design of IoT Devices For Security Purposes (theregister.co.uk) 87

New submitter mikehusky quotes a report from The Register: Washington D.C. think tank the Institute for Critical Infrastructure Technology is calling for regulation on "negligence" in the design of internet-of-things (IoT) devices. If the world wants a bonk-detecting Wi-Fi mattress, it must be a malware-free bonk-detecting Wi-Fi mattress. The report adds: "Researchers James Scott and Drew Spaniel point out in their report Rise of the Machines: The Dyn Attack Was Just a Practice Run [PDF] that IoT represents a threat that is only beginning to be understood. The pair say the risk that regulation could stifle market-making IoT innovation (like the Wi-Fi cheater-detection mattress) is outweighed by the need to stop feeding Shodan. 'Regulation on IoT devices by the United States will influence global trends and economies in the IoT space, because every stakeholder operates in the United States, works directly with United States manufacturers, or relies on the United States economy. Nonetheless, IoT regulation will have a limited impact on reducing IoT DDoS attacks as the United States government only has limited direct influence on IoT manufacturers and because the United States is not even in the top 10 countries from which malicious IoT traffic originates.' State level regulation would be 'disastrous' to markets and consumers alike. The pair offer their report in the wake of the massive Dyn and Mirai distributed denial of service attacks in which internet of poorly-designed devices were enslaved into botnets to hammer critical internet infrastructure, telcos including TalkTalk, routers and other targets."
Music

Bose Launches 'Hearphones' That Act Like Hearing Aids (theverge.com) 65

Bose has launched a new pair of earbuds called Hearphones that augment the sounds of the world around you, letting you select what kinds of outside noises you'd like to listen to. "Hearphones users can also pick which direction those outside noises come from, with what appears to be specific emphasis on helping people hear voices better in crowded places," reports The Verge: A "Bose Hear" app was recently added to the App Store, and offers a little more detail about what Hearphones are capable of. You can turn the "world volume" up or down, and change the direction you're hearing those sounds from. There are preset modes like "television," "focused conversation," "airplane," "doctor's office," or "gym," all of which presumably block out different sounds from different directions while letting in things like speech. A user manual was also recently submitted to the FCC. No pricing or availability can be found anywhere on Bose's website or in the app. Here's some more from that app's description: "Innovative technologies amplify softer sounds, let you turn down the distractions in noisy environments and focus on what you want to hear -- like a conversation across the table. You can also use them as controllable noise cancelling [sic] wireless headphones for your music or calls or just for quiet. Take control of the noise, and hear the world better."

Slashdot Top Deals