LightBlog

jeudi 19 décembre 2019

Leaked live images show the OPPO Reno3 and Reno3 Pro

OPPO is prepping up to launch the Reno3 series at an event in China later this month. Over the last couple of weeks, the company has released several teasers about the upcoming devices in the Reno3 series. The teasers, along with a couple of leaks, have revealed key details about the design and specifications of the Reno3 and Reno3 Pro. We already have confirmation from OPPO that the Reno3 Pro will be powered by the Snapdragon 765G chip and it will pack in a 4,025 mAh battery.

Both the devices will feature a similar design on the back, with a quad-camera array, a gradient finish, and minimal OPPO branding. We also know that the Reno3 Pro will feature a curved hole-punch display, while the regular Reno3 will feature a flat display with a waterdrop-style notch. OPPO has also released some information about the dimensions of the Reno3 series, with the Pro variant measuring in at just 7.7mm thick, while the non-Pro variant will be 7.9mm thick. And finally, we have evidence that suggests that the regular Reno3 will be powered by MediaTek’s unannounced Dimensity 1000L chip.

Now, leaked images of the Reno3 and Reno3 Pro have surfaced online, giving us our first good look at the upcoming devices. Renowned leakster Ice universe has shared live images of the Reno3 Pro that showcase the more premium of the two devices in all its glory. The images confirm everything that we’ve learned about the devices so far, including the curved hole-punch display, quad-camera setup and gradient finish. The device looks quite impressive and Ice universe has also revealed that it will feature a high refresh rate 90Hz display.

OPPO Reno3 OPPO Reno3

As for the Reno3, live images of the device have surfaced on Weibo that showcase a back panel design reminiscent of the Redmi K20 series. The images also confirm that the device will feature a quad-camera setup, a flat display with a notch, and it will run ColorOS 7 based on Android 10 at launch. As of now, these are all the details we have about the upcoming devices and we expect to learn more as the launch draws closer.


Source: Weibo

Via: Twitter, Android Central

The post Leaked live images show the OPPO Reno3 and Reno3 Pro appeared first on xda-developers.



from xda-developers https://ift.tt/2Q1vdTD
via IFTTT

OnePlus opens up a bug bounty program called the OnePlus Security Response Center

Cybersecurity is more important than ever as we go into a new decade that is sure to, again, radically change technology as we know it. And no matter how huge your developer team is or how thoroughly you test your software, some critical vulnerabilities and bugs still manage to cross the pond to stable software a lot of the time. This is why several companies, including Samsung, Google, and Huawei, have bug bounty programs that allow security researchers to have a go with the company’s software and walk away with a very generous amount of cash if they manage to find any critical exploit. OnePlus is now joining this list of companies, as they promised earlier this year.

OnePlus has unveiled its own bug bounty program, which they are calling the OnePlus Security Response Center, or OneSCR for short. The premise is simple: If you (properly) find a vulnerability, you can get money in exchange for (properly) reporting it. The opening of this program comes nearly two years after the company disclosed a security breach in its payment portal, and one month after they disclosed a breach of customer data in the OnePlus Store.

This bug bounty program is a bit different compared to the equivalents from other companies, though, and this is because of payout amounts. While other companies are willing to offer several hundred thousand dollars for a very critical security vulnerability, OnePlus is offering up to $7,000 for what it deems to be the most critical threats, while smaller bugs will go as low as $50-$100. The Submission Policy page clarifies OnePlus’ stance on responsible/coordinated disclosure, account interaction, disallowed attack methods, ineligible issues, and finally, the payments.

Here’s the reward tier list:

  •   Special casesup to $7,000
  •   Critical: $750 – $1,500
  •   High: $250 – $750
  •   Medium: $100 – $250
  •   Low: $50 – $100

While $7,000 is a decent sum for some people, it is a very far cry from what other companies offer. With a company of OnePlus’ size and scope – they’ve grown a lot larger since they launched the OnePlus One 5 years back – you’d expect payouts for such a program to be just a bit more generous. Nonetheless, we hope the program will help to improve the security of OnePlus products. You can submit bug reports here.

OnePlus also says they will collaborate with HackerOne, a hacker-powered bug bounty platform, to launch a pilot program in 2020, inviting select security researchers to test their systems against potential threats.


Source: OnePlus

The post OnePlus opens up a bug bounty program called the OnePlus Security Response Center appeared first on xda-developers.



from xda-developers https://ift.tt/2EDFrnG
via IFTTT

OnePlus opens up a bug bounty program called the OnePlus Security Response Center

Cybersecurity is more important than ever as we go into a new decade that is sure to, again, radically change technology as we know it. And no matter how huge your developer team is or how thoroughly you test your software, some critical vulnerabilities and bugs still manage to cross the pond to stable software a lot of the time. This is why several companies, including Samsung, Google, and Huawei, have bug bounty programs that allow security researchers to have a go with the company’s software and walk away with a very generous amount of cash if they manage to find any critical exploit. OnePlus is now joining this list of companies, as they promised earlier this year.

OnePlus has unveiled its own bug bounty program, which they are calling the OnePlus Security Response Center, or OneSCR for short. The premise is simple: If you (properly) find a vulnerability, you can get money in exchange for (properly) reporting it. The opening of this program comes nearly two years after the company disclosed a security breach in its payment portal, and one month after they disclosed a breach of customer data in the OnePlus Store.

This bug bounty program is a bit different compared to the equivalents from other companies, though, and this is because of payout amounts. While other companies are willing to offer several hundred thousand dollars for a very critical security vulnerability, OnePlus is offering up to $7,000 for what it deems to be the most critical threats, while smaller bugs will go as low as $50-$100. The Submission Policy page clarifies OnePlus’ stance on responsible/coordinated disclosure, account interaction, disallowed attack methods, ineligible issues, and finally, the payments.

Here’s the reward tier list:

  •   Special casesup to $7,000
  •   Critical: $750 – $1,500
  •   High: $250 – $750
  •   Medium: $100 – $250
  •   Low: $50 – $100

While $7,000 is a decent sum for some people, it is a very far cry from what other companies offer. With a company of OnePlus’ size and scope – they’ve grown a lot larger since they launched the OnePlus One 5 years back – you’d expect payouts for such a program to be just a bit more generous. Nonetheless, we hope the program will help to improve the security of OnePlus products. You can submit bug reports here.

OnePlus also says they will collaborate with HackerOne, a hacker-powered bug bounty platform, to launch a pilot program in 2020, inviting select security researchers to test their systems against potential threats.


Source: OnePlus

The post OnePlus opens up a bug bounty program called the OnePlus Security Response Center appeared first on xda-developers.



from xda-developers https://ift.tt/2EDFrnG
via IFTTT

Get better online security with Surfshark VPN for Android

In a day and age where so much of our lives are spent on the Internet, privacy and security have never been more important. Using a Virtual Private Network (VPN) is one of the easiest ways you can improve your cybersecurity on all devices. If you’re looking to download an Android VPN, Surfshark has you covered on your phone and on other platforms.

A VPN is essentially an encrypted pathway for your web data to pass through. This allows you to browse the web and hide your IP address and other sensitive information. Simply put, it fools trackers into thinking you’re using the internet from somewhere else. Surfshark VPN makes this super simple to set up and use on any device you might have.

Surfshark offers a few different subscription plans to choose from. You can pay for one month at a time for $11.95 per month, pay yearly for $71.88, or pay for 2 years for $47.76. The two-year price breaks down to only $1.99 per month. Plus, currently, Surfshark is running a Holiday deal where you can get one month for free. So you can give it a proper test before putting down money.

Here are a few of the features of Surfshark VPN:

  • Apps for Chrome, Firefox, Android, iOS, macOS, Windows, Linux, Fire TV, and Trust DNS
  • Watch Netflix in the US and 15 other countries.
  • Whitelist specific apps and websites to bypass the VPN.
  • Prevent malware and phishing attempts.
  • History is not logged.
  • Industry-leading encryption.
  • Kill Switch to instantly disable the internet if the VPN connection drops.
We thank Surfshark for sponsoring this post. Though [Honor] did have input on the topic, the content was written by XDA. Our sponsors help us pay for the many costs associated with running XDA, including servers, developers, writers, and more. While you may see sponsored content alongside Portal content, all of it will be clearly labeled as such. The XDA Portal team will not compromise journalistic integrity by accepting money to write favorably about a company. Our opinion cannot be bought. Sponsored content, advertising, and the XDA Depot are managed by our marketing director and not the editorial team.

The post Get better online security with Surfshark VPN for Android appeared first on xda-developers.



from xda-developers https://ift.tt/38Yb6hx
via IFTTT

Enable Quick Wallet Access for Google Pay on any rooted Google Pixel smartphone running Android 10

During the early Android Q betas, a new gesture called “show cards & passes” was discovered in Settings. According to its description, this feature allows one to access their credit cards, passes, and tickets from Google Pay, as well as an emergency information card, in the power menu. When Google launched Android 10 for the general public, they put up a webpage detailing some of the new features of the new OS. One of the features was called “quick wallet access,” and its description matched what we saw in the early Android Q betas. However, this text was removed from the page, and the feature never appeared in any Android 10 release – even with the launch of the Pixel 4 in October and the first “Pixel Feature Drop” in December. We know the feature is still there, though, because we managed to activate it in mid-September, and we’ve confirmed it still works today. Now, we’re sharing our mod to enable Quick Wallet Access on your own rooted Pixel smartphone.

Enabling this feature will change the UI of the power menu that you access by long-pressing the power button. Instead of a column of buttons aligned towards the right-hand side, the new power menu consists of one large and one smaller card aligned horizontally towards the bottom of the screen. At the top of the screen, you’ll find a row of cards that you can swipe left or right through. Your emergency information and any cards you’ve added in Google Pay will appear here. The purpose of this “quick wallet access” feature is to make it so you don’t have to open the Google Pay app to switch your active card. All you have to do is long-press the power button and swipe left or right to pick your desired card.

In order to make a payment after changing your active card, you’ll still need to unlock your phone. If you set up Face Unlock on the Pixel 4, you’ll be able to immediately unlock your phone – before quick wallet access even shows up in the power menu – to make a payment. That’s why I was expecting this feature to appear in the first Pixel Feature Drop for the Pixel 4, but fortunately, we know this feature won’t be a Pixel 4-exclusive. The changelog for the December 2019 update references this feature, suggesting it could be coming to the Pixel 2, Pixel 2 XL, Pixel 3, Pixel 3 XL, Pixel 3a, Pixel 3a XL, Pixel 4, and Pixel 4 XL. Google says it’s an “experimental feature,” though, so it might never roll out officially. If they do roll it out, it’ll likely come to the Pixel 4 first before rolling out for older Pixels. If you would rather not wait, or you own a first-generation Pixel phone and want to get in on the fun, you can try my mod linked below.

Requirements:

  • SystemUI with the quick wallet access feature baked-in. This includes the Google Pixel, Pixel XL, Pixel 2, Pixel 2 XL, Pixel 3, Pixel 3 XL, Pixel 3a, Pixel 3a XL, Pixel 4, and Pixel 4 XL on Android 10. This will very likely not work on non-Pixel smartphones unless you’re running a custom ROM such as Pixel Experience that uses Google’s SystemUI.
  • Root access with Magisk.

Steps:

  1. Open Magisk Manager and install the “SQLite for ARM aarch64 devices” Module from the Downloads section. Note: If you already have an SQLite binary from TitaniumBackup or Termux, then the installer script will detect it so you won’t need to install this separate SQLite binary. If so, proceed to step 3.
  2. Reboot your phone.
  3. Download my Magisk Module and install it in Magisk Manager: GooglePayPowerMenu.zip
  4. Reboot your phone.
  5. Go to Settings > System > Gestures and check to see if “Cards & passes” appears in the list. Make sure that the feature is enabled.
  6. Long-press the power button to check and see if the new power menu UI is showing. At the top, you should see an emergency information card and any cards you’ve added in Google Pay.

Troubleshooting:

You may have to wait a bit or reboot once more for the quick wallet access feature to start working. For me, it appeared after I opened the power menu a second time. Also, if you’re having trouble adding a card to Google Pay because of SafetyNet, then be sure to install the GPay-SQLite-Fix Magisk Module.

Uninstall:

Lastly, if you want to completely uninstall this mod and revert the power menu back to the original UI, you must do the following:

  1. Uninstall the module in Magisk Manager
  2. Delete the 2 quickwalletaccess scripts from /data/adb/service.d
  3. Run the following shell commands:
    adb shell settings put secure global_actions_panel_debug_enabled 0
    adb shell settings put secure global_actions_panel_available 0
  4. Reboot

I would like to thank XDA Senior Member 73sydney, jcmm11, adpoliak, and all others involved in the GPay-SQLite-Fix Magisk Module as I borrowed the code to check for an SQLite binary.

The post Enable Quick Wallet Access for Google Pay on any rooted Google Pixel smartphone running Android 10 appeared first on xda-developers.



from xda-developers https://ift.tt/36UAFOG
via IFTTT

Enable Quick Wallet Access for Google Pay on any rooted Google Pixel smartphone running Android 10

During the early Android Q betas, a new gesture called “show cards & passes” was discovered in Settings. According to its description, this feature allows one to access their credit cards, passes, and tickets from Google Pay, as well as an emergency information card, in the power menu. When Google launched Android 10 for the general public, they put up a webpage detailing some of the new features of the new OS. One of the features was called “quick wallet access,” and its description matched what we saw in the early Android Q betas. However, this text was removed from the page, and the feature never appeared in any Android 10 release – even with the launch of the Pixel 4 in October and the first “Pixel Feature Drop” in December. We know the feature is still there, though, because we managed to activate it in mid-September, and we’ve confirmed it still works today. Now, we’re sharing our mod to enable Quick Wallet Access on your own rooted Pixel smartphone.

Enabling this feature will change the UI of the power menu that you access by long-pressing the power button. Instead of a column of buttons aligned towards the right-hand side, the new power menu consists of one large and one smaller card aligned horizontally towards the bottom of the screen. At the top of the screen, you’ll find a row of cards that you can swipe left or right through. Your emergency information and any cards you’ve added in Google Pay will appear here. The purpose of this “quick wallet access” feature is to make it so you don’t have to open the Google Pay app to switch your active card. All you have to do is long-press the power button and swipe left or right to pick your desired card.

In order to make a payment after changing your active card, you’ll still need to unlock your phone. If you set up Face Unlock on the Pixel 4, you’ll be able to immediately unlock your phone – before quick wallet access even shows up in the power menu – to make a payment. That’s why I was expecting this feature to appear in the first Pixel Feature Drop for the Pixel 4, but fortunately, we know this feature won’t be a Pixel 4-exclusive. The changelog for the December 2019 update references this feature, suggesting it could be coming to the Pixel 2, Pixel 2 XL, Pixel 3, Pixel 3 XL, Pixel 3a, Pixel 3a XL, Pixel 4, and Pixel 4 XL. Google says it’s an “experimental feature,” though, so it might never roll out officially. If they do roll it out, it’ll likely come to the Pixel 4 first before rolling out for older Pixels. If you would rather not wait, or you own a first-generation Pixel phone and want to get in on the fun, you can try my mod linked below.

Requirements:

  • SystemUI with the quick wallet access feature baked-in. This includes the Google Pixel, Pixel XL, Pixel 2, Pixel 2 XL, Pixel 3, Pixel 3 XL, Pixel 3a, Pixel 3a XL, Pixel 4, and Pixel 4 XL on Android 10. This will very likely not work on non-Pixel smartphones unless you’re running a custom ROM such as Pixel Experience that uses Google’s SystemUI.
  • Root access with Magisk.

Steps:

  1. Open Magisk Manager and install the “SQLite for ARM aarch64 devices” Module from the Downloads section. Note: If you already have an SQLite binary from TitaniumBackup or Termux, then the installer script will detect it so you won’t need to install this separate SQLite binary. If so, proceed to step 3.
  2. Reboot your phone.
  3. Download my Magisk Module and install it in Magisk Manager: GooglePayPowerMenu.zip
  4. Reboot your phone.
  5. Go to Settings > System > Gestures and check to see if “Cards & passes” appears in the list. Make sure that the feature is enabled.
  6. Long-press the power button to check and see if the new power menu UI is showing. At the top, you should see an emergency information card and any cards you’ve added in Google Pay.

Troubleshooting:

You may have to wait a bit or reboot once more for the quick wallet access feature to start working. For me, it appeared after I opened the power menu a second time. Also, if you’re having trouble adding a card to Google Pay because of SafetyNet, then be sure to install the GPay-SQLite-Fix Magisk Module.

Uninstall:

Lastly, if you want to completely uninstall this mod and revert the power menu back to the original UI, you must do the following:

  1. Uninstall the module in Magisk Manager
  2. Delete the 2 quickwalletaccess scripts from /data/adb/service.d
  3. Run the following shell commands:
    adb shell settings put secure global_actions_panel_debug_enabled 0
    adb shell settings put secure global_actions_panel_available 0
  4. Reboot

I would like to thank XDA Senior Member 73sydney, jcmm11, adpoliak, and all others involved in the GPay-SQLite-Fix Magisk Module as I borrowed the code to check for an SQLite binary.

The post Enable Quick Wallet Access for Google Pay on any rooted Google Pixel smartphone running Android 10 appeared first on xda-developers.



from xda-developers https://ift.tt/36UAFOG
via IFTTT

Galaxy Buds+ renders confirm no design changes for Samsung’s new wireless earbuds

Samsung is hard at work preparing the next 3 smartphones in the Galaxy S line up: the Galaxy S11, S11e, and S11+. We know this because multiple leaks have revealed the designs, displays, and camera specifications. Alongside the new smartphones, though, Samsung is seemingly preparing to refresh the Galaxy Buds, the company’s truly wireless earbuds. The new earbuds are expected to be called the Galaxy Buds+, and they’ll provide a major upgrade over the current Galaxy Buds with the addition of active noise cancellation. Famed leaker Evan Blass and Samsung news site SamMobile have previously revealed the existence of the new wireless earbuds, with the latter even linking to an alleged support page for the new product. Now, we’ve uncovered the strongest evidence yet for the existence of the new Galaxy Buds+, thanks to the Samsung SmartThings app.

Galaxy Buds+

SmartThings is Samsung’s brand for its home automation suite. The latest version of the Android app for SmartThings, version 1.7.41-25, rolled out on the Google Play Store this week. We decoded the APK to examine its resources and discovered new animations for a product called “budsplus.” Multiple lines of code in the SmartThings app clearly mark “buds” and “budsplus” as different products, so it’s safe to say that these animations are for the new Galaxy Buds+. The animations show the charging case and the wireless earbuds, confirming that the basic design of the Galaxy Buds+ is unchanged from the current generation Galaxy Buds.

Besides the name and design, the SmartThings app doesn’t reveal any other information about the new wireless earbuds. We can’t confirm if they support ANC. We don’t know if they’ll have onboard storage. We don’t know what colors will be available, what the price will be, and when they will launch. It probably won’t be long before the full specifications of the Galaxy Buds+ leak through online retailers, though.

New 2020 Smart Home Products from Samsung

Apart from the new wireless earbuds, the latest version of the SmartThings app also contains strings pertaining to several of Samsung’s upcoming 2020 smart home products. The strings describe an “easy setup” process for a new air purifier, refrigerator, and oven.

<string name="easysetup_prepare_2020_air_purifier_button_guide_1">If your device buttons are icons, press the one shown below.</string>
<string name="easysetup_prepare_2020_air_purifier_button_guide_2">If your device has both %1$s and %2$s buttons, use the %3$s button.</string>
<string name="easysetup_prepare_2020_air_purifier_confirm">When AP is blinking on your air purifier, press the %s button.</string>
<string name="easysetup_prepare_2020_air_purifier_icon">&lt;u>&lt;font color=#3695dd>Does your device have icons for buttons?&lt;/font>&lt;/u></string>
<string name="easysetup_prepare_2020_air_purifier_main">On your air purifier, press and hold the %1$s or %2$s button for more than 5 seconds until %3$s appears.</string>
<string name="easysetup_2020_refrigerator_confirm_top">When AP is blinking on your refrigerator, press the %1$s button until %2$s appears.</string>
<string name="easysetup_qr_oven_lcd_main">"Scan the QR code on your oven's screen."</string>
<string name="easysetup_qr_secondary_button_confirm">Add device without QR scan</string>

At IFA 2019, Samsung confirmed they were working on new smart home products such as these, so we’re not surprised to see these strings appear in the SmartThings app. We can probably expect several of these products to be unveiled at CES 2020 next month.

The post Galaxy Buds+ renders confirm no design changes for Samsung’s new wireless earbuds appeared first on xda-developers.



from xda-developers https://ift.tt/2Ez2HDB
via IFTTT