Japanese researcher discovers a new optical illusion called ‘curvature blindness’

This new optical illusion makes curvy lines appear zig-zagged

Kohske Takahashi, a cognition and illusion researcher at Chukyo University, Japan has shared a new optical illusion online that will blow your mind and make one think that we should not perceive based on what we see.

The illusion dubbed as “curvature blindness” is described and explained in the journal i-Perception, which provides scientific breakdown and analysis of the optical illusion. It describes how a wavy line can be perceived as a zigzag line on a white, grey and black background.

“Here, we report a novel illusion —— Curvature Blindness Illusion —— that will provide novel implications for contour perception, in particular, for the underlying mechanisms of curve and corner perception,” Takahashi wrote.

In the image below, which displays the illusion, one can see pairs of wavy lines and pairs of zigzag lines against a grey background. Despite how they appear, all the lines are exactly the same.

Japanese researcher discovers a new optical illusion called ‘curvature blindness’

The lines in the top left and bottom right corner when viewed against the grey background appear curvy like sine waves, while those with the grey background appear to have a sharper zig-zag-like pattern. However, a closer look at the grey background reveals that the curved, dark lines that are running from top to bottom appear to carry the zig-zag pattern, although they are curved in reality.

In simpler words, the image consists of light and dark grey dashes linked to make parallel lines in waves and zig-zags on a white, grey and black background. But in reality, the zig-zags don’t actually exist.

“Physically, however, all lines are wavy lines with an identical shape; there is no triangular wave and hence there is no corner,” Takahashi said.

“Despite the simplicity and effect magnitudes, to the best of our knowledge, no one has reported about this phenomenon.”

It’s unclear exactly why human brain perceive the zigzag contour as a sharp corner.

According to Takahashi, when our brains are confused and there is ambiguity over whether a line is a smooth curve or not, it is easy for the brains to see corners rather than curves our brains.

“We propose that the underlying mechanisms for the gentle curve perception and those of obtuse corner perception are competing with each other in an imbalanced way and the percepts of a corner might be dominant in the visual system,” Takahashi explained.

“As the effect magnitudes are quite strong, unless one carefully stares at the region that looks like a corner, it is hard to find that all lines are physically wavy,” added Takahashi.

The post Japanese researcher discovers a new optical illusion called ‘curvature blindness’ appeared first on TechWorm.

from TechWorm Click Here for full article

1.4 Billion Plain-Text Credentials Leaked On The Dark Web

Searchable database of unencrypted usernames and passwords available online

Security experts have found a 41-gigabyte (GB) archive containing over 1.4 billion unencrypted user credentials on the Dark Web, which had been updated at the end of November.

The huge database consisting over 1.4 billion email addresses, passwords, and other credentials in plain text was discovered online on December 5 by security researchers from the California-based identity threat intelligence company, 4iQ. The file found is not the result of a new data breach, but an amalgamation of those from several past breaches, collated into a single database that is over 41GB in size.

According to Julio Casal, 4iQ founder and chief technology officer, the archive is the most massive aggregation of various leaks that’s ever been found in the Dark Web until date.

While scanning the deep and dark web for stolen, leaked or lost data, 4iQ discovered a single file with a database of 1.4 billion clear text credentials — the largest aggregate database found in the dark web to date.” reads a post published by 4iQ on Medium.

“None of the passwords are encrypted, and what’s scary is the we’ve tested a subset of these passwords and most of the have been verified to be true.”

The 41GB file aggregates data from a collection of over 250 previous data breaches and credential lists, which include popular websites such as LinkedIn, Netflix, Last.FM, MySpace, Zoosk, and YouPorn, as well as games like Minecraft and Runescape.

The data was organized and indexed alphabetically by the collector, and the total amount of credentials is 1,400,553,869.

“The breach is almost two times larger than the previous largest credential exposure, the Exploit.in combo list that exposed 797 million records.” continues Julio Casal.

“This new breach adds 385 million new credential pairs, 318 million unique users, and 147 million passwords pertaining to those previous dumps.”

An extensive examination of the archive gave researchers a glimpse of some of the most commonly used weak passwords by the users, which includes passwords such as “123456,” “123456789,” “qwerty,” “password,” and “111111.”

While some of the breaches happened a few years ago, expert observed that the cybercriminals still have good chances of accessing personal accounts as users tend to reuse the easy and common passwords or the same passwords for multiple online services.

“Since the data is alphabetically organized, the massive problem of password reuse — — same or very similar passwords for different accounts — — appears constantly and is easily detectable.” states the post.

The researchers highlighted that 14% of the 1.4 billion records (almost 200 million) had not previously been available in readily-usable decrypted form. In other words, the passwords and usernames, were new and in plain text.

“We compared the data with the combination of two larger clear text exposures, aggregating the data from Exploit.in and Anti Public. This new breach adds 385 million new credential pairs, 318 million unique users, and 147 million passwords pertaining to those previous dumps.” continues the expert.

While it is unclear who is behind the collection of billions of user credentials, the culprits have however left the Bitcoin and Dogecoin wallet addresses accessible for anyone who wants to donate for their alleged efforts.

In order to stay safe from potential cyber-attacks, we recommend our readers to use strong passwords, avoid using same passwords on multiple sites, and regularly keep changing your passwords.

Source: securityaffairs

The post 1.4 Billion Plain-Text Credentials Leaked On The Dark Web appeared first on TechWorm.

from TechWorm Click Here for full article

How To Start Mobile Penetration for iOS

iOS applications like better out-of-the-box security than their Android alternatives due to Apple’s much more tightly controlled environment. Nevertheless, that advantage does not mean much in case you do not perform a thorough job securing the apps of yours.

That is the reason there has to be somebody who assumes the job of penetration tester on each team. The info below highlights the appropriate topics in Apple’s iOS Security Guide and OWASP’s Mobile Security Testing Guide. It can serve as a very helpful cheatsheet for starting up penetration testing for iOS apps.

Preparing the assessment environment

An important component of dog pen testing an iOS software will be the usage of the appropriate tools and devices. You will find numerous different tools.

App logic

The first and most significant action is usually to completely evaluate the app’s flow and entry data points, which includes how and where the information is kept in the unit or perhaps transmitted to APIs.

Applying a testing framework

Before you apply an assessment program, you want an obvious method in place. For a place to start, I suggest creating your technique around the OWASP Mobile Top ten.

OWASP suggests you begin by breaking down the ten vulnerabilities into specific tests which could be categorized into one or even much more of these sections. Additionally, you are able to develop specific tests targeting the range of every section.

Specific iOS security concerns

The iOS platform has very specific security concerns when analyzing the vulnerabilities of apps.

Checking for insecure data storage

Data can be stored in different formats including (but not limited to):

  • The NSUserDefaults class
  • Log files
  • XML and plist
  • SQLite files
  • Keychain data

Capturing the traffic with ZAP or BURP

You are able to make use of BURP of OWASP ZAP as an assault proxy to gain all of the visitors between the app plus its outside connections. This tutorial shows you exactly how to configure OWASP ZAP to intercept all traffic. BURP has specific guidelines to setup the proxy in this situation. Its configuration has an iOS simulator.

When you begin capturing the site traffic, you are able to work with active or passive scanning on each proxies for particular strikes to APIs being called by the app. In case the software is employing SSL certificate pinning, you may wish to try bypassing SSL Pinning by utilizing SSL Kill switch on the iPhone device. In case this doesn’t work, you should most likely try to reverse the application to discover the actual implementation. You are able to accomplish this by utilizing Frida or maybe Cydia to avoid certificate pinning at runtime.

Reversing the application

Among the OWASP Top ten Mobile vulnerability listings recommends you learn just how “reversible” your application is. iOS programs are, by default, significantly tougher to reverse than Android, though it is certainly possible. Think about taking a look at several of the suggested resources for ios reverse engineering.

The post How To Start Mobile Penetration for iOS appeared first on TechWorm.

from TechWorm Click Here for full article

CEEK Launches Token Sale to Connect Artists and Fans In VR

Artists and content creators in the entertainment industry are passing up on potential revenue due to their inability to reach a huge part of the global audience. Despite the innovation and extended reach of VR technology, many potential participants are still sidelined from playing a part in the entertainment industry, especially as fans and followers.

VR in the entertainment industry

With concerts repeatedly sold-out and audience demands most often beyond the capacity of available physical arenas, the limitations of the current state of the entertainment industry is further exposed. However, the technology that simulates the actual environment, making viewers from thousand of kilometers and continents away enjoy the aura of a given event has gone a long way in making a global community out of the real world.

The VR technology effectively simulates the communal experience of attending a live concert, a sporting event, educational classroom, e.t.c, from anywhere at anytime.

CEEK Launches Token Sale to Connect Artists and Fans In VRCEEK and the blockchain

CEEK is taking innovation in the entertainment industry a step further by the implementation of blockchain technology and its token sale. This enables artists and celebrities to “mint” coins that are attached to contents, therefore creating virtual event tickets and merchandise which in turn makes possible an unlimited revenue stream.

Celebrity minted coins and virtual merchandise items take on the traits of cryptocurrency as each are assigned their own Ethereum address, therefore offer fans the ability to cash in by owning rare items that can gain in value very quickly in virtual reality. Artists may sign these items with special cryptographic token signatures that cannot be duplicated and are authenticated on the blockchain as to their rarity and value.

The platform will be powered by tokens using the ERC20 Adapter and will be Bancor Smart Tokens, allowing them to connect to the Bancor network. A Bancor Token Converter can be launched for each smart token with a CEEK reserve using a configurable “weight”. Once the tokens are minted, the total number of custom tokens may fluctuate and the price will dynamically adjust based on market sentiment and demand.

CEEK Launches Token Sale to Connect Artists and Fans In VR

Blockchain technology for industrial enhancement

By implementing blockchain technology, there is an enhancement of the industry as a whole. Global reach becomes automatically simplified since the characteristics of the blockchain platform remains universal in every part of the world. The platform will remove the hurdles of creating premium content and virtual goods featuring licensed music and celebrity assets by offering clearing house services through Smart Contracts that automatically pay respective rights holders and publishers.

The technology will also enable a growing ecosystem of world class partners who are using the CEEK Platform to scale existing 2D content into virtual reality, as well as creating and distributing uniquely original experiences.

The network is in late-stage discussions and have upcoming releases with Oculus VR, Disney Music, Fox Studios, World Of Dance, leading award shows, sports teams, brands, festivals, over 30 labels, studios, and mobile carriers. Additionally, CEEK is partnering with Universities and Hospitals to offer educational programming.

The post CEEK Launches Token Sale to Connect Artists and Fans In VR appeared first on TechWorm.

from TechWorm Click Here for full article

Microsoft Launches Quantum Development Kit In Free Preview Version

Software giant releases a quantum programming language and simulator

Microsoft has now announced that it has released a free preview version of its Quantum Development Kit that consists of a new programming language for quantum computing called Q#. The tech giant also launched a compiler as well as quantum computing simulator that will allow developers to test and debug their quantum algorithms.

Microsoft’s Quantum Development Kit was first revealed at the Ignite conference in September. According to the company, the Q# programming language is a high-level programming language that includes a native type system for qubits, operators and abstractions. The local version, released as part of the preview, can simulate up to 32 quantum bits (qubits) using a typical laptop (some 32GB of RAM). Microsoft is also offering an Azure-based simulator that can scale up to 40 logical qubits of computing power.

“Quantum computing takes a giant leap forward from today’s technology—one that will forever alter our economic, industrial, academic, and societal landscape. With the preview release of the Microsoft Quantum Development Kit, we are one step closer to realizing this vision,” the Microsoft Quantum Team, wrote in a post.

While quantum computing is complex, to say the least, Microsoft says its kit is designed to get developers up to speed with programming on quantum computers. According to the company, the kit can be used by all developers, as the kit does not require one to be an expert in quantum physics. Also, since its deeply integrated into Visual Studio (VS), a lot of elements will be familiar to developers who already use VS to develop apps.

“What you’re going to see as a developer is the opportunity to tie into tools that you already know well, services you already know well,” Todd Holmdahl, corporate vice president in charge of the company’s quantum effort, said in an announcement. “There will be a twist with quantum computing, but it’s our job to make it as easy as possible for the developers who know and love us to be able to use these new tools that could potentially do some things exponentially faster – which means going from a billion years on a classical computer to a couple hours on a quantum computer.”

In addition, the dev kit also comes along with a “comprehensive suite” of documentation, libraries, and sample programs, that would help people get familiar with aspects of quantum computing such as quantum teleportation. Quantum teleportation is a method of securely sharing information across qubits connected by quantum entanglement.

Microsoft’s plan is to build a “full-fledge quantum computing system, “which includes everything from the quantum computing hardware to the full software stack,” according to the company.

The Quantum development Kit can be downloaded now.

The post Microsoft Launches Quantum Development Kit In Free Preview Version appeared first on TechWorm.

from TechWorm Click Here for full article

Uber Customer Accidentally Charged $18,000 For A 21-Minute Ride

Uber Accidentally Charges A Customer $18K For A 21-Minute Ride That Was Supposed To Cost Under $20

Never would have an Uber customer thought in his wildest dreams that a 21-minute cab ride would cost him $18,000.

The victim, Hisham Salama grabbed an Uber to visit a friend at St. Joseph’s hospital in Toronto, Canada on Friday night. He was expecting to pay around $20 for the ride. However, he was shocked to see a significant amount of $18,518.50 pending on his credit card for a five-mile, 21-minute ride that was supposed to cost only $12 to $16, according to Slate.

When he contacted Uber, the company said the fare was accurate and refused to alter the charge. “My first reaction was to just laugh, because I thought it was probably just an error but then about 20 minutes (later), when I was with my friend, I thought I should probably check my credit card to make sure everything was OK,” said Salama, who had opted for the metered Taxi fare instead of the standard Uber X ride, reported Vice. That’s when he noticed there was a significant amount pending on his credit card.

The news of the incident was first reported by a friend of Salama on Twitter on Saturday disputing the price charged.

Later, the taxi-hailing company accepted the error and has since issued a full refund to Salama along with a $150 credit in his Uber account. “There was an error here and it has been resolved,” an Uber spokesperson told Slate. “We have provided a full refund to this rider and apologized to him for this experience. We have safeguards in place to help prevent something like this from happening, and we are working to understand how this occurred.”

Source: Vice

The post Uber Customer Accidentally Charged $18,000 For A 21-Minute Ride appeared first on TechWorm.

from TechWorm Click Here for full article

‘Moneytaker’ hacker group stole millions from U.S. and Russian banks

Russian hacking group steals more than $10 million from U.S. banks

A Moscow-based security firm, Group-IB has discovered a new group of Russian-speaking hackers who have stolen millions of dollars since May 2016 through international heists.

In a 36-page report published on Monday, Group-IB, which runs the largest computer forensics laboratory in eastern Europe, provided details of the newly-disclosed hacking group “MoneyTaker” named after a piece of custom malware it uses. According to the Group-IB, the hacking group has carried out more than 20 successful attacks on financial institutions and legal firms in the U.S., UK and Russia in the last two months alone.

The MoneyTaker group stole funds by targeting electric fund transfer networks like SWIFT (Society for Worldwide Interbank Financial Telecommunication). The MoneyTaker group also targeted law firms and financial software vendors. Group-IB has confirmed that 20 companies were successfully hacked, of which 16 attacks were on U.S. organizations, three on Russian banks, and one against an IT company in the UK.

In the U.S., the group primarily targeted smaller, community banks as victims, and stole money by infiltrating the credit card processor, including the AWS CBR (Russian Interbank System) and SWIFT international bank messaging service (U.S.). This act of theirs went unnoticed for a year and a half.

“MoneyTaker uses publicly available tools, which makes the attribution and investigation process a non-trivial exercise,” said Dmitry Volkov, Group-IB co-founder and head of intelligence. “In addition, incidents occur in different regions worldwide and at least one of the US banks targeted had documents successfully exfiltrated from their networks, twice.”

The first attack happened in spring of 2016 when money was stolen from a bank by breaching its “STAR” network, a bank transfer messaging system that connects 5,000 ATMs in the U.S.

MoneyTaker members also targeted an interbank network known as AWS CBR, which interfaces with Russia’s central bank. The hackers also stole internal documents related to the SWIFT banking system, although there’s no evidence they have successfully carried out attacks over it.

“The scheme is extremely simple. After taking control over the bank’s network, the attackers checked if they could connect to the card processing system. Following this, they legally opened or bought cards of the bank whose IT system they had hacked. Money mules – criminals who withdraw money from ATMs – with previously activated cards went abroad and waited for the operation to begin,” said the Group-IB.

“After getting into the card processing system, the attackers removed or increased cash withdrawal limits for the cards held by the mules. They removed overdraft limits, which made it possible to overdraw even with debit cards. Using these cards, the mules withdrew cash from ATMs, one by one. The average loss caused by one attack was about $500,000 USD.”

In Russia, $1.2 million was stolen per attack. Last year, stolen SWIFT account credentials was used by online criminals to steal $81 million from a bank in Bangladesh. The amount of information MoneyTaker has collected on the Star, SWIFT, and AWS CBR networks has increased the possibility of the group looking to carry more attacks targeting the interbank payment systems, the group said.

“A number of incidents with copied documents that describe how to make transfers through SWIFT are being investigated by Group-IB. Their contents and geography indicate that banks in Latin America may be targeted next by MoneyTaker,” company officials said in a statement.

“Group-IB specialists expect new thefts in the near future and in order to reduce this risk, Group-IB would like to contribute our report identifying hacker tools, techniques as well as indicators of compromise we attribute to MoneyTaker operations,” they added.

“The more we dig, the more we’ll find,” Group-IB’s Volkov said. “This report doesn’t represent the full picture, and I can say with 100 percent certainty that there are more victims that haven’t been identified yet.”

Source: The Register

The post ‘Moneytaker’ hacker group stole millions from U.S. and Russian banks appeared first on TechWorm.

from TechWorm Click Here for full article

6-year-old YouTube star earns $11 million a year for reviewing toys

This 6-year-old boy is making $11 million a year on YouTube reviewing toys

Ryan, an average six-year-old, who likes playing with toy cars, riding tricycles, and going down water slides, became YouTube’s biggest star last year when he made $11 million. Thanks to his family-run YouTube channel “Ryan ToysReview.”

According to Forbes’ annual list of highest-earning YouTube celebrities, “Ryan ToysReview” channel fetched the host ‘Ryan’ about $11 million between June 1, 2016 and June 1, 2017 before management fees and taxes, of course. This earning saw him get the eight position on the Forbes’ list, which he shares with Anthony Padilla and Ian Hecox, of the popular comedy channel, Smosh.

“Ryan was watching a lot of toy review channels — some of his favorites are EvanTubeHD and Hulyan Maya — because they used to make a lot of videos about Thomas the Tank Engine, and Ryan was super into Thomas,” Ryan’s mother told TubeFilter last year. “One day he asked me, ‘How come I’m not on YouTube when all the other kids are?’ So we just decided — yeah, we can do that. Then we took him to the store to get his very first toy — I think it was a Lego train set — and it all started form there.”

The family’s channel, Ryan ToysReview, was created in March 2015. It initially didn’t get many views but started going viral within four months after they released a video in July 2015 titled “100+ cars toys GIANT EGG SURPRISE OPENING Disney Pixar Lightning McQueen kids video Ryan ToysReview“. As of December 2017, this video has more than 800 million views. Further, another video that shows Ryan running through an inflatable Cars water slide posted in April 2016 has earned him more than a billion views.

The adorable YouTuber has over 10 million subscribers and his videos have been viewed more than 16 billion times. The videos normally feature him playing games with his family and being surprised with toys. Also, the videos feature sincere and enthusiastic commentary from Ryan with off-camera guidance from his parents. According to The Verge, Ryan’s channel viewership converts to around $1 million a month in advertising revenue alone.

“He loves cars, trains, Thomas and friends, Lego, superheroes, Disney toys… family fun adventure and so much more!” reads the description of his channel. “Ryan will also love doing fun and easy science experiments for kids!”

The post 6-year-old YouTube star earns $11 million a year for reviewing toys appeared first on TechWorm.

from TechWorm Click Here for full article

Google releases iPhone hacking tool for security researchers

Google releases a tool that helps security researchers hack iPhones

Ian Beer, a well-known name among iOS bug bounty hunters who works for Google Project Zero, released a proof-of-concept tool on Monday that allows security researchers and other developers to hack into iOS 11.1.2, a recent version of Apple’s operating system. This could open up the possibility of jailbreak for devices such as iPhones and iPads running iOS 11.1.2.

For those unaware, Google’s Project Zero identifies bugs and exploits in all kinds of software of various companies to make them safer.

According to Beer, the tool released takes advantage of an exploit called “tfp0”. Beer says the tool was tested on iPhone 6s, iPhone 7 and iPod touch 6G. However, he believes that with some tweaks, the tool should work on all devices.

“tfp0 should work for all devices, the PoC local kernel debugger only for those I have to test on (iPhone 7, 6s and iPod Touch 6G) but adding more support should be easy,” Beer wrote .

The Google researcher last week teased this release in a tweet that asked the iOS 11 kernel security researchers to keep a research-only device on iOS 11.1.2 or below raising sparks of a fresh exploit of the OS.

“If you’re interested in bootstrapping iOS 11 kernel security research keep a research-only device on iOS 11.1.2 or below. Part I (tfp0) release soon,” Beer said at the time.

Speaking to Motherboard, Google told that Beer’s goal is to allow other security researchers to explore and test iOS security layers without the need to develop and find their own exploits. In other words, Google gave other researchers a head start to carry out their own research.

According to Google, their ultimate goal is to help security researchers search and find other potential vulnerabilities and hopefully report them to Apple so that they get fixed and the operating system is made safer.

“While it might seem surprising that Google would release a tool to hack a device from a competitor, it actually makes a lot of sense. The iPhone is one of the hardest consumer devices to hack, and researchers who can do that and are able to find bugs in it rarely report the bugs or publish the tools they use because they are so valuable”, said Motherboard.

However, the disclosure opens up the possibility for the jailbreaking community to bootstrap an iPhone jailbreak until Apple issues a fix.

Source: Motherboard

The post Google releases iPhone hacking tool for security researchers appeared first on TechWorm.

from TechWorm Click Here for full article

Apple Is Purposefully Throttling Older iPhones With Degraded Batteries

Degraded Batteries Controversy: Is Apple Intentionally Slowing Down Older iPhones?

A Reddit thread over the weekend highlighted some interesting theories as to why some iPhone 6 or iPhone 6s family devices are witnessing slower processing speeds running iOS 11, which led to speculation that Apple is intentionally slowing down older phones to retain a full day’s charge even if the battery has reached the end of its operational life.

According to TeckFire, the author of the original Reddit post, said that his iPhone 6s felt very slow even after updating the software to iOS 11 multiple times. He then decided to perform a Geekbench test after using brother’s iPhone 6 Plus that ran much quicker than his. TeckFire went on to replace the battery on his older iPhone 6s.

“I did a Geekbench score, and found I was getting 1466 Single and 2512 Multi. This did not change whether I had low power mode on or off,” TeckFire wrote. “After changing my battery, I did another test to check if it was just a placebo. Nope. 2526 Single and 4456 Multi.” TeckFire’s battery had a wear level of around 20%.

“From what I can tell, Apple slows down phones when their battery gets too low, so you can still have a full days charge. This also means your phone might be very slow for no discernible reason,” he added.

Last year, a growing number of iPhone 6s users reported that their device was suffering from unexpected shutdowns. At that time, Apple launched a repair program for affected iPhone 6s owners offering free battery replacements to owners of devices. The company had cited the issue affecting a “very small” number of iPhone 6s devices.

However, around two months later, Apple released iOS 10.2.1 and said that since more users were affected than it initially thought, the fix was released in the form of a software update. The company said the update had decreased the unexpected shutdowns by 80 percent on iPhone 6s devices and by 70 percent on iPhone 6 devices. At the time, there were speculations that the update made adjustments to the power management system in iOS.

Although, it now seems that the company started underclocking the CPU in iOS 10.2.1, if a battery in poor condition was detected.

“The increased power draw of the A8 and A9 chips will make your phone shut down when you don’t have enough voltage,” says TeckFire. “This gets around it, by lowering the clock speed, so you don’t have to replace your battery, and can continue using your phone. I just wish Apple would tell us about this.”

TechFire says the iPhone 5s isn’t affected by this issue. Further, iPhone 7 and newer models aren’t affected either, as they have low power cores that handle almost everything.

While the Reddit thread hypothesizes that Apple is intentionally controlling the performance of older devices to make the new hardware look more appealing, the accusation looks less heavy. Apple is yet to comment on the issue.

Meanwhile, those who are interested in finding out their phone’s performance, Redditor Adolf-Intel has suggested that users download the CpuDasherX app to check their clock speeds to see if it matches (a factory iPhone 6s comes in at 1,848MHz, for example) to what the benchmarks are saying.

Source: Macrumors

The post Apple Is Purposefully Throttling Older iPhones With Degraded Batteries appeared first on TechWorm.

from TechWorm Click Here for full article

1 2 3 8