How to protect your smartphone from being tapped using encryption tools

Defending your privacy on smartphones or other mobile devices from hackers and data thieves is not easy, actually not even impossible if you have decided to take advantage of special hardware contrivances as well as to install the right tools on. That’s the reason why we are going now to …

Mobile phone spy software: all you need to know before starting to spy on a cell phone

Why should anyone ever want to spy on a cell phone at a distance? Well, there could be a lot of reasons for that, actually as we said so many times, to spy on someone’s mobile is illegal. However there are extreme situations, related to the personal sphere, requiring an …

How to choose the best spy bugs without getting tricked

Lately searching for a valid product on the Internet has become a very difficult task. For example, in the case of spy bug transmitters or any other electronic device commonly used in the investigation field, you will note that along with those few old companies, come also across a lot …

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

The answer to the wiretapping: the Stealth Phone

aprile 4, 2013 Self Defence No Commenti

More and more frequently, on newspapers’ headlines, we can read news about telephone wiretapping of conversations between politicians, business men, public officials and “important” people. Nowadays, anyone who knows even just a little of a person in certain circles risks that his conversations are intercepted. The only solution is the use of an encrypted phone.

Through the different systems developed by the technology applied to the cell phone (GPS trackers, network access, app and software ..) we are always reachable at any place and at any time. This advantage can quickly turn into a curse at a time when we share sensitive information, or simply personal ones with a person whose phone is placed under control. We would be in danger of having our name exposed, and might be facing consequences for our personal life or business.

To save ourselves from this kind of intrusion of our private space, and to make sure that our confidential conversations remain confidential, we need to be equipped with an Endoacustica encrypted cellphone. It’s like a normal cell phone, but inside, there are a powerful 256-bit encryption software that guarantees transmission of our phone calls in an encoded format, which cannot be decrypted by any third party. We just need that the person at the other end of the phone call is equipped with the same encryption key, and our calls will be absolutely safe, impossible to decode. The secret key can be edited at any time, thus adding one more layer of security. The installed software is completely invisible and can be password-protected.

You have to know that wiretappings are mainly based on the identification number of the device. So, who thinks to be safe changing the SIM card and using the same cellphone solves nothing. In this moment, the most advanced model is the Stealth Phone. It’s equipped with a software that continuously changes its handset identification number (IMEI). This phone doesn’t need another encrypted phone to work properly and it can work even as stand-alone. It also has a built-in firewall that would notify you in real time of any intrusion attempt with acoustic sound or blinking light notification. There are also landline phones to ensure secure phone calls at any time.

How airport body scanners work

marzo 29, 2013 Biotechnology No Commenti

There are millions of travelers each day that are subject to monitoring through the body scanners or, more technically, millimetral scanner. These security tools “lay bare” the passengers to check what is hidden under clothing.

In the beginning these instruments were introduced to avoid the search “by hand” by the agents of airports. Until a few years ago, the X-ray detectors could see only metal objects possibly present under the clothes.
Millimetral scanners, however, are lighter radiation, but at very high frequency (millimeter waves, in the order of Terahertz (112 Hertz)) crossing the clothes, but they’re partially reflected from any object, even non-metallic, and skin. The opaque materials (for example clothes) become transparent with this device allowing to distinguish any hidden objects.

In the most popular devices in the U.S., the millimeter-wave are transmitted simultaneously from two antennas that rotate around the body. The energy of the waves reflected from the body or from other objects is collected by two detectors placed diametrically to the object and then used to reconstruct a 3D image.

The scan lasts 2-3 seconds and raises some concerns regarding privacy. People scanned appear virtually naked and then you can see everything including any breast implants or piercings in sparsely exposed parts.

At this concern was answered by putting the operator that observes images in a room from which he can’t see passengers directly. Furthermore, at least in the U.S., passengers can refuse to pass through the scanner, preferring to be searched by an agent. The system also doesn’t provide at the time the ability to save and store images.

Contrary to what one might think, electromagnetic waves used have a power 10 thousand times lower than those of a common mobile phone and aren’t considered ionizing, ie aren’t able to break the bond that unites electrons and nucleuses in a atom, therefore they aren’t overly harmful to health. It could be said that privacy and health are slightly sacrificed for security. In fact, the biometry is often applied to the surveillance industry, just think to the fingerprint locks increasingly used both in private companies and in public places. These allow for greater security due to the singularity of the recognition and offer alternative management methods used in the absence of electric current.

Ways to improve smartphone battery life

marzo 26, 2013 Technology No Commenti

The smartphone abandons you just when you need it? Once the battery was with us for weeks. It was the time when the mobile phone was used only for calls and sms. It isn’t so now: with the modern smartphone you can play, surf the internet, keep an eye on your home and monitor your partner. These among many other activities. It isn’t uncommon that the battery doesn’t arrive until evening.

There are some small tricks that help us to increase the autonomy of the mobile phone. They aren’t miraculous softwares or complex applications, but attentions to reduce the normal battery consumption.

Typically smartphones include a brightness sensor able to detect the light of the environment and consequently adjust the brightness of the screen. More light is stronger, the screen will be bright. In contrast, in a dark environment, the brightness will be weaker. The first precaution may therefore be to manually set the screen light choosing the best configuration for yourself, thus avoiding to strain the power source.

You should also know that when we don’t use the connections, it doesn’t mean that they are turned off. The Wi-Fi connections on making continuous connections consuming energy. Same thing goes for Bluetooth or GPS. So it would be profitable turn off the networks when they aren’t necessary.

An element that may be less known regarding the telephone connection. Every smartphone is set to use the 3G network, ie the data network. If you don’t surf the Internet, 2G network is perfect to manage phone calls and SMS and above all allows you to earn useful minute battery.

The same thing is valid for the setting of continuous data synchronization. If this setting is activated, the phone will check if there are email or notifications even when it’s in stand-by mode. Disabling automatic data synchronization, you can update your mail manually, when you desire.

Implementing these recommendations could be boring, but through shortcuts on the screen or facilitated menu configuration it may be easier than you think, especially useful if it comes to emergency situations where it isn’t possible to charge the phone.

Watches with thousands of functions

marzo 21, 2013 Technology No Commenti

The clock now no longer serves only to mark time. Today this type of equipment have many other features and applications. A watch can for example integrate a GPS locator, interact with PCs, tablets and smartphones, become a real spy complete with micro recorder and micro camera.

In this context, couldn’t miss the contribution of the giant Apple that has submitted a project for the iWatch, an object that will revolutionize the concept of watches. The device, in addition to mark the time and interact with the smartphone, will be a true digital “key”, linked to the user, which could be used as an element of access to personal devices. Infact iWhatch, thanks to special biometric sensors, only works in presence of the owner or with his fingerprints. Needless to steal it, in short.

The object will be transparent, made ​​of vitreous material, with iOS operating system and equipped with an NFC chip that will replace the Bluetooth connectivity. Don’t enclose itself many functions, but will represent an extension of tablets and smartphones that will manage the “hard works”. In this manner iWatch should have a long autonomy. It will howeaver be able to manage calls, messages, email, and basic applications of the device that is connected to, but above all to keep codes and passwords able to unlock electronic clock when it is near, thanks to software Passbook. The clock may be integrated with Siri, the voice assistant from Apple, so as to provide voice commands.

The watch evolution of Apple isn’t yet available on the market and in any case will be the first experiment of this kind for the company. Who should carry out professional tasks of survillance must rely on professionals in the field that guarantee efficiency immediately, as Endoacustica.

The electronic bracelets will change our daily life

marzo 18, 2013 Biotechnology No Commenti

The introduction of wearable electronic devices will bring profound changes in our daily lives. After the smart glasses, comes Myo, the bracelet designed by the U.S. Thalmic Labs.

It’s enough move your fingers to interact with your PC and other devices: scroll the pages up or down, start playing music or video, rotate the arm as virtual knob to increase the volume, raise a hand to block a play, interact with a presentation of work.

The creators have recorded a series of electrical pulses on the basis of our movements and then translate them into thousands of digital controls. They analyzed the connections of the human muscle, both at rest and in action, producing electrical microvolt. Using the technique of electromyography, the sensors placed inside Myo have the ability to amplify of thousands of times the recording of the signal, sending it to an internal processor which performs machine learning algorithms. The device, wirelessly connected (using the bluetooth system 4.0), allows you to interact with remote computers, video games, smart phones and appliances.

Myo improves with time, because as the device is used, it learns to recognize always better the gestures of the user, thereby increasing its accuracy. Obviously the product now is limited to the hands and arms, but in the future may also relate to other parts of the body. The bracelet will be on sale at the end of 2013 to about $ 149.

In fact, the bracelets are items that have numerous uses. One example is the anti drowning and anti loss Endoacustica’s bracelet. For years the device is chosen for the safety of thousands of children.
The bracelet is connected to a base unit which sends an alarm if the wearer comes into contact with the water or moves away over a predetermined limit (usually 50mt). A great way to keep track of their children, but also domestic animals when you are outdoors.

Smartphone in the freezer to discover all the secrets of Android

marzo 13, 2013 Technology No Commenti

Researchers of the University Friedrich-Alexander Erlangen, Germany have found an easy way to hack the encryption system adopted by the fourth version of Android.
Sophisticated algorithms and software every day manage to access to millions of informations contained in smartphones and electronic devices of all kinds. Behind there is always the work of teams of experts, hackers or not, that studying the characteristics of the systems and then violate them.

It didn’t go exactly in this way for the German researchers that have discovered an unusual flaw in the “Ice Cream Sandwich” system, that is, the data protection of the most advanced Android devices. It’s the cold to ease the encryption that substantially prevents access to the contents on the smartphone without having first unlocking the screen.

The test was carried out not so much to test the validity of the software, but to solve a problem that worries investigators and law enforcement: be able to trace the information contained in a smartphone for legal reasons. Most of the time they are used spy software that are installed in a few minutes on mobile phones of those who want to control and you have the opportunity to listen phone calls, view incoming and outgoing text messages, listen to what is happening around the device and check the position GPS.

More specifically, the researchers put a Galaxy Nexus in the freezer for an hour, bringing it to a temperature of -10°C, then they took it off, put back the battery and they managed to recover contacts, pictures, files and browser history . Hacking is done via software, activated in place of the operating system, able to send the collected data to another machine.

What has happened: when the chips are very cold thay keep longer the data and facilitate the deciphering of protection. The freezing is a technique already used in the forensic field on PCs and laptops, but nobody had applied to smartphones. The method was named Frost, Forensic Recovery of Scrambled telephone.

The functional clothing: between defense and help

marzo 8, 2013 Self Defence No Commenti

More and more often the clothing assumes functional roles well as aesthetic. Just think of military equipment or articles for extreme sports. A garment that contains both previous examples can surely be the Endoacustica suit with rubber shock (purchased separately).
The fabric that carries the padding, is in lycra, while the padded areas are covered with an abrasion resistant cordura with Teflon finish. This type of padding, combined with an hard and resistant shell, works much better than any other rigid protection currently available on the market, which clearly penalizes the flexibility and freedom of movement.

Even if they are very resistent, the overalls are very thin (max. 9 mm) and therefore can be worn like a second skin under clothing. As absurd, the harder you hit the padding, the better it works. The padding material is flexible, breathable, re-usable and washable and it’s made of a revolutionary material called d3o (dee-three-oh) which is made of “Intelligent Molecules” that flow with you as you move but on shock/impact lock together, in a fraction of a second, to absorb the impact.
A revolutionary garment in short, increasingly used by athletes of extreme sports, stuntmen, actors, martial artists, groups attack and many other enthusiasts and professionals.

The clothing also tries to help people with physical problems, such as the overall made ​​by the University of Illinois, which could help the blinds. The outfit applies pressure on the body that warns you when someone is nearby or when you are close to objects and obstacles. The dress is made ​​up of robotic arms and sensors which send an ultrasonic signals, it’s called SpiderSense, because it recalls the abilities of spiders.

The suit is organized in modules and each module is a small box of 6x4x3 cm which contains both the sensor for ultrasound both the arm, length 6 cm, able to rotate and to provide the necessary pressure to alert the user. SpiderSense can also be used by cyclists to provide them an idea of traffic, putting some sensors on the back and arms (such as rearview mirrors).

Enter into the screen and interact with the PC

marzo 5, 2013 Biotechnology No Commenti

From time immemorial, the man try to interact as much as possible with machines. Now have been patented powerful tools used by law enforcement to look through walls, for example, or the more and more used of biometric access systems.

The new frontier is Leap Motion and will be on the market within a few months. It’s a box to be placed under the PC or TV screen and allow you to enter physically into the device. The Leap Motion works roughly like Kinect, the system webcam for the Xbox 360 console from Microsoft. Thanks to a field of infrared rays, projecting upwards and translates the gestures into commands interpretable by the computer.

Long about 76.2 mm, a little more than a USB, occupies the same type of port, through which it interfaces to a PC or TV, and is capable of detecting the movement of the hands and of individual fingers in a field of view of 150° of amplitude, with a speed of 290 frames per second and a detection accuracy of the movement of only a hundredth of a millimeter.

Therefore allow you to move files, open documents, enlarge a photo, moving your hand in front of the screen. The idea is of Buckwald Michael and David Holz founders of the company of the device. Buckwald has worked for several years in the three-dimensional graphics struggling in having to work hard and for a long time with the mouse to get good results. So the two have had the idea to enter into the program, making them easier the work.

The project has quickly gathered over thirty million dollars in funding and more than forty thousand developers have registered on the site to start creating the first applications, already numerous.

This item could be the step of overcoming the relationship man-machine no longer divided by a screen, thanks to simple motion sensors and technologies that are increasingly precise and low cost. In fact the cost would be around $70. Leap Motion developers are discussing with the giants of consumer technology to directly integrate the device in laptops.

The new touchless method could bring significant benefits not only for graphic projects or action games, but it could have valuable applications in medical and scientific field.

Atooma, the best app in the world

febbraio 28, 2013 Technology No Commenti

Atooma is the “best application in the world”. They decided at Barcelona World Congress after a selection made from over 1400 competitors. Atooma is an Android application developed by four Italian guys of 27 years and allows you to customize functions on your phone.

In short, the program gives you the ability to create several mini-apps without having to know the intricate programming codes. To date Atooma is used by over 70 thousand people, thanks to its versatility: it can for example lower the ringtone when you are in the office, send a text message as soon as you return at home, turn on the speakerphone in the car, and also connect you to social networks or to your surveillance systems. In this regard, it should be noted that the app made ​​in Italy can be used to customize even more the connection services between your smartphone and powerful instruments of control and monitoring of their environments allowing you to raise your security level.

Atooma is started as an experiment to revolutionize the mobile phone operating systems, idea on the basis of the thesis of one of the components. The work has been noticed and awarded in various contests.
At the time the application is only available for smartphones with the Android operating system, it’s under experimentation a version for iOS that appears more tricky.
Although the project of the young italians is going very well, weren’t collected enough money to further grow the business.

The smart TV in a USB key

febbraio 25, 2013 Technology No Commenti

New devices that make “smart” any TV. These systems, mostly based on Android, transform any home screen in a tablet. Apparently they look like bigger usb key, but instead of the connector to the computer there is a HDMI video port that allows us to connect directly to the TV. There are of all types: unbranded and cheaply or branded and with a range of accessories supplied for an easier use.

Among the most simple we find the key Smartkey TV – Movie Pack Asystel (sold to about 99 euro). Essential aesthetically, supports Android 4.4 and the initial configuration is done through wizards. The interface is available in several languages ​​and there are already many applications installed including the online movie rental service. Clearly for this type of apps is important that the Wi-Fi coverage is very good, so as to allow a high speed data transmission. In the package of Smartkey TV there are a HDMI cable and a dedicated controller. Have been found some gaps; seems that the system refers to the key as if it was a telephone and there are a series of applications that don’t have a real use, like the one for the integrated camera which, obviously, doesn’t exist.

Another good example is the Manhattanshop Android TV Dongle U1A (costs 79.80 euro). Aesthetically it is very refined, supports Android 4.4 and behaves exactly like a tablet. The initial interface is empty and in English, with nothing installed, but it gives direct access to Google Play, the market for app of Google, that enables customization at 360°. Even in this case not all the apps work properly. To control the “tablet”, since the TV isn’t touch, we can use any wireless keyboard and mouse, or purchase a separate dedicated controller. Surfing the web is slower than that obtained with the tablet.

Clearly don’t lack the Apple‘s alternative to approach to Smart TV. The Apple TV allows you to rent and watch it on TV all the movies available on iTunes. Although the catalog is very large, it happens very often to don’t find what you are looking for. You can’t install and use app directly on the Apple TV, but we can use it to view the screen of our iPhone or iPad on your TV.

Through the new smart devices, you can also check the surveillance systems in connection with your tablet or smartphone. The ongoing need to monitor their own spaces often leads to the choice of integrated surveillance systems such as those proposed by Endoacustica.

Calendar

dicembre: 2017
L M M G V S D
« Nov    
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …