Google’s A.I.-powered voice recorder and transcription app comes to older Pixel phones

Google’s A.I. powered voice recorder app introduced at Google’s October hardware event was one of the company’s more impressive demos. The new app taps into advances in A.I., speech processing, and speech recognition in order to automatically transcribe a voice recording with few mistakes, in real-time as the person is speaking. Unfortunately, Google’s Recorder app was locked to Pixel 4 devices at launch. That has now changed.

As first spotted by Android Police, the Recorder app is available to Android users with older Pixel devices, including Pixel 2, Pixel 3, and Pixel 3a. The updated support was added to the app today, Sensor Tower also confirmed. But the lack of publicity around the launch has led it to see fewer than 1,000 downloads so far.

voice recorder

Google had previously announced its intention to make the app more widely available. In a recent Reddit thread, a company representative said the app would become available to more Pixel users in the future via a software update. They didn’t say when that update would arrive, though.

While there are many voice recorder apps on today’s market, there are fewer that offer real-time transcriptions. And of those that do — like Otter.ai, for example — the resulting text is often half-garbled. While these services can still be useful as a way to quickly find a section of a recording to then play back and manually transcribe, the lack of accuracy can limit adoption.

Google’s Recorder app was demonstrated at Google’s fall event as capable of taking a far more accurate transcription. Of course, the app was being not put to real-world use at the time — with different types of voices, accents, and background noise, it may not be as accurate. In addition, the app lacks the ability to identify and label different speakers, which could make it more difficult to use in situations like meetings or interviews.

That being said, the app held up well in initial tests in a review by The Wall St. Journal’s Joanna Stern, though it stumbled with accents. Other reviewers found the app to be fairly powerful, too, if a little basic in its overall design. TechCrunch’s review said the transcription was pretty good, but noted also it lacked some features other apps have.

pixel voice recorder

However, Recorder does have an advantage over some of its rivals: it doesn’t require an internet connection to work. Instead, all the recording and transcription capabilities take place directly on the device. That means you could even use the app while in airplane mode.

In addition, a built-in advanced search feature lets you search for sounds, words, and phrases and then see a visual depiction of where the search term was spoken in the playback bar so you can go to the recording you need.

Google has put its real-time speech transcription technology to work in a number of ways, besides Recorder. It also introduced live caption technology for Android devices, for example, which brings transcriptions to things like video or audio saved on your device, or video playback outside of YouTube.

The Recorder app is a free download on Google Play.

We’ve reached out to Google for any update on its plans to make Recorder more broadly available across Android . The company hasn’t responded to our questions at this time.

 

 

 


Android – TechCrunch

Popular Android phones can be tricked into snooping on their owners

Security researchers have found several popular Android phones can be tricked into snooping on their owners by exploiting a weakness that gives accessories access to the phone’s underlying baseband software.

Attackers can use that access to trick vulnerable phones into giving up their unique identifiers, such as their IMEI and IMSI numbers, downgrade a target’s connection in order to intercept phone calls, forward calls to another phone or block all phone calls and internet access altogether.

The research, shared exclusively with TechCrunch, affects at least 10 popular Android devices, including Google’s Pixel 2, Huawei’s Nexus 6P and Samsung’s Galaxy S8+.

The vulnerabilities are found in the interface used to communicate with the baseband firmware, the software that allows the phone’s modem to communicate with the cell network, such as making phone calls or connecting to the internet. Given its importance, the baseband is typically off-limits from the rest of the device, including its apps, and often come with command blacklisting to prevent non-critical commands from running. But the researchers found that many Android phones inadvertently allow Bluetooth and USB accessories — like headphones and headsets — access to the baseband. By exploiting a vulnerable accessory, an attacker can run commands on a connected Android phone.

“The impact of these attacks ranges from sensitive user information exposure to complete service disruption,” said Syed Rafiul Hussain and Imtiaz Karim, two co-authors of the research, in an email to TechCrunch.

Hussain and his colleagues Imtiaz Karim, Fabrizio Cicala and Elisa Bertino at Purdue University and Omar Chowdhury at the University of Iowa are set to present their findings next month.

“The impact of these attacks ranges from sensitive user information exposure to complete service disruption.”
Syed Rafiul Hussain, Imtiaz Karim

Baseband firmware accepts special commands, known as AT commands, which control the device’s cellular functions. These commands can be used to tell the modem which phone number to call. But the researchers found that these commands can be manipulated. The researchers developed a tool, dubbed ATFuzzer, which tries to find potentially problematic AT commands.

In their testing, the researchers discovered 14 commands that could be used to trick the vulnerable Android phones into leaking sensitive device data, and manipulating phone calls.

But not all devices are vulnerable to the same commands or can be manipulated in the same way. The researchers found, for example, that certain commands could trick a Galaxy S8+ phone into leaking its IMEI number, redirect phone calls to another phone and downgrade their cellular connection — all of which can be used to snoop and listen in on phone calls, such as with specialist cellular snooping hardware known as “stingrays.” Other devices were not vulnerable to call manipulation but were susceptible to commands that could be used to block internet connectivity and phone calls.

The vulnerabilities are not difficult to exploit, but require all of the right conditions to be met.

“The attacks can be easily carried out by an adversary with cheap Bluetooth connectors or by setting up a malicious USB charging station,” said Hussain and Karim. In other words, it’s possible to manipulate a phone if an accessory is accessible over the internet — such as a computer. Or, if a phone is connected to a Bluetooth device, an attacker has to be in close proximity. (Bluetooth attacks are not difficult, given vulnerabilities in how some devices implement Bluetooth has left some devices more vulnerable to attacks than others.)

“If your smartphone is connected with a headphone or any other Bluetooth device, the attacker can first exploit the inherent vulnerabilities of the Bluetooth connection and then inject those malformed AT commands,” the researchers said..

Samsung recognized the vulnerabilities in some of its devices and is rolling out patches. Huawei did not comment at the time of writing. Google said: “The issues reported are either in compliance with the Bluetooth specification or do not reproduce on Pixel devices with up to date security patches.”

Hussain said that iPhones were not affected by the vulnerabilities.

This research becomes the latest to examine vulnerabilities in baseband firmware. Over the years there have been several papers examining various phones and devices with baseband vulnerabilities. Although these reports are rare, security researchers have long warned that intelligence agencies and hackers alike could be using these flaws to launch silent attacks.


Android – TechCrunch

The Polaroid Lab uses the light from your phone’s screen to turn digital photos into Polaroids

When all of us are carrying phones that can snap a thousand photos a minute and are connected to cloud systems that can store millions, there’s an undeniable charm to physical photos. The ones deemed worthy; the ones so special that they must be transformed from bit to atom.

While photo printers are nothing new, Polaroid is twisting up the concept (and rebooting an idea from a few years back) with the “Polaroid Lab.” It’s a $ 129 tower that uses the light from your phone’s screen, bounced off a series of mirrors, to make a proper Polaroid from the photos you’ve already taken.

Open your photo in Polaroid’s companion app, place your phone (any iPhone after the 6S, and “current models of Samsung, Huawei, Google Pixel, and One Plus” Android handsets) on top of the tower, and push the red button. A few seconds later, out pops a grey Polaroid. Did it work? You’ll have to wait a few minutes for it to develop, just like the good (?) ol’ days.

Is using light and mirrors better than just sending a picture to a printer over Bluetooth or Wi-Fi and blasting the ink out from a cartridge? Maybe not. But it’s neat! It’s physical and sciencey and fun — and, arguably, as close as you can get to having a “true” Polaroid picture of a moment that’s already happened.

The company says that the Polaroid Lab works with its existing I-Type and 600 series films… which, as any enthusiast could tell you, doesn’t come cheap. Expect each photo printed here to cost you a buck or two. That’s a bit steeper than many at-home printers and definitely pricier than just blasting out some 4x6s at Costco, but this thing will almost certainly still find its audience amongst those going for a certain look.

There’s also a way to “blow up” one photo across a bunch of Polaroids, if you’ve got the film to spare. Here’s a demo video of what that looks like:

If the whole concept seems familiar, you might be remembering the Impossible Instant Lab — a product of a veeeery similar vein that raised over half a million dollars on Kickstarter back in 2012. The Impossible Instant Lab was discontinued in July of 2017… just a few months after the team behind it acquired the rights to the Polaroid brand. This seems to be a reboot of the concept, now with the added weight and officialness of the Polaroid name thrown behind it.

The team behind the Polaroid Lab says it should hit shelves by October 10th.

Gadgets – TechCrunch

Light Phone’s founders discuss life beyond the smartphone

For a seemingly tough pitch, Light has had little trouble getting noticed. The company has run two successful crowdfunding campaigns for a pair of minimalist phones designed to augment or replace the smartphone. Today the startup announced that it will be shipping the second version of the handset, which introduces a handful of features back into the product, like texting.

Ahead of the launch, we spoke to Light’s founders, Kaiwei Tang and Joe Hollier, about funding, feature glut and the future of the handset.

How it all began

Brian Heater: The project essentially started as an in-house at Google, is that correct?

Kaiwei Tang: We met in 2014 in Google’s incubator called 30 Weeks. That’s where we met and started talking about Light Phone eventually.

Joe Hollier: 30 Weeks program was an experiment that came out of the Google creative lab, and their hypothesis was that if given the right resources, guidance, designers might be able to create new creative startups, and that designers should be on the founding table of companies.

So their hypothesis was that we as designers would be able to imagine a new going to startup in the software application space, and then through designing the end product, which is how the Google creative lab works, we’d be able to inspire the engineers and make the funding investors that we would need to make the product a reality.

Brian: What did you see in the market that wasn’t being fulfilled by countless different smartphone companies?

Joe: People were feeling overwhelmed by their smartphone and craving some escape, and we didn’t really see an escape.

Gadgets – TechCrunch

Foxconn halts production lines for Huawei phones, according to reports

Huawei, the Chinese technology giant whose devices are at the center of a far-reaching trade dispute between the U.S. and Chinese governments, is reducing orders for new phones, according to a report in The South China Morning Post.

According to unnamed sources, the Taiwanese technology manufacturer Foxconn has halted production lines for several Huawei phones after the Shenzhen-based company reduced orders. Foxconn also makes devices for most of the major smart phone vendors including Apple and Xiaomi (in addition to Huawei).

In the aftermath of President Donald Trump’s declaration of a “national emergency” to protect U.S. networks from foreign technologies, Huawei and several of its affiliates were barred from acquiring technologies from U.S. companies.

The blacklist has impacted multiple lines of Huawei’s business including it handset manufacturing capabilities given the company’s reliance on Google’s Android operating system for its smartphones.

In May, Google reportedly suspended business with Huawei, according to a Reuters report. Last year, Huawei shipped over 200 million handsets and the company had a stated goal to become the world’s largest vendor of smartphones by 2020.

These reports from The South China Morning Post are the clearest indication that the ramifications of the U.S. blacklisting are beginning to be felt across Huawei’s phone business outside of China.

Huawei was already under fire for security concerns, and will be forced to contend with more if it can no longer provide Android updates to global customers.

Contingency planning is already underway at Huawei. The company has built its own Android -based operating system, and can use the stripped down, open source version of Android that ships without Google Mobile Services. For now, its customers also still have access to Google’s app store. But if the company is forced to make developers sell their apps on a siloed Huawei-only store, it could face problems from users outside of China.

Huawei and the Chinese government are also retaliating against the U.S. efforts. The company has filed a legal motion to challenge the U.S. ban on its equipment, calling it “unconstitutional.”  And Huawei has sent home its American employees deployed at R&D functions at its Shenzhen headquarters.

It has also asked its Chinese employees to limit conversations with overseas visitors, and cease any technical meetings with their U.S. contacts.

Still, any reduction in orders would seem to indicate that the U.S. efforts to stymie Huawei’s expansion (at least in its smartphone business) are having an impact.

A spokesperson for Huawei U.S. did not respond to a request for comment.


Android – TechCrunch