The specifications for USB 3.1 were finalized nearly a year and a half ago. Commonly referred to as SuperSpeed Plus, it promises even faster transfer rates than USB 3.0 solutions and with hardware now trickling down to end-users, we’re finally getting to see what it can do in the real world.
On paper, USB 3.1 offers double the signaling speed at 10Gbps. It also modifies the line encoding scheme from 8b/10b to 128n/132b. What this means is that only four bits out of every 132 are set aside for encoding overhead versus two out of every 10. All things considered, USB 3.1 has a maximum theoretical effective transfer rate of between 500MB/sec to 1.21GB/sec.
Using a prototype USB 3.1 enclosure loaded with two Samsung 840 EVO SSDs in RAID 0 and an Asus Z97-A/USB 3.1 (Asus also supplied the enclosure and drives), The Tech Report set out to see just what sort of numbers they could squeeze out of the setup.
Using CrystalDiskMark to measure sequential read and write speed as well as 4K random reads / writes, the publication recorded sequential read speeds of 781.2MB/sec and writes of 797.8MB/sec. In the same test, USB 3.0 scored just 446.5MB/sec and 448.6MB/sec, respectively.
4K random reads checked in at 35.8MB/sec with writes scoring 79.6MB/sec, compared to USB 3.0 read / write speeds of 26.2MB/sec and 27.3MB/sec.
As you can see, there’s plenty of speed to be had with USB 3.1. Motherboards supporting the spec, like the one used in TTR’s testing, are already available for purchase. Finding an enclosure to support SuperSpeed Plus, however, may take a bit as I was unable to locate any for sale as of writing. I suspect it won’t be long before they start cropping up at your favorite online retailer.
Mozilla has finally released a 64-bit version of their Firefox web browser for Windows, joining other major browsers including Google Chrome, Internet Explorer and Opera in offering 64-bit variants.
However, at this stage the 64-bit version of Firefox is a Developer Edition build, which is one of Mozilla's beta builds of Firefox. While the Developer Edition channel is far more stable than the Nightly channel, it's not the same as the main builds of Firefox that users will typically download. As such, 64-bit Firefox could be considered as being in the beta phase at this stage.
If all goes to plan, Mozilla will release a stable version of 64-bit Firefox for Windows with Firefox 38, scheduled for release in May. At that point it will sit alongside the already-released 64-bit variants for OS X and Linux.
Firefox 38 Developer Edition, complete with 64-bit addressing, brings support for web applications larger than 4 GB, which is great for developers wanting to build large browser-based games. Thanks to new hardware registers and a larger address space, Mozilla claims the 64-bit version is also faster and more secure than before.
The latest Developer Edition also includes some WebRTC changes and fixes, as well as a few other improvements for developers. Anyone interested in upgrading to the 64-bit version of Firefox can do so via Mozilla's Developer Edition page.
Security researchers at Kaspersky Lab have unearthed a suite of surveillance platforms that can hide within the firmware of hard drives from more than a dozen manufacturers. The attackers, which Kaspersky is calling the Equation Group due to their complex skill set, are the most advanced that the researchers have encountered to date.
The programs, some of which date back to 2001, appear to have been developed in succession with each new program being more sophisticated than the last according to Wired.
Personal computers in more than 30 different countries have been discovered to carry the infection, Kaspersky said.
One of the worms uncovered has direct connections with Stuxnet and may have even been used as a test to help figure out the best route for the malware to reach systems involved in Iran’s nuclear program. Researchers didn’t name who they believe might be behind the attacks although there’s a good bit of circumstantial evidence that points to the NSA.
One component of the suite, GrayFish, is able to reflash the firmware on hard drives. Because it resides in the firmware, reformatting the drive doesn’t get rid of the infection. Key to being able to rewrite the firmware is having access to source code. If the NSA is indeed behind the attacks, getting source code wouldn’t present too much of an issue.
In addition to physically intercepting shipments (in this case, hard drives) and loading them with malware before repackaging and sending to targets, the NSA could have simply asked manufacturers for their source code (directly or indirectly) or posed as software developers.
Things took a turn from bad to worse from Lenovo this week. After the embarrassment that was Superfish last week, the Chinese computer maker’s website recently fell victim to hackers.
For a brief period on Tuesday afternoon, those visiting lenovo.com in search of a new computer or drivers were instead met with a bizarre series of photos of teens set to the pop song Breaking Free from High School Musical. As of writing, the site is offline due to "system maintenance."
The source code of the hacked page references it as the new and improved rebranded Lenovo website featuring Ryan King and Rory Andrew Godfrey. These two individuals have previously been ousted as members of Lizard Squad.
Clicking on the slideshow would take visitors to Lizard Squad’s Twitter account.
By all accounts, this appeared to be a DNS hijacking that granted attackers the ability to redirect traffic from lenovo.com to a server under their control. A visit to the squad’s Twitter account, however, suggests they may have somehow gained access to some of the company’s e-mail accounts / e-mails.
In one screenshot of an e-mail, we learn that removal of the Superfish software on one customer’s computer resulted in a bricked device.
Speaking of, it’s likely that this hacking incident is in direct relation to Superfish – a piece of adware that Lenovo had been secretly adding to machines. After getting caught red-handed last week, the company released a removal tool and vowed to never use it again.
HTML5 is now the default setting for video playback on YouTube when using Chrome, IE 11, Safari 8 and beta versions of Firefox. If you needed any more evidence to support the claim that Flash is dead, it doesn’t get much more damning than this.
YouTube has actually supported HTML5 for years, having first introduced support for the standard way back in 2010. Of course, it was extremely limited at that time and lacked support for several key features like adaptive bitrate (ABR).
This feature, one of many now supported by HTML5, helps reduce buffering and enables livestreaming on game consoles, devices like Chromecast and in web browsers.
HTML5 also lets users take advantage of the VP9 codec which YouTube used to showcase 4K streaming video at CES 2014. This codec from Google reduces bandwidth by 35 percent, allowing for wider access to 4K and HD at 60FPS videos. Videos also start anywhere between 15 to 80 percent faster according to YouTube engineering manager Richard Leider.
Last but not least, a bit of advice for those that embed video. YouTube is deprecating the “old style” of Flash < object > embeds and is instead encouraging all embedders to use the < iframe > API as this method will use whichever technology is best suited for the client.
Up to this point, Adobe Flash was the default for videos on YouTube. If you wanted to use HTML5 on the site, you had to go manually enable it.
About a month ago WhatsApp announced that its 700 million users will be able to access the popular messaging service through a new web browser client. Since then the company began rolling out voice calling features, but has now returned its focus to the browser adding a few new options for its massive user base.
While previously limited to Google’s Chrome web surfer, WhatsApp has now added support for both FireFox and Opera. Much like the Chrome set-up process, users will simply need to navigate to the web client and scan a QR code in order to connect the browser app with their mobile WhatsApp account. As we previously reported, because all your conversations on the web client will be kept on your mobile device, your phone will need to remain connected during your browser calls.
As you might know, WhatsApp uses no passwords or user names and instead relies on a user’s mobile phone number for identification. Due to the QR requirements and what WhatsApp describes as iOS limitations, this service is only available for those with Android, Windows Phone and BlackBerry devices at this point.
While Safari and iOS users appear to be still left out in the cold as we previously explained, WhatsApp did say publicly that an iOS compatible client was on its