Cloosiv gives local coffee shops a mobile ordering experience on par with the mega chains

 

Starbucks’ mobile ordering app has proven wildly popular for the company, with reports indicating that it had more users than the likes of Apple Pay or Google Pay last year. The convenience is just too alluring. When you’re late for work and forgot to eat, being able to order up a drink and a sandwich with a tap or two and have it ready for pick up by the time you pass the store seems sort of like magic.

But how can smaller coffee shops compete? Building and maintaining an app of your own is a massive endeavor — and that’s before you start trying to convince customers to install yet another app.

Cloosiv is aiming to take that simplified, tap-of-a-button mobile ordering approach and make it work for local coffee shops by bringing them all to one place. It highlights the nearby coffee shops that are part of the service, presents their menus, and lets you tweak your drink to your liking before sending your order on its way. Tipping is handled through the app, and there’s a built-in rewards system to encourage people to keep coming back.

Cloosiv’s network of coffee shops isn’t huge yet; it’s up and running at just a couple of locations in San Francisco right now, and a quick glance at the in-app location map pins the nationwide total at a little shy of 200. The more that number grows, though, the more the concept makes sense. It becomes an everyone-versus-the-giant sort of thing.

cloosiv ordering

 

As with Starbucks’ mobile ordering app, Cloosiv encourages users to pre-load money into a built-in wallet — the idea being that pre-loading means fewer credit card charges, which cuts back on processing fees for everyone. Unlike the big competition, however, users can make a one-off purchase without pre-loading the funds. There’s a 40 cent fee tacked onto those charges to cover processing, but the option is there.

I gave the app a spin in San Francisco last week, and it worked exactly as promised. I found a coffee shop (Coffee Mission) near BART, punched in my order as the train approached, and my drink was waiting for me by the time I made it out of the station.

cloosiv merchant

Cloosiv’s Merchant app

As many (most?) coffee shops already have a tablet on the counter acting as the point of sales terminal, Cloosiv is focusing on integrating into what’s already in place. When an order comes in today, a sound plays as a notification banner drops down from the top of the screen; when an employee taps the banner, they’re bumped over to Cloosiv’s Merchant app where they can acknowledge orders or mark them as complete.

The next step for the company is tying all of this directly into the merchant apps that coffee shops are already using — they’re focusing on Square first, with plans to tie into things like Clover and Micros on the roadmap.

Cloosiv charges vendors a percentage of each sale, with that percentage going down as the number of orders goes up. The first 50 orders each month, for example, are charged a 12% fee; after 150 orders, that fee drops down to 8%.

Cloosiv founder Tim Griffin tells me they’ve processed over 35,000 orders so far, making up over $250,000 in revenue for the coffee shops they work with. He estimates that orders and gross volume are both growing by about 40% monthly. The company recently closed a small round with investors including Lachy Groom (previously Head of Issuing at Stripe) and Laura Behrens Wu (CEO of Shippo), and is part of Y Combinator’s Summer 2019 class.


Source: Tech Crunch

Bosch launches cloud-connected battery management to extend the life of EV batteries

Bosch is bringing to market a new cloud-connected software service to manage and monitor the battery life of electric vehicles.

“Bosch is connecting electric-vehicle batteries with the cloud. Its data-based services mean we can substantially improve batteries’ performance and extend their service life,” said Dr. Markus Heyn, member of the board of management of Robert Bosch GmbH, in a statement.

The new connectivity will enable companies to remotely monitor and manage battery status to reduce wear and tear on the batteries by up to 20%, according to Bosch .

By gathering real-time data from batteries on the speed at which they’re charging; the number of charge cycles they’ve undergone; stress from rapid acceleration and deceleration, and ambient temperature, Bosch can optimize recharging and prompt drivers with updates on how to extend their battery life, according to the company.

The first customer for this new cloud-connected service is the Chinese ride-hailing giant, DiDi, which will deploy a fleet of Bosch’s software enabled electric vehicles in Xiamen.

The tools are not only prescriptive, but predictive, allowing fleet operators to determine when a battery might wear out and provide optimal information on when to replace aging batteries to ensure the best performance from a vehicle, Bosch said in a statement.

“Powerful batteries with long services lives will make electromobility more viable,” said Heyn, in a statement.

Bosch sees three advantages in these insights. They’re able to reduce the aging of batteries, improve maintenace and repair times, and by managing the recharging process can ensure that batteries don’t permanently lose performance and capacity.


Source: Tech Crunch

Space moss, stem cells and more are on their way to the ISS

The International Space Station is such a unique and important test bed that practically every spacecraft that docks with it carries new experiments for the crew to run. This month’s mission is no different, bringing biological tests that could be important for long-distance space travel — as well as some new docking hardware for the station.

A commercial resupply mission (CRS-18) is planned at present for July 21, bringing the usual fresh food, spare parts, and science. Several experiments are going up that in one way or another test how life adapts to microgravity — as the recently completed landmark test of human physiology showed, large-scale changes don’t seem harmful, but it can be hard to quantify things at a smaller scale.

Three of the experiments are focused on just that: small scale human physiology. The first focuses on stem cells and how they grow and arrange themselves into nerve tissue under the effects of microgravity. Of course the astronauts we’d be sending on long trips through space will have pretty complete nervous systems, but the results could indicate how treatment could need to be changed on those missions.

Perhaps more importantly, the experiment may provide new insights into the progression of Parkinson’s and multiple sclerosis. The researchers are hopeful that the microgravity environment will, as it has in other experiments, provide an interesting new venue for observing changes and therapies that are difficult to create conditions for on Earth.

The second human-focused experiment looks at how microgravity affects the healing and regeneration of bone cells, and tests two therapies intended to boost those processes. Astronauts don’t break a lot of bones while in space, but it’s crucial that we understand how the healing process may be affected (or improved) when it inevitably happens. It’s using sophisticated incubator system you see up top.

3dprint

The third one is an attempt to 3D print biological structures in microgravity. We’re doing this already on the surface — printing organ replacements and the like — but it’s very difficult because the biological material must be attached to a scaffold in order to take the right shape and have the right spacing. It’s thought that 3D printing organs may actually be easier in space, since there’s no need to worry about gravity pulling the cells out of their carefully engineered structure.

Space Moss is an experiment that pretty much explains itself right there in the name. But if you think astronauts may be noshing on moss during the long trip to Mars, think again — it’s actually an experiment to verify that we shouldn’t do that.

space moss

Space moss!

It turns out that this moss being studied thrives under conditions of hypergravity — increased gravity conditions artificially created within a centrifuge. At 10 Gs the moss spread faster and photosynthesized harder than control plants. So the question is, does it spread slower and process light less effectively in microgravity?

Ultimately this line of research could lead to biologically engineered plants that have the opposite tendencies, but for now Space Moss is not a promising source of food. Of course they have to test it to make sure, which is why the experiment is heading up there.

Dock dock, who’s there?

crs 18 1

In addition to these experiments, the Dragon capsule (launched on a Falcon 9 rocket, naturally) will carry IDA-3, an important new component for the space station.

IDA stands for international docking adapter; it attaches to the existing, older docking mechanism to provide improved capabilities for spacecraft arriving and departing from the station. IDAs were intended to be sent up to the ISS in 2015 and 2016, but one was aboard CRS-7, which exploded, destroying all its cargo.

The second IDA, however, made it up in 2016 and was attached to the Harmony module. IDA-3, the replacement for the lost adapter,  had to be built and manifested after the disaster, and is just this month making it up there. IDA-3 will join its predecessor on Harmy and provide upcoming missions with improved safety and other benefits.

The new docking interfaces will make it easier to schedule commercial missions, since both commercial crew and cargo will be able to dock with Harmony at the same time, with the same system.

The launch of CRS-18 is tentatively scheduled for July 21, but the date may slip due to weather or ground delays. Like other SpaceX launches, it will be streamed live (and covered here).


Source: Tech Crunch

The sinkhole that saved the internet

It was late afternoon on May 12, 2017. Two exhausted security researchers could barely unpack the events of what had just happened.

Marcus Hutchins and Jamie Hankins, who were working from their homes in the U.K. for Los Angeles-based cybersecurity company Kryptos Logic, had just stopped a global cyberattack dead in its tracks. Hours earlier, WannaCry ransomware began to spread like wildfire, encrypting systems and crippling businesses and transport hubs across Europe. It was the first time in a decade a computer worm began attacking computers on a massive scale. The U.K.’s National Health Service (NHS) was one of the biggest organizations hit, forcing doctors to turn patients away and emergency rooms to close.

Hours after the disruption began to break on broadcast news networks, Hutchins — who at the time was only known by his online handle @MalwareTech — became an “accidental hero” for inadvertently stopping the cyberattack.

The internet, still reeling from the damage, had gotten off lightly. The two researchers, at the time both in their early 20s, had saved the internet from a powerful nation-state attack launched by an enemy using hacking tools developed by the West.

But the attack was far from over.

Hutchins and Hankins knew if the kill switch went down, the malware would pick up where it left off, infecting thousands of computers every minute. Puffy eyed and sleep deprived, they knew the domain had to stay up at all costs. The researchers fended off several attacks from an angry operator of a botnet trying to knock the domain offline with junk internet traffic. And, at one point, law enforcement seized two of their servers from a datacenter in France amid confusion that the domain was helping to spread WannaCry and not preventing it.

With the pressure on but running on empty, Hankins — who was also only pseudonymously known as @2sec4u — fought to stay awake, and would fall asleep on his couch where he worked for hours at a time, laptop still open, only to be jolted awake by messages on Slack or Skype, which the researchers used to talk.

Every time he heard an alert, he feared the kill switch had gone offline.

“Being responsible for this thing that’s propping up the NHS? Fucking terrifying,” Hankins told TechCrunch. “The last thing you need is the idea of the entire NHS on fire.”

“It was probably the most stressful thing happen to me,” he said.

 

‘I think we can stop it’

U.K. news networks began rolling coverage of the cyberattack hours after it began on May 12. Hankins had the television on in the background.

The chyrons reported disruption at several major London hospitals. Staff were locked out of their computer stations, files were encrypted, and their screens were demanding a ransom with a timer ticking down. The NHS had declared a major incident. Telecoms giant Telefonica was also hit, as well as shipping giant FedEx, car maker Renault, Germany’s rail system and several Russian government departments.

British prime minister Theresa May called it an “international cyberattack,” one the government seemed powerless to stop.

WannaCry was spreading from computer to computer, a feature not seen in ransomware before. Blame quickly fell on hacking tools developed by the National Security Agency that had been stolen and published on the web for anyone to use weeks earlier. One such exploit, DoublePulsar, backdoored vulnerable computers, while another, EternalBlue, was used to deliver and spread the ransomware inside a network.

Microsoft released patches for the hacking tools months earlier. The many who had not patched saw their systems go down, one after the other.

“It was just indiscriminately wiping things out,” Hutchins said.

wannacry mid image

(The countdown and ransom window when WannaCry infects a computer. Image: file photo)

By registering the domain, Hutchins had “sinkholed” the ransomware, allowing him to capture and dispose of malicious internet traffic. It was not unusual for Hutchins to find and register a domain found in a malware sample. As part of his botnet and malware tracking efforts he would often take control of unregistered domains — assuming they were a malware control server — to see how far and fast the malware was spreading. The end goal was to direct the malicious traffic into a void to identify victims and prevent further infections.

With one domain down, Hutchins suspected the malware could jump to another and asked Hankins to look. It’s not uncommon for malware to generate new domains to try to evade detection.

“Holy shit, I think we can stop it,” Hankins responded.

By 6:30 p.m., there was a frenetic discussion in the researchers’ Slack room, trying to understand what the domain Hutchins had registered actually did. But it took the researchers close to an hour to understand the complex but short fragment of the malware’s code that contained the domain Hutchins sinkholed.

“We were very much looking at an if-else statement,” Hankins told me, speaking of the stress in the moment. “It was incredibly hard to think because if we fucked this up it would have been worse.”

For a few minutes the researchers panicked, thinking the domain registration was causing the infections. They went back and forth analyzing the code, unsure if they should keep the domain up or not, fearing they were making matters worse. Then the eureka moment hit. The ransomware would only detonate its payload if the domain did not exist.

“If the domain is reachable it won’t infect — I think,” Hankins wrote.

“You are causing me to have the longest anxiety attack ever,” Hutchins replied. “I think I’m gonna be sick.”

Hankins said the stress of the situation made analyzing the code much more difficult. The news played in the background, adding to the constant pressure.

“It took us 45 minutes to look at this code,” he said. “From a reverse-engineering point of view this is not complicated.”

His Fitbit data showed at one point his heart rate was averaging about 140 beats per minute — the equivalent of intense exercise — while he was sitting at his desk.

Data collected from the kill switch showed it prevented the ransomware triggering on about a million infections in just two days. The figure was likely far higher, not including the vast, unknown number of affected computers under a single internet-connected central server. The world had not seen a computer worm spread with such tenacity since the likes of Blaster and Mydoom in the early 2000s.

“I didn’t think it was a big deal until I started seeing the requests and how many organizations were infected,” said Hutchins. He described how “cognitive distance” helped to keep him focused on the issue and not the damage or human cost that was caused by WannaCry.

Hutchins only wanted an insight into the malware campaign. He did not know that registering the domain hours earlier would stop the ransomware from spreading and encrypting.

Hutchins quickly became known as an “accidental hero.”

Under attack

By 7 a.m. the two researchers were back talking on Slack. An hour later, the kill switch was under attack.

Mirai, a powerful botnet made up of hundreds of thousands of hijacked Internet of Things devices and responsible for the “largest ever” distributed denial-of-service attack, began pummeling the kill switch domain with a deluge of junk internet traffic. Months earlier the botnet targeted Dyn, a critical networking company, knocking it offline — and major tech brands reliant on its service — by overloading it with too much internet traffic. In a separate incident the botnet also knocked Liberia offline, a small coastal African nation, by flooding its single undersea fiber cable with internet traffic.

Before WannaCry, Mirai was one of the many botnets under the watch of the researchers. Each time the botnet struck, a dedicated Twitter account would tweet out the target.

It was their turn to be targeted by the botnet.

“We were quite public in tracking Mirai,” said Hankins. “They weren’t fans of us.”

The kill switch held its ground by automatically scaling up the number of Amazon-hosted servers to absorb as much of the traffic as possible. Mirai was hitting the sinkhole hard but the server stayed up.

“We were being hammered,” said Hankins.

Kryptos Logic’s chief executive Salim Neino was in regular contact with the researchers but largely left them to manage the situation themselves. In the late evening, Hankins briefed his boss on the events.

“You’re saying [if] our sinkhole dies those devices get infected?” asked Neino.

“Yes,” Hankins responded.

“Who is watching this?” asked Neino.

“The entire world,” Hankins replied.

“Marcus and I had never dealt with a real-time incident for that long,” Hankins said as he looked back at the Slack messages from the end of the second day after WannaCry hit. “We didn’t have anyone guiding us. You see all these very senior network defenders and companies with all this experience. Meanwhile Marcus landed this very important domain and now we’re at the heart of this global disaster.”

As the internet breathed a sigh of relief thinking the danger was over, most had no idea that any downtime would result in devastating consequences. Even though the ransomware was no longer encrypting files, the now-dormant malware still posed a risk if the kill switch went offline — or if an infected computer or network could no longer communicate with the kill switch. Other attackers were fast to reengineer WannaCry to change the kill switch domain, but other security researchers quickly sinkholed new variants, reducing the spread of the ransomware.

Many thought the researchers were “going to fuck this up,” said Hankins.

Doxxed

After having been awake for more than 30 hours since the attack, Hutchins eventually got some sleep. The next morning, he woke up to find his face plastered on the front of the Sunday editions of the British tabloid newspapers. The media had found him.

Some reporters called Hutchins a “hero,” while others worked unscrupulously to uncover his identity. Given his work uncovering and researching malware and criminal botnets, Hutchins only ever went by his online handle, MalwareTech. Only a trusted few knew both his handle and his name.

Hutchins said he was not expecting a media swarm.

He had not left his room in days, his head down trying to understand more about the scope and impact of the malware. He said reporters came to his house; his parents told him they were camped out on his front lawn.

He did not fear for his safety but was frustrated by the attention. “I’m just unhappy with trying to help clear up Friday’s mess with the doorbell going constantly,” he tweeted.

Unwavered, Hutchins stayed at his desk and continued to work. “I’ve been replying to [direct messages] for three hours,” Hutchins told Hankins in a Slack message about the deluge of press inquiries and support from fellow security researchers. “Still can’t see the bottom.”

2017 06 06 NHS

(Several U.K. National Health Service hospitals were knocked offline by the WannaCry attack. Image: Getty Images)

The media’s obsession with Hutchins did not go away. Notwithstanding his role in registering the kill switch, he was also an active tweeter, quickly becoming the public face of WannaCry and its ongoing developments.

Determined to know more about the secretive then-22-year-old, reporters contacted his friends, turned up at their houses, and offered them money for information.

The security community was furious. His allies took to Twitter to denounce efforts to dox Hutchins. It’s not uncommon for security researchers to go by pseudonyms or online handles. So much so, even the U.K. National Cyber Security Center recognize him as “MalwareTech” as his byline in a post on the organization’s blog.

Now with his identity out, Hutchins knew it would be easier for criminal groups to target him for his previous unrelenting work to uncover their malicious online operations. But in the midst of fighting off a multitude of threats targeting the kill switch, he feared the unwanted attention would distract him from his current work.

“It was a huge problem,” he told me. While the media swarmed his friends and family, the researchers were still battling attacks and efforts to knock the kill switch offline.

“I don’t work well with that kind of attention,” said Hutchins. “I can deal with stress, but attention is not something I’m very good with.”

“Having like a million journalists all over you for weeks on end? It’s not fun,” he said.

Later that day Hankins went out and bought all of the Sunday newspapers for Hutchins as a keepsake.

Hutchins absorbed most of the media attention. But Hankins, whose real-name was also not public at the time of the WannaCry attack and only in recent months began to use his real-world name with his Twitter account, feared his identity would also be uncovered.

“I was worried [reporters] were going to turn up my place next,” Hankins told me. He said how he devised a plan in the event that reporters also found his home address.

“My plan was instead of going out the front door where the journalists would have been to go through my side door and then out the back — which had like a back street — and a friend would pick me up in their car and I’d go and stay with them,” he explained.

But even with the attention Hutchins said he did not regret his role in stopping WannaCry. “I probably would have tried to hide a bit better,” he joked. “But yeah, I did not really enjoy any of this.”

The cavalry arrives

The following day on Monday, Britain went back to work for the first time since the cyberattack.

Many businesses had fallen victim to WannaCry, and their systems were offline. Others whose systems had not yet been ransomed had no idea their systems were also infected. The kill switch was the only thing preventing another outbreak. The U.K.’s National Health Service was on high alert in anticipation of a “second spike,” amid ongoing disruption across the organization. U.K. authorities had joined the global manhunt for the attackers behind the attack days earlier.

But when the researchers weren’t being hit by a barrage of attacks, they knew that the cumulative pressure, exhaustion, and lack of sleep was untenable.

“I wasn’t desperate to hand it off,” Hutchins admitted. “I wanted to keep control of it.” He feared handing it off would make it far more difficult to identify and notify businesses and government organizations infected but not yet ransomed by WannaCry.

“But I came to the realization that there is a huge personal risk of me doing this,” he said. “It was a week of just pure dread every time a server went down. It was more logical just to hand it off and then get some sleep.”

Hankins told TechCrunch that several companies offered to host the kill switch but the researchers were cautious of trusting anyone. “For us it was vital to keep it alive, but for others it was an opportunity to get on this huge press cycle,” he said.

The duo knew people at Cloudflare, a security and networking giant, and reached out for help. The internet company provides many services like domain registration and protection against distributed denial-of-service attacks.

Hutchins and Hankins approached Cloudflare two days after WannaCry hit, said Justin Paine, Cloudflare’s director of trust and safety. Chief executive Matthew Prince had already given Paine the go-ahead to give the researchers what they need, offering its suite of services for free.

Mirai continued to attack the kill switch with everything it had, Paine said. The rush was on to get the kill switch onboarded and protected as soon as possible.

It had just gone past midnight in the U.K. on May 16th when the handover was completed.

For its part, Cloudflare kept quiet about the arrangement. The company did not put out a press release or blog post acknowledging its part in supporting the kill switch. For most it was an invisible partnership, the only giveaway was that the domain name resolves to a Cloudflare name server, which is not noticeable to internet users.

“We couldn’t have done it without them,” said Hankins.

92-hour week

Two years later, the kill switch has not gone down once.

The ransomware continues to lurk in thousands of networks around the world, ready to encrypt the files on millions of computers, despite patches having been available for the past two years. Hankins said that in June 2019 alone the kill switch prevented about 60 million ransomware detonations.

Hackers working for North Korea were later blamed for the cyberattack.

“After it was confirmed it had been stopped, there was a ‘holy shit’ moment that this was one of the biggest things in recent cyber history,” Hutchins said. “This is the first case of any kind of ransomware worm.”

Hankins worked about 92 hours in five days and slept only a few hours a night, according to his Fitbit data. At one point, U.K. government officials privately reached out to the researchers to offer help but also to check on their well-being, knowing the stress they were under.

“I think we struggled but we did a reasonable job,” he told me.

(One of the mugshots of the North Korean hackers accused of launching the WannaCry attack. Image: Getty Images)

All seemed well until last month when a Cloudflare outage knocked a portion of the internet offline for several hours. The cause was blamed on Verizon (which owns TechCrunch) for mishandling the internet traffic. Cloudflare’s Prince tweeted angrily at the telecom giant.

But the kill switch did not buckle. Hankins tweeted that the outage had not affected the WannaCry kill switch. There were 220,000 attempted WannaCry executions during the outage, he told TechCrunch.

“This wasn’t Cloudflare’s fault nor was there really anything we could do about it,” Hankins tweeted. “Outages and issues happen all the time and sometimes they can be incredibly localized and hard to detect.”

As long as computers are infected with WannaCry and are not patched, data remains at risk — and at the mercy of the kill switch.

“Just remove this shit from your networks please,” he tweeted.

Paine said Cloudflare still receives a handful of requests to take down the domain each year, thinking the domain is spreading WannaCry — not preventing it.

“We have to educate people that it’s the exact opposite of what you really want here,” said Paine. “If we took down that domain it would be a much worse day for you.”

Round two: BlueKeep

In August 2017, three months after the WannaCry attack, Hutchins was arrested by U.S. authorities at McCarren International Airport in Las Vegas as he boarded a plane back to the U.K. on charges of creating malware in his teenage years — unrelated to WannaCry. He pleaded guilty and will be sentenced in late July. His supporters have called for clemency given Hutchins’ more recent and concerted efforts to protect users from security threats.

Hankins, now the head of security and threat intelligence at Kryptos Logic, retains control over the kill switch and provides business and governments access to localized infection data.

Almost exactly two years after WannaCry first hit, a new vulnerability appeared. Nicknamed “BlueKeep” by security researcher Kevin Beaumont, the flaw also had a similar worm-like property to WannaCry, allowing it to spread from computer to computer.

“I was panicking,” Hankins said. The emergence of BlueKeep brought back a lot of emotions from the week that WannaCry hit, he said.

Microsoft released patches but about a million computers were still vulnerable by the time the National Security Agency issued its own rare advisory just weeks later. BlueKeep is seen as one of the most significant threats to vulnerable computers since WannaCry. Although no exploit code has yet been made public, Homeland Security has warned that it is only a matter of time before hackers figure out how to abuse the flaw and launch an attack.

“We saw this once before,” he said. “We need to stop this — but obviously there was fuck all we could do,” he said.

“We’re not getting a kill switch this time.”


Got a tip? You can send tips securely over Signal and WhatsApp to +1 646-755–8849. You can also send PGP email with the fingerprint: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.


Source: Tech Crunch

FCC proposal would let it punish international robocallers

While the FCC and Congress hammer out new rules to (hopefully) banish robocalls forever, there are some short-term solutions that can help in the meantime — and one may arrive in just a few weeks. A new FCC proposal allows the agency to go after scam calls that originate overseas or use other methods to evade existing spoofing laws.

The rule isn’t exactly new in that it is a follow-up to Ray Baum’s Act, which was passed last year and, among other things, bulked up the Truth in Caller ID Act.

Previously, the latter law prohibited scammy spoofing of numbers, a practice that makes robocalling much easier — but it only applied to calls originating in the country. That opened up a huge loophole for scammers, who are not short on means to make calls internationally. Ray Baum’s Act modifies those rules to specifically prohibit international spoofing, as well as robocall techniques using modern infrastructure like VoIP.

But just making it illegal doesn’t necessarily make it possible for the FCC to go after the criminals. If there’s nothing in the agency’s official rules that formalize how it would go about locating and taking action against those in violation of the new law, it has no power to do so. That’s what this new rule is for.

Chairman Ajit Pai’s proposal will be made public later this week and voted on at the FCC’s August 1 open meeting. If adopted, the agency would be able to do what it’s been doing with U.S. robocallers, except abroad.

Naturally tracking down scammers in a foreign country — and perhaps not an overly friendly one — is a very different beast than catching and fining domestic operations. An FCC official on a press call relating to the new rules characterized the operations as extremely complex, involving multiple shell companies and sophisticated obfuscation techniques. (The FTC has encountered similar difficulties.)

But many robocallers may well have been operating hitherto on the justified assumption that they were essentially immune to pursuit by U.S. authorities. Once they are no longer guaranteed impunity it may (one hopes) be deemed an unnecessary risk to continue operations, and some of the scammers may cut and run with their gains and move on to something else.

As for more long-term solutions, the carriers are working on implementing a new system that would more comprehensively block robocalls, though there is some concern that they won’t enable it by default, or may charge for the service. A summit is being held Thursday where the industry’s progress and intentions will be gauged.


Source: Tech Crunch

Final days to apply for TC Top Picks at Disrupt SF 2019

Hey startup founders — don’t miss your opportunity to receive the VIP treatment and showcase your early-stage startup at Disrupt San Francisco 2019. Apply to be a TC Top Pick and exhibit in Startup Alley for free. But get moving and fill out the application before the July 19 deadline. It’s now o’clock, people.

Applying is simple, but earning a TC Top Pick designation is anything but. Here’s what you need to know. Qualifying startups must fall into one of these tech categories: AI/Machine Learning, Biotech/Healthtech, Blockchain, Fintech, Mobility, Privacy/Security, Retail/E-commerce, Robotics/IoT/Hardware, SaaS and Social Impact/Education.

After TechCrunch editors thoroughly review all qualified applications, they’ll select up to five startups to represent each category. If you make the grade, you’ll get a free Startup Alley Exhibition Package good for one full day of exhibiting in Startup Alley.

TC Top Pick designees also receive three Founder passes and access to CrunchMatch, our automated investor-to-startup matching platform that simplifies the networking process. Find the people you want to meet based on mutual business goals, interests and criteria. You’ll also have access to the complete Disrupt SF 2019 press list and invitations to VIP events at Disrupt SF — like the investor reception.

TC Top Picks exhibit in a dedicated space within Startup Alley, and they benefit from our pre-conference marketing. Everyone wants to meet the TC Top Picks, and that adds up to a boatload of influential media and investor attention.

Caleb John, co-founder of Cedar Robotics, had this to say about his Top Pick experience at Disrupt SF 2018:

“Being named a TC Top Pick validated our startup and gave us credibility. We got to demo our technology in front of hundreds of people. It opened doors to investors, customers and vendors. It helped our business gain traction. Overall, I’d say it’s one of the coolest things we’ve ever done.”

Here’s another perk that provides long-lasting exposure. A TechCrunch editor will interview each Top Pick — live on the Showcase Stage in Startup Alley. We’ll record the interviews and promote them across our social media platforms. That’s a gift that keeps on giving, according to Vadim Rogovskiy, CEO and co-founder of 3DLOOK:

“Our Showcase Stage interview video received more than 150,000 collective views, and it helped drive significant traffic to our website. We still use the video — and our Top Pick status — whenever we meet with VCs and potential enterprise clients.”

So many reasons to apply to be a TC Top Pick — and so little time. The application deadline is July 19. Don’t miss this opportunity to take your startup on a whole new trajectory at Disrupt San Francisco 2019. You have nothing to lose, and everything to gain.

Pro Tip: If you missed the deadline to compete in the Startup Battlefield, you have one last shot: Buy a demo table and exhibit in Startup Alley at Disrupt SF for a chance to win a Wild Card entry to Startup Battlefield.

Is your company interested in sponsoring or exhibiting at Disrupt San Francisco 2019? Contact our sponsorship sales team by filling out this form.


Source: Tech Crunch

TC Sessions: Mobility: Three live onstage demos that shouldn’t be missed

TechCrunch Sessions is heading to San Jose on July 10 — just a few days from now — to dig into the future (and present) of transportation.

The agenda at TC Sessions: Mobility is packed with startups and giants in the tech industry. TechCrunch has brought together some of the best and brightest minds working on autonomous vehicle technology, micromobility and electric vehicles, including Dmitri Dolgov at Waymo, Karl Iagnemma of Aptiv, Seleta Reynolds of the Los Angeles Department of Transportation, Ford Motor CTO Ken WashingtonKatie DeWitt of Scoot and Argo AI’s chief security officer, Summer Craze Fowler.

It wouldn’t be a TechCrunch Sessions without an up-close look and demonstration of the tech. Alongside the speakers, TC Sessions: Mobility will have several demos, including the unveiling of one startup currently in stealth.

The demos will begin with Holoride, the startup that spun out of Audi that aims to bring a VR experience to the backseat of every car, no matter if it’s a Ford, Mercedes or Chrysler Pacifica minivan. Later in the day, check out Damon X Labs, a company aiming to make motorcycles safer with a system that anticipates accidents and warns the rider.

Finally, the day will wrap up with a Michigan-based startup coming out of stealth. We can’t say much yet, but this startup will show off its approach to getting things to people — even in winter.

Tickets are on sale now for $349. Prices go up at the door, so book today! And students, get a super-discounted ticket for just $45 when you book here.


Source: Tech Crunch

Y Combinator-backed Project Wren is aiming to make carbon offsets more consumer friendly

When Landon Brand and Benjamin Stansfield graduated from the University of Southern California this year, they already had the plans for Project Wren, their service for selling carbon offsets to a new generation of conscious consumers.

Along with fellow co-founder Mimi Tran Zambetti (who’s still attending USC), Brand and Stansfield aim to make carbon offsets more accessible to people who may feel like there’s nothing they can do on a personal level to reduce their carbon footprint or support projects that reduce carbon emissions. 

It’s not a novel concept. In 2004, TerraPass launched its service to provide carbon offsets for consumers. The company was acquired in 2014 and now operates as a subsidiary of the publicly traded Canadian retail energy company, Just Energy.

Since TerraPass, other organizations have come in with services to offset consumer and corporate carbon emissions. The Swiss non-profit MyClimate is another organization working on offsets for corporations and individuals (as is the German non-profit, Atmosfair) and the North American public benefit corporation, NativeEnergy also has both a retail and corporate offset program.

Project Wren sources its offset investments from Project Drawdown and is trying to choose the projects that the company’s founders consider “most additional”, according to Brand.

Brand, Stansfield and Tran Zambetti met at USC while pursuing a bachelor of science degree in USC’s new Jimmy Iovine and Andre Young Academy. The two men are the co-founders of Beats, which sold to Apple for roughly $3 billion, but perhaps are more famous for their work in the music business as the co-founder of Interscope records and the rapper and producer known as Dr. Dre.

From the outset the three students worked together on side projects and in student organizations, and decided last year to launch a sustainable business that could impact consumers in a positive way. The first idea, and the one that was initially incorporated as Project Wren, was to develop an algorithmically enhanced software service to promote diversity and inclusion in companies.

“The idea was promising, but it’s a hard product to sell. Companies aren’t used to leveraging software to help build their culture,” Brand wrote in an email. “Trying to get people to use the product made us realize how difficult it is to build something that’s useful and good for the world. If we were going to build a company around doing good, it would take a decade or more.”

The group convened earlier this year and decided, after spending a year working on their idea, that the over ten years it would take to build a successful business was too long for them to see the impact they wanted to make in the world. “We felt like the mission of making companies a better place to work was important, but not urgent,” Brand wrote to me in an email. “Climate change is urgent. It’s the biggest challenge humanity has ever faced. That’s why we decided to pivot.”

The group then decided that they would pool their resources on another project — a vegan cloud kitchen that could potentially become a franchise or chain.

“Meat production is responsible for as much as 20% of greenhouse gas emissions,” Brand wrote. “If we could make eating vegan food easier than eating meat, we would have a huge impact.”

The group ran a cloud kitchen out of Brand’s apartment for two weeks before deciding that, too, ultimately was a wash for the three young co-founders.

With that idea behind them, the three began researching carbon offsets, which led them to Project Drawdown, which led them to build their current website and, ultimately, Y Combinator .

Customers who buy offsets using Wren will support projects that the company has selected for their additionality (meaning the projects would not have been done without the support of organizations like Wren). Once the offsets are purchased Project Wren retires them from circulation so they can’t be traded on any exchange after their creation.

The company makes money by taking a 20% commission above the price of the project for operating expenses and marketing, says Brand.

What Brand sees as the young company’s competitive advantage is its ability to communicate more directly with a new audience of offset acquirers — engaging them more in the process by providing updates on the project.

“Photos, and stories too, from people on the ground will add a more human, real, touch,” to the projects and their reporting back to carbon offset buyers, according to Brand. “We just talk to a bunch of potential partners and see which partners would be able to give unique compelling updates to our users.”


Source: Tech Crunch

Someone is wrong on the Internet

You wake up, and check your phone, and see a new condemnation. Some awful person has said something outrageously insulting. Something actually evil, if you think about it. Something that belittles, dehumanizes, and/or argues against the freedom and agency of a whole category of people.

You add your voice to the furious chorus in response. How can you not? These people may never understand how wrong they are, they’re too ignorant and wedded to their idiocy for that, but they need to know that they are opposed, and their opponents are legion.

We all know what you mean when you say ‘these people.’ The ones who voted for those awful faces on every news site and TV channel, the ones whose names alone cause you to clench with fury. The ones responsible for the awful, unforgivable things happening at the border. The ones responsible for the reports of violence in the streets.

If pushed you’d probably admit that only some of These People are genuinely evil. More than you could have imagined in your worst nightmares five years ago, but still, only some. Others may be prisoners of their upbringing, or their ignorance, or victims of their own hardships, lashing out wildly. But what they all seem to have in common is an incapacity for compassion.

It’s easy to distance yourself from Them. It’s hard not to. The overwhelming majority of the people with whom you actually interact are Us.

You know you should try to feel compassion for Them, as you should for everyone. Not sympathy. Sympathy is very different. But your religion, or your spirituality, or your morality, or simply your belief, teaches you compassion for all. But how can you hold compassion for people who seem incapable of compassion themselves? People who don’t condemn, who actually cheer, what’s happening at the border?

And so every online outrage leaches a little more compassion away, widens and deepens the abyss between Us and Them a little further. You know intellectually that many of these viral outrages stem from bots, programmed by trolls or worse, and each new one does not represent every member of … them.

But you can’t help but grow more certain with each new outrage, in your heart if not your head, that there is a Them. That there are no longer people with whom one can reasonably disagree. That there are now only Us, and Them.

You realize when you think about it that this makes it easier to give people who are notionally Us a pass when they too behave with a flagrant lack of compassion, or judge people’s whole lives by their worst moments, or prioritize the purity of the process they have decreed over any actual results accomplished.

You realize that the growing abyss between Us and Them makes both sides close ranks, makes it harder for people who are Them and yet who have uneasy, even horrified feelings about what’s happening at the border in their name, to at least speak against it. They should anyway. Of course they should. But people are weak. The easier something becomes, the more that people do it.

You understand, on some level, that the online divide is different from the awful things actually happening offline. That the latter matters, deeply, and the former … not so much. That the former distracts both sides from great systemic injustices which have learned to lie hidden in bland terminology, coolly steering clear of the outrage of Us versus Them.

But you slept poorly, you’re exhausted, and you already have so much to do, so many duties to attend to at your frustrating job, so many worries to keep at bay, once you get out of this bed. Maybe all that is because of those systemic injustices, but those are a rot, those are cancer, those are bone-deep, and the evils at the border are an open wound about which something must done immediately. They are responsible for those evils. They must be fought and stopped.

So you add your voice to the furious chorus. And you give more money to those fighting the real fight at the border, because you know that’s what’s actually important. And maybe before you roll out of bed you pause to wonder how much the great online divide represents reality, or how much it prefigures reality; whether They really have all lost their minds and their moral compasses.

And you can’t help but wonder: even if they haven’t, what can now be done?


Source: Tech Crunch

Week-in-Review: Alexa’s indefinite memory and NASA’s otherworldly plans for GPS

Hello, weekenders. This is Week-in-Review where I give a heavy amount of analysis and/or rambling thoughts on one story while scouring the rest of the hundreds of stories that emerged on TechCrunch this week to surface my favorites for your reading pleasure.

Last week, I talked about the cult of Ive and the degradation of Apple design. On Sunday night, The Wall Street Journal published a report on how Ive had been moving away from the company to the dismay of many on the design team. Tim Cook didn’t like the report very much. Our EIC gave a little breakdown on the whole saga in a nice piece he did.

Apple sans Ive


Amazon Buys Whole Foods For Over 13 Billion

The big story

This week was a tad restrained in its eventfulness, seems like the newsmakers went on 4th of July vacations a little early. Amazon made a bit of news this week when the company confirmed that Alexa request logs are kept indefinitely.

Last week, an Amazon public policy exec answered some questions about Alexa in a letter sent to U.S. Senator Coons. His office published the letter on its site a few days ago and most of the details aren’t all that surprising but the first answer really sets the tone for how Amazon sees Alexa activity.

Q: How long does Amazon store the transcripts of user voice recordings?

A: We retain customers’ voice recordings and transcripts until the customer chooses to delete them.

What’s interesting about this isn’t that we’re only now getting this level of straightforward dialogue from Amazon on how long data is kept if not specifically deleted, but it makes one wonder why it is useful or feasible for them to keep it indefinitely.  (This assumes that they actually are keeping it indefinitely, it seems likely that most of it isn’t and that by saying this they’re protecting themselves legally, but I’m just going off the letter.)

After several years of “Hey Alexa,” the company doesn’t seem all that close to figuring out what it is.

Alexa seems to be a shit solution for commerce, so why does Amazon have 10,000 people working on it, according to a report this week in The Information? All signs are pointing to the voice assistant experiment being a short term failure in terms of the short term ambitions though AI advances will push the utility.

Training data is a big deal across AI teams looking to educate models on datasets of relevant information. The company seems to say as much. “Our speech recognition and natural language understanding systems use machine learning to adapt to customers’ speech patterns and vocabulary, informed by the way customers use Alexa in the real world. To work well, machine learning systems need to be trained using real world data.”

The company says it doesn’t anonymize any of this data because it has to stay associated with a user’s account in order for them to delete it. I’d feel a lot better if Amazon just effectively anonymized the data in the first place and used on-device processing the build a profile on my voice for personalized . What I’m more afraid of is Amazon having such a detailed voiceprint of everyone who has ever used an Alexa device.

If effortless voice-based e-commerce isn’t really the product anymore, what is? The answer is always us, but I don’t like the idea of indefinitely leaving Amazon with my data until they figure out the answer.

Send me feedback
on Twitter @lucasmtny or email
lucas@techcrunch.com

On to the rest of the week’s news.

Trends of the week

Here are a few big news items from big companies, with green links to all the sweet, sweet added context.

  • NASA’s GPS moonshot
    The U.S. government really did us a solid inventing GPS, but NASA has some bigger ideas on the table for the positioning platform, namely, taking it to the moon.It might be a little complicated but unsurprisingly scientists have some ideas here. Read more
  • Apple has your eyes
    Most of the iOS beta updates are bug fixes, but the latest change to iOS13 brought a very strange surprise, changing the way the eyes of users on iPhone XS or XS Max look to people on the other end of the call. Instead of appearing that you’re looking below the camera, some software wizardry will now make it look like you’re staring directly at the camera. Apple hasn’t detailed how this works but here’s what we do know here.
  • Trump is having a Twitter party
    Donald Trump’s administration declared a couple months ago that it was launching an exploratory survey to try and gain a sense of conservative voices that had been silenced on social media, now @realdonaldtrump is having a get together and inviting his friends to chat about the issue. It’s a real who’s who, check out some of the people attending here.

Amazon CEO And Blue Origin Founder Jeff Bezos Speaks At Air Force Association Air, Space And Cyber Conference

(Photo by Alex Wong/Getty Images)

GAFA Gaffes

How did the top tech companies screw up this week? This clearly needs its own section, in order of badness:

  1. Amazon is responsible for what it sells:
    [Appeals court rules Amazon can be held liable for third-party products]
  2. Android co-creator gets additional allegations filed:
    [Newly-unsealed court documents reveal additional allegations against Andy Rubin]

Extra Crunch

Our premium subscription service had another week of interesting deep dives. TechCrunch reporter Kate Clark did a great interview with the ex-Facebook, ex-Venmo founding team behind Fin and how they’re thinking about the consumerization of the enterprise.

Sam Lessin and Andrew Kortina on their voice assistant’s workplace pivot

“…The thing is, developing an AI assistant capable of booking flights, arranging trips, teaching users how to play poker, identifying places to purchase specific items for a birthday party and answering wide-ranging zany questions like “can you look up a place where I can milk a goat?” requires a whole lot more human power than one might think. Capital-intensive and hard-to-scale, an app for “instantly offloading” chores wasn’t the best business. Neither Lessin nor Kortina will admit to failure, but Fin‘s excursion into B2B enterprise software eight months ago suggests the assistant technology wasn’t a billion-dollar idea.…”

Here are some of our other top reads this week for premium subscribers. This week, we talked a bit about asking for money and the future of China’s favorite tech platform.

Want more TechCrunch newsletters? Sign up here.


Source: Tech Crunch