Technology News from Around the World, Instantly on Oracnoos!

Google Messages will finally let you delete RCS chats for everyone (APK Teardown) - Related to (apk, teardown), ai,, isolation, will

Apple may remove iPhone encryption in UK over backdoor demands

Apple may remove iPhone encryption in UK over backdoor demands

On a side note: what's your favorite dumb phone?

Security officials in the UK have ordered Apple to create a backdoor granting them access to all content any Apple user worldwide has uploaded to the cloud. It's a brave new world out there. Of course, there's no room for panic, as it's just more of the same – surveillance, control, digital spying, and whatnot. The Washington Post reports what insights familiar with the matter are disclosing. This demand, issued under the UK's Investigatory Powers Act of 2016, requires unrestricted access to encrypted data rather than assistance with specific [website] implemented, it would set a significant precedent, undermining tech companies' longstanding efforts to protect user [website] than compromise the security assurances made to its consumers, Apple is expected to discontinue encrypted storage in the UK. However, this move would not satisfy the demand for access to encrypted content stored in other countries, including the United States. The order prohibits Apple from notifying consumers if their data security is weakened, further raising concerns about privacy and government [website] has the option to challenge the directive before a secret technical panel and a judge, but the law does not permit delays in compliance during the appeal process, the investigation [website] March, anticipating such a demand, the business warned that the UK should not have the authority to determine global encryption standards. Apple has positioned itself as a champion of user privacy, previously resisting government efforts to weaken encryption, including a request from the FBI to unlock an iPhone linked to a terrorist [website] UK government argues that encryption enables criminals and terrorists to evade law enforcement. Security agencies in the US and UK have voiced concerns about its growing use beyond traditional phone traffic. However, tech companies insist that weakening encryption would create vulnerabilities exploitable by hackers and authoritarian [website] companies have also taken strong positions on encryption. Google, which has encrypted Android backups by default since 2018, has stated that it cannot access such data even with a legal order. Meta offers encrypted backups for WhatsApp but maintains that it will not implement [website] the UK gains access to encrypted data, other governments, including China, could demand the same, potentially forcing Apple to withdraw the service entirely.

Samsung is already offering discounts on storage upgrades and the MS......

Garmin Fenix 7: Save $220 on Amazon! $220 off (34%) The rugged Garmin Fenix 7 is now $220 off its price on Amazon and can be yours for just under ......

Samsung abolishes work on its AI, discards isolation driven business model

Samsung abolishes work on its AI, discards isolation driven business model

The Galaxy S25 phones all use a Snapdragon chip. | Video credit — Samsung.

Samsung’s latest flagship phones — theseries — use the Snapdragon 8 Elite chipset across the board. Though the business tried to get Exynos yields sorted in time it was unable to and had to resort to asking for Qualcomm’s help. Collaborating with Google to bring ’s new approach to business.Samsung is also working with Google to develop an XR () headset that will challenge the Apple Vision Pro . In another shocking twist Samsung asked TSMC for help in manufacturing its Exynos chips. Though the latter rejected the deal it still showed that Samsung has been heavily reconsidering its approach to external [website] now the business will replace Gauss with external AI models to help it improve yield rates, predict demand and handle inventory. But if Samsung is willing to accept using external AI models for this then I can only hope for further collaboration down the line that produces an awesome smartphone for the end consumer.

The OnePlus Open is available at Amazon, where you can save $400 on the model in Emerald Dusk. That's a pretty solid bargain that you ......

Google's Pixel 9a has in the recent past been rumored to go up for pre-order in the US on March 19, and start shipping on March 26. Thanks to past rumors, we al......

After months of waiting, Google’s official Pixel 9 Pro Fold case is back in stock at the Google Store.

The accessory situation for Pixel 9 Pro Fold h......

Google Messages will finally let you delete RCS chats for everyone (APK Teardown)

Google Messages will finally let you delete RCS chats for everyone (APK Teardown)

You will soon have an option to delete RCS chats for yourself or for everyone, including you and the recipient.

Google Messages will seemingly notify recipients when a sender deletes or attempts to delete a message.

Google Messages will soon let you delete RCS chats for everyone. Code found in Google Messages app version 20250131_02_RC00 presents how Google plans on implementing these new elements in accordance with RCS Universal Profile [website], which was introduced in June 2024.

Authority Insights story on Android Authority. Discover You're reading anstory on Android Authority. Discover Authority Insights for more , app teardowns, leaks, and in-depth tech coverage you won't find anywhere else. An APK teardown helps predict elements that may arrive on a service in the future based on work-in-progress code. However, it is possible that such predicted elements may not make it to a public release.

Currently, deleting an RCS chat only removes it from your device, while the recipient can still see the message. With the upcoming upgrade, you’ll be able to delete RCS chats for everyone, just like on WhatsApp.

We’ve found code evidence in Google Messages that clearly demonstrates that clients will soon see “Delete for everyone” and “Delete for me” options for removing sent RCS texts.

Interestingly, Google Messages appears to notify recipients when a sender deletes or attempts to delete a message, which could be a point of contention for people who prefer more discretion. Below is the text we found in the code with the help of our contributor Assemble Debug.

Code Copy Text Message deleted by its author You deleted a message Sender attempted to delete a message Delete for everyone Messages may still be seen by others on older app versions Delete for me.

It’s unclear when Google will roll out these deletion capabilities for RCS chats, but we bet it’ll happen soon now that the work is already done.

? Talk to us! Email our staff at Email our staff at [website] . You can stay anonymous or get credit for the info, it's your choice.

Trade in your old phone to save up to $700 on the exciting Galaxy S25 Plus. In addition, Samsung is offering $100 in instant Samsung Credit, which you......

The 128GB model is tipped to have the same price as the 128......

Market Impact Analysis

Market Growth Trend

2018201920202021202220232024
7.3%8.8%9.3%10.3%10.8%11.2%11.3%
7.3%8.8%9.3%10.3%10.8%11.2%11.3% 2018201920202021202220232024

Quarterly Growth Rate

Q1 2024 Q2 2024 Q3 2024 Q4 2024
10.6% 10.8% 11.1% 11.3%
10.6% Q1 10.8% Q2 11.1% Q3 11.3% Q4

Market Segments and Growth Drivers

Segment Market Share Growth Rate
Smartphones42%8.7%
Mobile Applications26%14.5%
Mobile Infrastructure17%12.8%
Wearables11%18.9%
Other Mobile Tech4%9.4%
Smartphones42.0%Mobile Applications26.0%Mobile Infrastructure17.0%Wearables11.0%Other Mobile Tech4.0%

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity:

Innovation Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity AI/ML Blockchain VR/AR Cloud Mobile

Competitive Landscape Analysis

Company Market Share
Apple24.3%
Samsung22.7%
Huawei14.2%
Xiaomi11.8%
Google Pixel5.4%

Future Outlook and Predictions

The Apple and Samsung: Latest Developments landscape is evolving rapidly, driven by technological advancements, changing threat vectors, and shifting business requirements. Based on current trends and expert analyses, we can anticipate several significant developments across different time horizons:

Year-by-Year Technology Evolution

Based on current trajectory and expert analyses, we can project the following development timeline:

2024Early adopters begin implementing specialized solutions with measurable results
2025Industry standards emerging to facilitate broader adoption and integration
2026Mainstream adoption begins as technical barriers are addressed
2027Integration with adjacent technologies creates new capabilities
2028Business models transform as capabilities mature
2029Technology becomes embedded in core infrastructure and processes
2030New paradigms emerge as the technology reaches full maturity

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity, influencing adoption timelines and investment priorities:

Time / Development Stage Adoption / Maturity Innovation Early Adoption Growth Maturity Decline/Legacy Emerging Tech Current Focus Established Tech Mature Solutions (Interactive diagram available in full report)

Innovation Trigger

  • Generative AI for specialized domains
  • Blockchain for supply chain verification

Peak of Inflated Expectations

  • Digital twins for business processes
  • Quantum-resistant cryptography

Trough of Disillusionment

  • Consumer AR/VR applications
  • General-purpose blockchain

Slope of Enlightenment

  • AI-driven analytics
  • Edge computing

Plateau of Productivity

  • Cloud infrastructure
  • Mobile applications

Technology Evolution Timeline

1-2 Years
  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream
3-5 Years
  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging
5+ Years
  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

Expert Perspectives

Leading experts in the mobile tech sector provide diverse perspectives on how the landscape will evolve over the coming years:

"Technology transformation will continue to accelerate, creating both challenges and opportunities."

— Industry Expert

"Organizations must balance innovation with practical implementation to achieve meaningful results."

— Technology Analyst

"The most successful adopters will focus on business outcomes rather than technology for its own sake."

— Research Director

Areas of Expert Consensus

  • Acceleration of Innovation: The pace of technological evolution will continue to increase
  • Practical Integration: Focus will shift from proof-of-concept to operational deployment
  • Human-Technology Partnership: Most effective implementations will optimize human-machine collaboration
  • Regulatory Influence: Regulatory frameworks will increasingly shape technology development

Short-Term Outlook (1-2 Years)

In the immediate future, organizations will focus on implementing and optimizing currently available technologies to address pressing mobile tech challenges:

  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream

These developments will be characterized by incremental improvements to existing frameworks rather than revolutionary changes, with emphasis on practical deployment and measurable outcomes.

Mid-Term Outlook (3-5 Years)

As technologies mature and organizations adapt, more substantial transformations will emerge in how security is approached and implemented:

  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging

This period will see significant changes in security architecture and operational models, with increasing automation and integration between previously siloed security functions. Organizations will shift from reactive to proactive security postures.

Long-Term Outlook (5+ Years)

Looking further ahead, more fundamental shifts will reshape how cybersecurity is conceptualized and implemented across digital ecosystems:

  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

These long-term developments will likely require significant technical breakthroughs, new regulatory frameworks, and evolution in how organizations approach security as a fundamental business function rather than a technical discipline.

Key Risk Factors and Uncertainties

Several critical factors could significantly impact the trajectory of mobile tech evolution:

Battery technology limitations
Privacy concerns
Device interoperability issues

Organizations should monitor these factors closely and develop contingency strategies to mitigate potential negative impacts on technology implementation timelines.

Alternative Future Scenarios

The evolution of technology can follow different paths depending on various factors including regulatory developments, investment trends, technological breakthroughs, and market adoption. We analyze three potential scenarios:

Optimistic Scenario

Rapid adoption of advanced technologies with significant business impact

Key Drivers: Supportive regulatory environment, significant research breakthroughs, strong market incentives, and rapid user adoption.

Probability: 25-30%

Base Case Scenario

Measured implementation with incremental improvements

Key Drivers: Balanced regulatory approach, steady technological progress, and selective implementation based on clear ROI.

Probability: 50-60%

Conservative Scenario

Technical and organizational barriers limiting effective adoption

Key Drivers: Restrictive regulations, technical limitations, implementation challenges, and risk-averse organizational cultures.

Probability: 15-20%

Scenario Comparison Matrix

FactorOptimisticBase CaseConservative
Implementation TimelineAcceleratedSteadyDelayed
Market AdoptionWidespreadSelectiveLimited
Technology EvolutionRapidProgressiveIncremental
Regulatory EnvironmentSupportiveBalancedRestrictive
Business ImpactTransformativeSignificantModest

Transformational Impact

Technology becoming increasingly embedded in all aspects of business operations. This evolution will necessitate significant changes in organizational structures, talent development, and strategic planning processes.

The convergence of multiple technological trends—including artificial intelligence, quantum computing, and ubiquitous connectivity—will create both unprecedented security challenges and innovative defensive capabilities.

Implementation Challenges

Technical complexity and organizational readiness remain key challenges. Organizations will need to develop comprehensive change management strategies to successfully navigate these transitions.

Regulatory uncertainty, particularly around emerging technologies like AI in security applications, will require flexible security architectures that can adapt to evolving compliance requirements.

Key Innovations to Watch

Artificial intelligence, distributed systems, and automation technologies leading innovation. Organizations should monitor these developments closely to maintain competitive advantages and effective security postures.

Strategic investments in research partnerships, technology pilots, and talent development will position forward-thinking organizations to leverage these innovations early in their development cycle.

Technical Glossary

Key technical terms and definitions to help understand the technologies discussed in this article.

Understanding the following technical concepts is essential for grasping the full implications of the technologies discussed in this article. These definitions provide context for both technical and non-technical readers.

Filter by difficulty:

5G beginner

algorithm

platform intermediate

interface Platforms provide standardized environments that reduce development complexity and enable ecosystem growth through shared functionality and integration capabilities.

encryption intermediate

platform Modern encryption uses complex mathematical algorithms to convert readable data into encoded formats that can only be accessed with the correct decryption keys, forming the foundation of data security.
encryption diagram Visual explanation of encryption concept