More stories

  • in

    Microsoft warning: Some files might not be deleted when you reset a Windows PC

    Microsoft has warned Windows 10 and Windows 11 users that files might not be deleted after resetting the device using the “Remove everything” option. The issue stems from Microsoft’s OneDrive cloud file service and could mean files that were synced locally remain on a computer after a local or remote reset, which admins might do before handing the device to a new owner.  

    ZDNet Recommends

    This issue can occur when attempting a manual reset from Windows or a remote reset from Intune or other mobile device management platforms, Microsoft warns.SEE: Best Windows laptop: Top notebooks compared”When attempting to reset a Windows device with apps which have folders with reparse data, such as OneDrive or OneDrive for Business, files which have been downloaded or synced locally from OneDrive might not be deleted when selecting the “Remove everything” option,” Microsoft says in an update to its known issues for Windows 11 21H2.  “OneDrive files which are “cloud only” or have not been downloaded or opened on the device are not affected and will not persist, as the files are not downloaded or synced locally.”Microsoft notes that some device manufacturers and some documentation might call the feature to reset a device, “Push Button Reset”, “PBR”, “Reset This PC”, “Reset PC”, or “Fresh Start”.Via BleepingComputer, the issue was discovered by Microsoft MVP Rudy Ooms, who found that user data was still readable in the “Windows.old” folder after completing a remote or local wipe of a Windows 10 device. Ooms details his findings in a blog post, including that data encrypted with Bitlocker is moved in clear form to the Windows.old folder after a Windows reset.Windows.old is a folder containing the previous version of Windows on a device. The issue affects Windows 11, version 21H2; Windows 10, version 21H2; Windows 10, version 21H1; and Windows 10, version 20H2, according to Microsoft.  The company is working on a fix for an upcoming release but in the mean time it does have a workaround for the file-persisting issue.  Admins can prevent the issue by by signing out or unlinking OneDrive before resetting a Windows device. Microsoft provides instructions to do this in the “Unlink OneDrive” section in the support page, Turn off, disable, or uninstall OneDrive.Users can also mitigate the issue on devices that have been reset by using the Windows feature Storage Sense in the Settings app. Storage Sense can be used to delete the Windows.old folder. Microsoft provides instructions for doing that in the support page KB5012334.  More

  • in

    MWC 2022: Bullitt Group announces Cat Q10 rugged mobile 5G hotspot, services and MVNO

    Bulltt Group, which is the global licensee for Cat Phones and Motorola in the rugged device space, has been busy during 2021, launching an H+ version of the Cat S42 smartphone whose external components are laced with an antimicrobial silver ion additive, and two phones for T-Mobile in the US – the Cat S62 and Cat S22 Flip. The company also launched its first rugged Motorola phone, the Motorola Defy. SEE: Best cheap 5G phone 2022: No need to pay flagship prices for quality devicesAt Mobile World Congress (MWC), Bullitt Group is addressing a growing category – mobile internet hotspots – with a rugged 5G device called the Cat Q10. There’s a good number of mobile hotspots available, but few are 5G compatible, and fewer are durable and weatherproof, the company points out. The canonical use case is an outdoor space such as a building site, a farm, or a pop-up business, where the need is for fast and secure internet connectivity to a good number of devices via a battery-powered device that’s quick and easy to set up and carry around. The Cat Q10 Rugged 5G Mobile Internet Hotspot.
    Image: Bullitt Group
    The Cat Q10 is a 283g device measuring 81mm by 128mm by 26mm that’s dust and water resistant to IP68 level, and MIL-STD-810H certified for ruggedness. It packs a swappable 5300mAh battery that’s claimed to deliver 10 hours usage, 1,000 hours standby and can act as a power bank to recharge smartphones if necessary. Powered by a MediaTek T750 chipset supporting 5G (SA and NSA, but no mmWave as yet), 4G LTE and Wi-Fi 6 (802.11ax), the Cat Q10 can support up to 32 connected users simultaneously. It accepts a single Nano SIM, supports WPA 3 security and is set up via a mobile (Android or iOS) app. The Cat Q10 will launch at the end of Q2 2022. No pricing details were available at the time of writing. Bullitt Group also announced a range of services designed to prolong the lifecycle of their rugged devices, enhancing the company’s sustainable credentials. ‘Business Edition’ on selected Cat phones provides an extra year’s warranty, while ‘Rugged Care’ and ‘Rugged Care+’ service contracts cover the replacement of parts such as batteries and device repairs. Finally, Bullitt Group announced its own MVNO for the UK market – Bullitt Connect. Built in partnership with Transatel and utilising the EE mobile network, Bullitt Connect will offer voice, text and data services to consumers and industry verticals, focusing particularly on sectors such as logistics and the gig economy. More

  • in

    Australia's intelligence community dismisses concerns about proposed data-gathering powers

    Australia’s national intelligence agencies have dismissed concerns surrounding laws currently before Parliament that would provide them with expanded data-gathering powers in circumstances where an Australian person’s safety is in imminent risk. The Bill in question, if passed, would enable national intelligence agencies to undertake activities to produce intelligence where there is, or is likely to be, an imminent risk to the safety of an Australian person, such as from terrorist attacks or kidnappings. It would also allow these agencies to seek ministerial authorisation to produce intelligence on Australians involved with a listed terrorist organisation rather than having to obtain multiple, concurrent authorisations to produce intelligence on individual Australian persons who are suspected of being involved with a listed terrorist organisation. Opposition of the Bill has primarily come from the Law Council of Australia (LCA), which told the Parliamentary Joint Committee on Intelligence and Security (PJCIS) it was unsure whether the expanded powers would be proportionate to their operational objectives. In a submission to the PJCIS, which is responsible for scrutinising Australia’s intelligence powers, the LCA said there are no safeguards to prevent agency heads from using its intelligence-gathering powers on an Australian in situations where they are not in imminent risk. “There is no requirement that the agency head must also assess the nature and degree of the imminent risk to the person’s safety, and be satisfied that it is sufficiently serious as to warrant the exercise of powers in the absence of a ministerial authorisation,” LCA wrote in its submission to the committee. “For example, there is no requirement to be satisfied that there is a risk of death or serious harm to the person.” The LCA added it was also concerned about expanding the influence of a single ministerial authorisation so it can enable intelligence-gathering of entire terrorist organisations due to the broad nature of such an authorisation. The council specifically noted the lack of an exhaustive list for what is deemed to be “involvement with a listed terrorist organisation”. “The Law Council notes that the concept of a person’s ‘involvement with’ a listed terrorist organisation has the potential to be extremely broad, covering both direct and indirect forms of engagement,” it said. “The Law Council suggests that consideration is given to placing more precise statutory parameters on the concept of ‘involvement with’ a listed terrorist organisation.” In response to these concerns, representatives from the Department of Home Affairs, Australian Security Intelligence Organisation, Australian Signals Directorate (ASD), and the Office of National Intelligence said these expanded powers would only be used in “niche circumstances”. “In an operational sense, when we kind of try to apply these new provisions to real-world situations what we’re trying to do is save minutes and possibly hours in operational circumstances where an Australian person has been kidnapped overseas,” ASD Director-General Rachel Noble said, when explaining the “imminent risk” powers. Noble said waiting for ministerial authorisations is not always possible in “imminent risk” situations as overseas kidnappings and mass casualty events can often occur in the middle of the night. Addressing the LCA’s concern regarding ministerial authorisations potentially being too broad for gathering intelligence on listed terrorist organisations, a Home Affairs representative said the authorisations would only be used by intelligence agencies to investigate members of the class that directly participate in listed terrorist organisations. Home Affairs electronic surveillance assistant secretary Paul Pfitzner said authorisations for agencies to perform intelligence activities on a listed terrorist organisation would only allow them to investigate individuals who recruit others, provide and receive training, provide financial or other forms of support, and advocate on behalf of the organisation. “We don’t want to pretend that we’ll necessarily be able to capture every scenario, situation, or circumstance that might arise in the course of an intelligence agency undertaking their work and finding how people may or may not be involved with a particular terrorist organisation,” Home Affairs electronic surveillance first assistant secretary Andrew Warnes added. In terms of accountability, Pfitzner said all intelligence agencies who collect data about terrorist organisation individuals through ministerial authorisations would have to keep a list of these identified individuals and provide reasons why they are classified as being part of those organisations.  Related Coverage More

  • in

    Meta blocks Russian state-media accounts in Ukraine

    Meta, formerly Facebook, has announced it has restricted access to several accounts, including some belonging to Russian state-media organisations, in Ukraine. “We have been in contact with the government of Ukraine. At their request, we have restricted access to several accounts in Ukraine, including those belonging to some Russian state media organisations,” Meta VP global affairs Nick Clegg wrote in a tweet.

    Ukraine Crisis

    “We are also reviewing other government requests to restrict Russian state-controlled media.” The steps taken by the social media giant are in response to Russia’s invasion of Ukraine, which began four days ago. Meta added it has also established a special operations centre staffed by “experts” from across the company, including native Russian and Ukrainian speakers, to monitor its platform and respond to misinformation issues in real time. “We have teams of native Russian and Ukrainian content reviewers to help us review potentially violating content. We’re also using technology to help us scale the work of our content review teams and to prioritise what content those teams should be spending their time on, so we can take down more violating content before it goes viral,” Meta said. Additionally, the company outlined it has introduced new security features to keep people in Ukraine safe. These include giving users the tool to lock their Facebook profile in one step, temporarily removing the ability to view and search the friends lists of Facebook accounts in Ukraine, and rolling out notifications for screenshots and activating the disappearing messages feature on Messenger. “View once media” has also been enabled on WhatsApp to allow users to send photos or videos that can vanish after being seen, as well as “disappearing mode” to automatically erase all new chats after 24 hours. Russian-state media have also been blocked from advertising and making money on its platform, the company said. “Our thoughts are with everyone affected by the war in Ukraine. We are taking extensive steps across our apps to help ensure the safety of our community and support the people who use our services — both in Ukraine and around the world,” Meta wrote in a post. Clegg also wrote on Twitter that Ukrainians have suggested that Meta remove access to Facebook and Instagram in Russia. However, he said: “People in Russia are using FB and IG to protest and organise against the war and as a source of independent information”.”The Russian government is already throttling our platform to prevent these activities. We believe turning off our services would silence important expression at a crucial time,” he said. Twitter said it has also taken similar steps, including pausing advertisements in Ukraine and Russia “to ensure critical public safety information is elevated and ads don’t detract from it”. Meanwhile, Twitch and OnlyFans have reportedly blocked all users from Russia from accessing their accounts, preventing users from being able to withdraw money earned on their respective platforms, amid tougher sanctions being introduced against Russia.  Related Coverage More

  • in

    Elon Musk activates Starlink to help keep Ukraine's internet up and running

    With Russia’s invasion of Ukraine, Ukraine’s internet was sent staggering. Georgia Tech’s Internet Outage Detection and Analysis (IODA) project, which monitors the internet, reported serious outages in Ukraine starting late on February 23.In response to this and other internet attacks, Ukraine’s Vice Prime Minister and Minister of Digital Transformation Mykhailo Fedorov requested help from SpaceX and Tesla billionaire Elon Musk. Musk responded on Twitter, where he wrote, “Starlink service is now active in Ukraine. More terminals en route.”Starlink, SpaceX’s low-earth orbit (LEO) high-speed, low-latency internet service, is considered far more reliable than conventional broadband.One person on Twitter summed it up nicely: “The people of Ukraine now have access to the fastest, most robust satellite internet system ever created. This makes it impossible for Russia to disable the Ukrainian internet access fully without cyber attacking foreign data centers.” Even before the declaration of war, Russia has been targeting Ukraine with cyber attacks. On 15 January 2022, Russia injected malware and employed a DDoS attack on Ukrainian websites, while in 2016, a Russian cyber attack turned off the power supply of Ukraine’s capital city, Kyiv. More recently, Russia has been trying to disrupt Ukraine’s internet. According to the internet monitoring group NetBlocks, GigaTrans — Ukraine’s main internet service provider — has seen its traffic disrupted since February 24. NetBlocks also reported internet outages in major Ukrainian cities such as Kyiv, Kharkiv, and Mariupol.The Computer Emergency Response Team (CERT) of Ukraine also reported that Russia’s internet attacks have expanded beyond Ukraine. CERT Ukraine said the NC1151 group, a hacker organization associated with Belarus’s Ministry of Defense, a Russian ally, has also been attacking Polish and non-government Belarusian and Russian sites.Still, despite all of Russia’s efforts, Cloudflare Radar shows that for now Ukraine’s internet traffic, while suffering a significant drop, is still hanging in there. With the help of Starlink, Ukraine’s internet should still continue to hold its own. Updated at 11:21am AEST, 28 February 2022: fixed grammatical errors and added further information about Starlink activation.

    Ukraine Crisis More

  • in

    MWC 2022: TCL launches five more 30 Series smartphones, plus tablets and routers

    Fresh from unveiling a portfolio of products at CES, including TVs, tablets, smartphones, AR glasses and a laptop, and launching its first two (US exclusive) 30 Series phones, TCL is back at Mobile World Congress (MWC) with yet more new products. This time, there are details on a quintet of 30 Series phones, including one 5G model, along with three new tablets and three CPE routers. Here’s a tour of TCL’s MWC announcements.30 Series smartphones
    Image: TCL
    TCL ‘pre-announced’ its 30 Series phones at CES, and has recently launched the $300 30 V 5G and $200 30 XE 5G in the US, via Verizon and T-Mobile respectively. There are five new phones, all costing less than €300 and launching first in Europe; four of them are 4G handsets and the top-end phone is a 5G device. The phones are: TCL 30 5G, TCL 30+, TCL 30, TCL 30 SE and TCL 30 E. Key selling points across the range include the screens, which all feature TCL’s NXTVISION display optimisation technology and 20:9 aspect ratios. The 30 5G, 30+ and 30 have a 6.7-inch AMOLED panel with FHD+ (1080 x 2400, 395ppi) resolution and a 60Hz refresh rate. The 30 SE and 30 E both have a 6.52-inch ‘mini-notch’ panel with HD+ (720 x 1600, 269ppi) resolution. All 30 Series models bar the low-end TCL 30 E have a triple rear camera system comprising a 50MP main camera, a 2MP depth camera and a 2MP macro camera. The 30 E omits the macro capability. The front cameras are more varied: 13MP ultra-wide on the 30 5G and 30+, 8MP on the 30 and 30 SE, and 5MP on the entry-level 30 E. AI assistance makes it easy for non-expert users to get good results in different shooting conditions, TCL says – these are not premium cameras aimed at pro photographers. The 6.7-inch devices (30 5G, 30+, 30) all weigh 184g and are 7.74mm thick, with claimed screen-to-body ratios of 91.7%. The 6.52-inch models (30 SE, 30 E) are heavier (190g) and thicker (8.9mm) with lower screen-to-body ratios (89.1%). Although TCL describes the phones as ‘durable’, there’s no IP rating for dust and water resistance. The 30 Series phones all benefit from large batteries (5010mAh on the 30 5G, 30+ and 30, 5000mAh on the 30 SE and 30 E), delivering ‘better than day-long battery life’, according to TCL. Fast charging at 18W is supported on the three higher-end phones, 15W on the 30 SE and 10W on the 30 E. AI smart charging optimises the charging cycle to minimise battery deterioration. The 30 Series phones will ship with Android 12, and TCL plans to support two OS upgrades, although the details may change for carrier variants. However, TCL confirmed that the 30+ and 30 models are certified by the Android Enterprise Recommended program and will get at least two years of security patches and at least one OS upgrade. TCL’s 30 Series phones are all powered by MediaTek chipsets: Dimensity 700 (30 5G), Helio G37 (30+, 30) and Helio G25 (30 SE, 30 E). TCL 30 Series: pricing and availabilityModelPriceRegionDateTCL 30 5G€249 (64GB), €269 (128GB)Europe (select regions later)April 2022TCL 30+€199Europe (select regions later)nowTCL 30€179Europe (select regions later)nowTCL 30 SE€149 (64GB), €169 (128GB)Europe (select regions later)nowTCL 30 E€139Europe (select regions later)April 2022TabletsTCL is expanding its education-focused Android tablet portfolio with three new products: the TCL NXTPAPER MAX 10, TCL TAB 10 HD 4G and TCL TAB 10s 5G.
    Image: TCL
    The 10.36-inch NXTPAPER MAX 10 features TCL’s ‘paper-like’ NXTPAPER LCD display technology, which focuses on eye protection via a combination of multi-layer blue light reduction and anti-glare glass. The result, TCL says, is a ‘more comfortable, natural reading and writing experience’. There are two models – Wi-Fi only and Wi-Fi plus 4G LTE. 
    Image: TCL
    The 10.1-inch TCL Tab 10 HD 4G is an entertainment-focused device with an HD (1280 x 800) IPS screen, 8.7mm bezels resulting in an 82% screen to body ratio, and a 5500mAh battery that will ‘comfortably’ deliver all-day battery life, TCL says. As well as 4G LTE, the device offers Wi-Fi 5 (802.11ac) connectivity. A version with an FHD (1920 x 1200) screen will be available in Asia in mid-Q2 this year. 
    Image: TCL
    TCL claims that the 10.1-inch TAB 10s 5G is among the first affordable tablets with 5G connectivity. The NXTVISION screen has FHD (1920 x 1200) resolution, and the device is powered by an octa-core MediaTek chipset with 4GB of RAM and 64GB of internal storage, expandable via MicroSD card. Power is supplied by an 8000mAh battery, replenished by a 9V/2A charger. TCL also teased another 5G tablet – the 2-in-1 TCL TAB PRO 12 5G with ‘a large display and a ultra-fast 5G connectivity’, but offered no further details. TCL tablet pricing and availabilityModelPriceRegionDateTCL NXTPAPER MAX 10  from €269  Asia  mid-Q2 2022TCL TAB 10 HD 4G  €179  Europe  nowTCL TAB 10 FHD 4G  €199  Asia  late March 2022  TCL TAB 10s 5G  €349  n/smid-Q2 2022  RoutersTCL tops off its MWC portfolio with three CPE (Customer Premises Equipment) routers, the LINKHUB 5G CPE HH515 (first announced at CES), the LINKZONE LTE CAT6 Mobile Wi-Fi MW63, and the LINKHUB LTE CAT6 Home Station HH63.
    Image: TCL
    Capable of delivering a peak data rate of up to 4.7Gbps via sub-6GHz 5G, the LINKHUB 5G CPE HH515 can support up to 256 connections over dual band Wi-Fi 6 (802.11ax). With support for standalone (SA) as well as non-standalone (NSA) 5G networks, the HH515 router can support a variety of use cases (cloud-based gaming, live streaming, online education, home working) in areas where fixed-line internet access is poor. The LINKHUB 5G CPE HH515 will be available in Europe in Q1 2022, but TCL has not provided pricing.
    Image: TCL
    The LINKZONE LTE CAT6 Mobile Wi-Fi MW63 is a ‘MiFi’-style 4G device offering up to 300Mbps download speed and up to 32 Wi-Fi 5 (802.11ac) connections in a portable form factor powered by a 2150mAh battery offering up to 8 hours of working time and 300 hours on standby, TCL says.
    Image: TCL
    LINKHUB LTE CAT6 Home Station HH63 comes in a new ‘Tile’ design and also offers up to 300Mbps download and up to 32 Wi-Fi 5 connections. Both of TCL’s 4G routers, which are eSIM compatible, will launch in Europe in Q2 2022.Finally, TCL teased a 5G mobile router, the LINKZONE 5G Mobile Wi-Fi MW513, which will support mmWave as well as sub-6GHz 5G frequency bands and will launch ‘later in the year’. More

  • in

    Singapore advises local firms to beef up cyberdefence amidst Ukraine conflict

    Singapore has issued an advisory note highlighting the need for local organisations to bolster their cyberdefence amidst the ongoing conflict between Ukraine and Russia. In particular, businesses should be on the lookout for possible ransomware attacks as such tactics are commonly used by threat actors. There were no immediate reports of any threats to local businesses related to the Ukraine conflict, but organisations here were urged to take “active steps” to beef up their cybersecurity posture, according to Cyber Security Agency of Singapore (CSA). The government agency noted that cyber attacks on Ukraine and developments in the conflict had fuelled warnings of increased cyber threats across the globe. Organisations in Singapore should increase their vigilance and strengthen their cyberdefences to safeguard against potential attacks, such as web defacement, distributed denial of service (DDoS), and ransomware. 

    Special feature

    Cyberwar and the Future of Cybersecurity

    Today’s security threats have expanded in scope and seriousness. There can now be millions — or even billions — of dollars at risk when information security isn’t handled properly.

    Read More

    In an advisory note issued Sunday, Singapore Computer Emergency Response Team (SingCERT) pointed to the need to keep watch for ransomware attacks, which were one of the most common attacks launched by threat actors. “Falling victim to such attacks will adversely impact the operations and business continuity of any organisation,” said SingCERT, which sits within CSA. It said Singapore businesses should carry out necessary steps to secure their networks and review system logs to swiftly identify potential intrusions. These should include ensuring systems and applications were patched and updated to the latest version, disabling ports that were not essential for business purposes, and adopting strong access controls when using cloud services. In addition, system events should be properly logged to facilitate investigation of suspicious issues while both inbound and outbound network traffic should be monitored for suspicious communications or data transmissions, SingCERT said. It added that organisations also should have in place incident response and business continuity plans. Any suspicious compromise of corporate networks or evidence of such incidents should be reported to SingCERT. Australian Cyber Security Centre (ACSC) this past week also issued an advisory note urging local organisations to adopt an “enhanced cybersecurity position” and boost their cybersecurity resilience in light of the heightened threat landscape. “There has been a historical pattern of cyber attacks against Ukraine that have had international consequences,” it said. “Malicious cyber activity could impact Australian organisations through unintended disruption or uncontained malicious cyber activities. While the ACSC is not aware of any current or specific threats to Australian organisations, adopting an enhanced cybersecurity posture and increased monitoring for threats will help to reduce the impacts to Australian organisations.”Also stressing the need for vigilance to ransomware attacks, the Australian agency advised local businesses to review and enhance detection, mitigation, and response measures. They should, amongst others, ensure logging and detection systems in their environment were fully updated and functioning and apply additional monitoring of their networks where required.The Ukraine government reportedly had sought volunteers from the nation’s hacker community to protect critical infrastructure and run cyber spying missions against Russia. Citing sources involved in the call to action, a Reuters report said requests for volunteers popped up on hacker forums on Thursday. RELATED COVERAGE More

  • in

    This hotel is using technology in a truly creepy way (but some will like it)

    Can technology go too far in disturbing your peace?
    Getty Images
    The trend is inevitable.

    more Technically Incorrect

    And, as with so many trends, there’s pain too.Business owners have embraced technology as the elixir that offers speed and money-saving. Which has led to their permissiveness of its invasiveness running rampant.It’s not surveillance, many insist. It’s security. Meanwhile, their customers are left wondering who’s guarding the guardians.I wafted to this subject because of a tweet by a writer and drag queen. Joe Wadlington seemed excited that there was a new boutique hotel in the Castro district of San Francisco.But then he perused the rules perpetrated by the hotel’s management company, Kasa. It insists on quiet hours between 9 pm and 8 am. One person’s quiet is another person’s having a lovely time.So one section of Kasa’s rules offers: “Kasa apartments are proactively monitored for compliance with this noise policy.”Few enjoy the concept of proactive monitoring. It smacks of proactive snooping.Yet Kasa insists: “Decibel sensors notify the Company of sounds in the Kasa that exceed 75 decibels (dB). You hereby consent to the use of sound level monitoring.”I can hear you grunting at a minimum of 72 decibels. These people have sensors to monitor your every sound level? Isn’t that excessively, well, personal?And wait, how loud is 75 decibels? The University of Michigan tells me normal human conversation scores around 60. Office noise is a 70. And an average radio or vacuum cleaner scores a 75.You may, like me, find all this perplexing. Could it be that if you play the radio after 9 pm you’ll get a warning notice? And if you do it twice, you get a $500 fine or be kicked out of the hotel? (Them’s Kasa’s rules, you see.)For those who may not have visited the Castro district, it’s the home of the gay community and is a vibrant and sometimes loud place to be. The Bold Italic pointed out that if you claim your hotel is “community powered” — as the Hotel Castro does — its “current guest policies sit as an odious dichotomy to that very sentiment.”I fear some, though, may feel torn about the general principle.For many people, one of the more painful aspects of hotel existence is the prospect of thin walls and/or noisy people in adjacent hotel rooms.How many haven’t, at least once in their lives, called the front desk to complain about excessive noise coming from another guest — or, indeed, guests?If noise is being automatically monitored by technology, is this necessarily a bad thing?Then again, can technology really assess the true impact of noise? Is this better left to human judgment? And what if the people next door rather like the noise and even knock on their neighbor’s door to see if they can partake?Of course, many hotels are tending toward resisting human intervention because they’re resisting hiring humans. Indeed, as far as I can judge, the Hotel Castro has a virtual front desk.Ergo, once you’re in the grip of technological oversight, you’ll find it in places you don’t expect.Just as guests in Airbnbs these days have to ask whether the homeowner has an active camera system installed, so perhaps hotel guests may begin to ask questions about how they might be surveilled too.Sometimes, it’s hard to get a good night’s sleep, isn’t it? Or, as Wadlington put it: “I’m….so creeped out.”

    ZDNet Recommends More