iT eXperimented – Latest Technology News, Software Tips & Tricks, How-To-Guides, Gadget Reviews, features and watch videos on latest mobile phones, laptops, tablets, digital cameras, notebooks, apps and more
Carl Pei, OnePlus co-founder, has officially announced that the OnePlus 5 will receive a Face Unlock update.
“Due to popular demand, Face Unlock is coming for the OnePlus 5. Thanks for the feedback, and merry Christmas,” he tweeted yesterday.
When OnePlus launched the OnePlus 5T late this year, one of the only big differences that helped separate the two was Face Unlock, the OnePlus 5T’s biometric facial recognition feature. Unlike Face ID on the iPhone X, the 5T’s Face Unlock only uses a regular selfie camera, instead of a fancy infrared depth-mapping camera. That makes for a facial scan that’s less secure and unique, but also faster, and crucially, one that’s only based in software.
The lack of dedicated hardware also means that OnePlus can bring Face Unlock to older devices, and that’s exactly what it plans to do, following customer feedback. OnePlus 5 owners, time to be happy, because OnePlus just gave you a very timely Christmas present.
Now able to upload photos directly to Shot on OnePlus
Instructions How to Install Android Oreo on OnePlus 5
Now, you can install the update and choose the method depending on your device’s current situation. If your OP5 is running OxygenOS 4.5.14, you can simply use method 1. In case your device has TWRP recovery installed, you can use method 2.
Method 1: Using Local Upgrade
Download the full ROM package from the link Download.
Connect your OnePlus 5 to the PC and enable File Transfer mode.
Transfer the full ROM file to the root of the internal storage. By ‘root’, we mean outside all the folders.
Disconnect the device.
Go to ‘Settings’ -> ‘System updates’.
Tap on the cog (gear icon) on the top-right of the screen.
Select ‘Local upgrade’.
The system will automatically detect the ROM file.
So, tap on the file name and press ‘UPGRADE NOW’.
Your device will reboot into the recovery and install the OnePlus 5 Open Beta 1. Once done, your OP5 will boot into the updated ROM.
Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them. The new vector is dubbed “BlueBorne”, as it spread through the air (airborne) and attacks devices via Bluetooth. Armis has also disclosed eight related zero-day vulnerabilities, four of which are classified as critical. BlueBorne allows attackers to take control of devices, access corporate data and networks, penetrate secure “air-gapped” networks, and spread malware laterally to adjacent devices. Armis reported these vulnerabilities to the responsible actors, and is working with them as patches are being identified and released.
What Is BlueBorne?
BlueBorne is an attack vector by which hackers can leverage Bluetooth connections to penetrate and take complete control over targeted devices. BlueBorne affects ordinary computers, mobile phones, and the expanding realm of IoT devices. The attack does not require the targeted device to be paired to the attacker’s device, or even to be set on discoverable mode. Armis Labs has identified eight zero-day vulnerabilities so far, which indicate the existence and potential of the attack vector. Armis believes many more vulnerabilities await discovery in the various platforms using Bluetooth. These vulnerabilities are fully operational, and can be successfully exploited, as demonstrated in our research. The BlueBorne attack vector can be used to conduct a large range of offenses, including remote code execution as well as Man-in-The-Middle attacks.
Install BlueBorne Vulnerability Scanner by Armis app (created by Armis team) from Google Play Store to check if their devices are vulnerable to BlueBorne attack or not. If found vulnerable, you are advised to turn off Bluetooth on your device when not in use.
Whenever you use the function get_post_meta() , the above query will be performed to get all post meta and store in the cache. The more posts you query, the more queries are made. To reduce the number of queries, we should pre-cache all meta values of all posts in the query before calling get_post_meta .