wi-fi

The PureCam Connected Car Security System is a dashcam with extras

Posted by | automotive, cameras, connected car, dashcam, Gadgets, T-Mobile, technology, wi-fi, wireless data | No Comments

Thanks to a rash of YouTube videos of traffic stops, wild crashes and wacky antics, dashcams are becoming more and more popular with drivers. But does the world need one that shoots at 1080p and beams every minute of your drive back to a central storage device and can work as a Wi-Fi hotspot?

PureGear thinks so.

Their latest camera, the PureCam Connected Car Security System, shown at CES 2019, features front and back-facing cameras and is 4G LTE connected. In the unit we tested, it used T-Mobile for data transfer.

The device connects to your car’s OBD port, a diagnostics port that sends data to the camera and powers it. It has a full 1080p camera in front, a small VGA screen and a 720p rear-facing camera. It mounts to the window via a suction cup. It also can shoot in the dark and will sense when someone is breaking into your vehicle and begin recording.

This last part is critical. Because it is always connected, the PureCam will send footage of crashes and break-ins to the cloud. In this way, you have a video record inside and outside of the car.

The system requires a data plan, so you’ll have to head down to the cellphone shop to pick up a spare SIM card, but it also can record footage to the included 16 GB card.

The kit costs $249.99 and includes three months of wireless data and 7 GB of cloud storage for 12 months. Because it has its data provider, you can connect up to three devices to the PureCam’s hotspot.

This camera is mostly designed for peace of mind. Because the screen is relatively small and automatically dims while driving, you won’t notice the system until you need it. Because it uses the OBD port you don’t have to run cables to a cigarette lighter power port or USB port, thereby freeing things up for phones and the like. Finally, because it wakes up when your car is parked, it adds an extra layer of security.

The PureCam is surprisingly easy to install — you have to find your OBD port — but you do need a modern car and be willing to spend a bit on the data plan. While it’s not a perfect system, it’s one of the cleverest and most useful dashcams we’ve tried.

Powered by WPeMatico

iOS 13: Here are the new security and privacy features you might’ve missed

Posted by | Android, Apple, Apps, Bluetooth, cloud applications, computing, hardware, iOS, iPad, iPhone, privacy, safari, Security, smartphones, social media, tablet computers, technology, webmail, wi-fi | No Comments

In just a few weeks Apple’s new iOS 13, the thirteenth major iteration of its popular iPhone software, will be out — along with new iPhones and a new iPad version, the aptly named iPadOS. We’ve taken iOS 13 for a spin over the past few weeks — with a focus on the new security and privacy features — to see what’s new and how it all works.

Here’s what you need to know.

You’ll start to see reminders about apps that track your location

1 location track

Ever wonder which apps track your location? Wonder no more. iOS 13 will periodically remind you about apps that are tracking your location in the background. Every so often it will tell you how many times an app has tracked where you’ve been in a recent period of time, along with a small map of the location points. From this screen you can “always allow” the app to track your location or have the option to limit the tracking.

You can grant an app your location just once

2 location ask

To give you more control over what data have access to, iOS 13 now lets you give apps access to your location just once. Previously there was “always,” “never” or “while using,” meaning an app could be collecting your real-time location as you’re using it. Now you can grant an app access on a per use basis — particularly helpful for the privacy-minded folks.

And apps wanting access to Bluetooth can be declined access

Screen Shot 2019 07 18 at 12.18.38 PM

Apps wanting to access Bluetooth will also ask for your consent. Although apps can use Bluetooth to connect to gadgets, like fitness bands and watches, Bluetooth-enabled tracking devices known as beacons can be used to monitor your whereabouts. These beacons are found everywhere — from stores to shopping malls. They can grab your device’s unique Bluetooth identifier and track your physical location between places, building up a picture of where you go and what you do — often for targeting you with ads. Blocking Bluetooth connections from apps that clearly don’t need it will help protect your privacy.

Find My gets a new name — and offline tracking

5 find my

Find My, the new app name for locating your friends and lost devices, now comes with offline tracking. If you lost your laptop, you’d rely on its last Wi-Fi connected location. Now it broadcasts its location using Bluetooth, which is securely uploaded to Apple’s servers using nearby cellular-connected iPhones and other Apple devices. The location data is cryptographically scrambled and anonymized to prevent anyone other than the device owner — including Apple — from tracking your lost devices.

Your apps will no longer be able to snoop on your contacts’ notes

8 contact snoop

Another area that Apple is trying to button down is your contacts. Apps have to ask for your permission before they can access to your contacts. But in doing so they were also able to access the personal notes you wrote on each contact, like their home alarm code or a PIN number for phone banking, for example. Now, apps will no longer be able to see what’s in each “notes” field in a user’s contacts.

Sign In With Apple lets you use a fake relay email address

6 sign in

This is one of the cooler features coming soon — Apple’s new sign-in option allows users to sign in to apps and services with one tap, and without having to turn over any sensitive or private information. Any app that requires a sign-in option must use Sign In With Apple as an option. In doing so users can choose to share their email with the app maker, or choose a private “relay” email, which hides a user’s real email address so the app only sees a unique Apple-generated email instead. Apple says it doesn’t collect users’ data, making it a more privacy-minded solution. It works across all devices, including Android devices and websites.

You can silence unknown callers

4 block callers

Here’s one way you can cut down on disruptive spam calls: iOS 13 will let you send unknown callers straight to voicemail. This catches anyone who’s not in your contacts list will be considered an unknown caller.

You can strip location metadata from your photos

7 strip location

Every time you take a photo your iPhone stores the precise location of where the photo was taken as metadata in the photo file. But that can reveal sensitive or private locations — such as your home or office — if you share those photos on social media or other platforms, many of which don’t strip the data when they’re uploaded. Now you can. With a few taps, you can remove the location data from a photo before sharing it.

And Safari gets better anti-tracking features

9 safari improvements

Apple continues to advance its new anti-tracking technologies in its native Safari browser, like preventing cross-site tracking and browser fingerprinting. These features make it far more difficult for ads to track users across the web. iOS 13 has its cross-site tracking technology enabled by default so users are protected from the very beginning.

Read more:

Powered by WPeMatico

Security flaws in a popular smart home hub let hackers unlock front doors

Posted by | Gadgets, Home Automation, Password, privacy, private key, search engine, Security, smart device, smart devices, smart home devices, smart lock, spokesperson, wi-fi | No Comments

When is a smart home not so smart? When it can be hacked.

That’s exactly what security researchers Chase Dardaman and Jason Wheeler did with one of the Zipato smart hubs. In new research published Tuesday and shared with TechCrunch, Dardaman and Wheeler found three security flaws which, when chained together, could be abused to open a front door with a smart lock.

Smart home technology has come under increasing scrutiny in the past year. Although convenient to some, security experts have long warned that adding an internet connection to a device increases the attack surface, making the devices less secure than their traditional counterparts. The smart home hubs that control a home’s smart devices, like water meters and even the front door lock, can be abused to allow landlords entry to a tenant’s home whenever they like.

In January, security expert Lesley Carhart wrote about her landlord’s decision to install smart locks — forcing her to look for a new home. Other renters and tenants have faced similar pressure from their landlords and even sued to retain the right to use a physical key.

Dardaman and Wheeler began looking into the ZipaMicro, a popular smart home hub developed by Croatian firm Zipato, some months ago, but only released their findings once the flaws had been fixed.

The researchers found they could extract the hub’s private SSH key for “root” — the user account with the highest level of access — from the memory card on the device. Anyone with the private key could access a device without needing a password, said Wheeler.

They later discovered that the private SSH key was hardcoded in every hub sold to customers — putting at risk every home with the same hub installed.

Using that private key, the researchers downloaded a file from the device containing scrambled passwords used to access the hub. They found that the smart hub uses a “pass-the-hash” authentication system, which doesn’t require knowing the user’s plaintext password, only the scrambled version. By taking the scrambled password and passing it to the smart hub, the researchers could trick the device into thinking they were the homeowner.

All an attacker had to do was send a command to tell the lock to open or close. With just a few lines of code, the researchers built a script that locked and unlocked a smart lock connected to a vulnerable smart hub.

The proof-of-concept code letting the hackers unlock a smart lock (Image: Chase Dardaman, Jason Wheeler)

Worse, Dardaman said that any apartment building that registered one main account for all the apartments in their building would allow them to “open any door” from that same password hash.

The researchers conceded that their findings weren’t a perfect skeleton key into everyone’s homes. In order to exploit the flaws, an attacker would need to be on the same Wi-Fi network as the vulnerable smart hub. Dardaman said any hub connected directly to the internet would be remotely exploitable. The researchers found five such vulnerable devices using Shodan, a search engine for publicly available devices and databases.

Zipato says it has 112,000 devices in 20,000 households, but the exact number of vulnerable hubs isn’t known.

We asked SmartRent, a Zipato customer and one of the largest smart home automation providers, which said fewer than 5% of its apartment-owning customers were affected by the vulnerable technology. A spokesperson wouldn’t quantify the figure further. SmartRent said it had more than 20,000 installations in mid-February, just weeks before the researchers’ disclosure.

For its part, Zipato fixed the vulnerabilities within a few weeks of receiving the researchers’ disclosure.

Zipato’s chief executive Sebastian Popovic told TechCrunch that each smart hub now comes with a unique private SSH key and other security improvements. Zipato has also since discontinued the ZipaMicro hub in favor of one of its newer products.

Smart home tech isn’t likely to go away any time soon. Figures from research firm IDC estimate more than 832 million smart home devices will be sold in 2019, just as states and countries crack down on poor security in internet-connected devices.

That’s also likely to bring more scrutiny to smart home tech by hackers and security researchers alike.

“We want to show that there is a risk to this kind of tech, and apartment buildings or even individual consumers need to know that these are not necessarily safer than a traditional door lock,” said Dardaman.

Powered by WPeMatico

Netgear adds gigabit routers to its Orbi mesh

Posted by | CES 2019, computing, Gadgets, gigabit, Google WiFi, Netgear, Router, TC, wi-fi, wireless, wireless networking | No Comments

My favorite mesh gear, Netgear’s Orbi, has gotten a considerable speed update. The new router, called the RBK50, supports Wi-Fi 6 802.11ax technology which will send gigabit wireless speeds from router to router in your mesh.

WiFi 6 is still new to the industry and there isn’t much support outside of specific hardware like this.

Performance of the industry leading Orbi Mesh Wi-Fi Systems is improved by adding 1024 QAM with a 4×4 Wi-Fi 6 backhaul, increasing the speeds, coverage and capacity of this dedicated wireless link between the Orbi router and satellites.

With an advanced Wi-Fi 6 networking SoC from Qualcomm Technologies, Inc., Orbi with Wi-Fi 6 will support even higher performance simultaneous Wi-Fi streams, making it possible to deliver gigabit internet to far more devices and enable these gigabit internet homes to take advantage of new Wi-Fi 6 performance, which will be designed into the next generation of mobile and smart home devices.

The new routers will ship in Q3 2019 or later. No pricing is available yet.

Powered by WPeMatico

D-Link thinks 5G will cut your cords forever

Posted by | 5g, Best-Buy, CES 2019, computing, D Link, DSP, Gadgets, Internet of Things, Router, TC, technology, wi-fi, wireless | No Comments

Network gear maker D-Link just announced a 5G router that sends high-speed Wi-Fi through your house without cables. The router, called the DWR-2010, should allow users to get massive speeds over 5G networks without running cable. Don’t expect to pick this up at the local Best Buy, however, as the 5G router will probably ship from wireless service providers.

The DWR-2010 also offers customization options for service providers, making it suitable for deployment on a range of network configurations. The gateway features an embedded 5G NR (New Radio) NSA module and can operate on the sub-6 GHz or mmWave frequencies in 200 MHz (2 x 100 MHz) or 800 MHz (8 x 100 MHz) configurations. Complete with remote management (TR-069) and FOTA, the DWR-2010 provides hassle-free operation and a better customer experience.

D-Link also announced some new Exo mesh routers as well as a cute little mydlink devices including a smart switch and a weird little water sensor that will warn you when your water heater explodes. The Indoor Wi-Fi Smart Plug (DSP-W118) and Outdoor Wi-Fi Smart Plug (DSP-W320) will control your lights and appliances both indoors and out.

Expect these cool tools to hit stores in Q2 2019.

Powered by WPeMatico

Hackers hijack thousands of Chromecasts to warn of latest security bug

Posted by | Amazon, chromecast, computing, echo, Gadgets, Google, Hack, hardware, iPad, media streamer, Security, smart devices, smart home devices, spokesperson, technology, wi-fi | No Comments

Hackers have hijacked thousands of exposed Chromecast streaming devices to warn users of the latest security flaw to affect the device. But other security researchers say that the bug — if left unfixed — could be used for more disruptive attacks.

The culprits, known as Hacker Giraffe and J3ws3r, have become the latest person to figure out how to trick Google’s media streamer into playing any YouTube video they want — including videos that are custom-made. This time around, the hackers hijacked forced the affected Chromecasts to display a pop-up notice that’s viewable on the connected TV, warning the user that their misconfigured router is exposing their Chromecast and smart TV to hackers like themselves.

Not one to waste an opportunity, the hackers also asks that you subscribe to PewDiePie, an awful internet person with a popular YouTube following. (He’s the same hacker who tricked thousands of exposed printers into printing support for PewDiePie.)

The bug, dubbed CastHack, exploits a weakness in both Chromecast and the router it connects to. Some home routers have enabled Universal Plug and Play (UPnP), a networking standard that can be exploited in many ways. UPnP forwards ports from the internal network to the internet, making Chromecasts and other devices viewable and accessible from anywhere on the internet.

As the two say, disabling UPnP should fix the problem.

“We have received reports from users who have had an unauthorized video played on their TVs via a Chromecast device,” a Google spokesperson told TechCrunch. “This is not an issue with Chromecast specifically, but is rather the result of router settings that make smart devices, including Chromecast, publicly reachable,” the spokesperson said.

That’s true on one hand, but it doesn’t address the underlying issue — that the Chromecast can be tricked into allowing an unauthenticated attacker the ability to hijack a media stream and display whatever they want.

Hacker Giraffe sent this YouTube video to thousands of exposed Chromecast devices, warning that their streams could be easily hijacked. (Screenshot: TechCrunch)

Bishop Fox, a security consultancy firm, first found a hijack bug in 2014, not long after the Chromecast debuted. The researchers found that they could conduct a “deauth” attack that disconnects the Chromecast from the Wi-Fi network it was connected to, causing it to revert back to its out-of-the-box state, waiting for a device to tell it where to connect and what to stream. That’s when it can be hijacked and forced to stream whatever the hijacker wants. All of this can be done in an instant — as they did — with a touch of a button on a custom-built handheld remote.

Two years later, U.K. cybersecurity firm Pen Test Partners discovered that the Chromecast was still vulnerable to “deauth” attacks, making it easy to play content on a neighbor’s Chromecasts in just a few minutes.

Ken Munro, who founded Pen Test Partners, says there’s “no surprise that somebody else stumbled on to it,” given both Bishop Fix found it in 2014 and his company tested it in 2016.

“In fairness, we never thought that the service would be exposed on the public internet, so that is a very valid finding of his, full credit to him for that,” Munro told TechCrunch. (Google said in a follow-up email that it’s working to fix the deauth bug.)

He said the way the attack is conducted is different, but the method of exploitation is the same. CastHack can be exploited over the internet, while Bishop Fox and his “deauth” attacks can be carried out within range of the Wi-Fi network — yet, both attacks let the hacker control what’s displayed on the TV from the Chromecast, he said.

Munro said Google should have fixed its bug in 2014 when it first had the chance.

“Allowing control over a local network without authentication is a really silly idea on [Google’s] part,” he said. “Because users do silly things, like expose their TVs on the internet, and hackers find bugs in services that can be exploited.”

But Munro said that these kinds of attacks — although obnoxious and intrusive on the face of it — could be exploited to have far more malicious consequences.

In a blog post Wednesday, Munro said it was easy to exploit other smart home devices — like an Amazon Echo — by hijacking a Chromecast and forcing it to play commands that are loud enough to be picked up by its microphone. That’s happened before, when smart assistants get confused when they overhear words on the television or radio, and suddenly and without warning purchase items from Amazon. (You can and should turn on a PIN for ordering through Amazon.)

To name a few, Munro said it’s possible to force a Chromecast into loading a YouTube video created by an attacker to trick an Echo to: “Alexa, order an iPad,” or, “Alexa, turn off the house alarm,” or, “Alexa, set an alarm every day at 3am.”

Amazon Echos and other smart devices are widely considered to be secure, even if they’re prone to overhearing things they shouldn’t. Often, the weakest link are humans. Second to that, it’s the other devices around smart home assistants that pose the biggest risk, said Munro in his blog post. That was demonstrated recently when Canadian security researcher Render Man showed how using a sound transducer against a window can trick a nearby Amazon Echo into unlocking a network-connected smart lock on the front door of a house.

“Google needs to properly fix the Chromecast deauth bug that allows casting of YouTube traffic,” said Munro.

Updated at 9pm ET: with a new, clearer headline to better reflect the flaws over the years, and added additional comment from Google.

Powered by WPeMatico

Google’s Project Fi gets an improved VPN service

Posted by | Android, Google, Mobile, project fi, Security, virtual private networks, vpn, wi-fi, wireless, wireless service | No Comments

Google’s Project Fi wireless service is getting a major update today that introduces an optional always-on VPN service and a smarter way to switch between Wi-Fi and cellular connections.

By default, Fi already uses a VPN service to protect users when they connect to the roughly two million supported Wi-Fi hotspots. Now, Google is expanding this to cellular connections, as well. “When you enable our enhanced network, all of your mobile and Wi-Fi traffic will be encrypted and securely sent through our virtual private network (VPN) on every network you connect to, so you’ll have the peace of mind of knowing that others can’t see your online activity,” the team writes in today’s announcement.

Google notes that the VPN also shields all of your traffic from Google itself and that it isn’t tied to your Google account or phone number.

The VPN is part of what Google calls its “enhanced network” and the second part of this announcement is that this network now also allows for a faster switch between Wi-Fi and mobile networks. When you enable this — and both of these features are currently in beta and only available on Fi-compatible phones that run Android Pie — your phone will automatically detect when your Wi-Fi connection gets weaker and fill in those gaps with cellular data. The company says that in its testing, this new system reduces a user’s time without a working connection by up to 40 percent.

These new features will start rolling out to Fi users later this week. They are off by default, so you’ll have to head to the Fi Network Tools in the Project Fi app and turn them on to get started. One thing to keep in mind here: Google says your data usage will likely increase by about 10 percent when you use the VPN.

Powered by WPeMatico

BoxLock secures your booty against porch pirates

Posted by | Amazon, containers, Gadgets, Gates, key, lock, package delivery, padlock, TC, transport, UPS, wi-fi | No Comments

This clever – if expensive – product is called the BoxLock and it is a keyless padlock that lets your package delivery person scan and drop off your packages into a locked box. The system essentially watches for a shipping event and then waits for the right barcode before opening. Once the delivery person scans the package, the lock opens, the delivery person sticks the package in a box or shed (not included) and locks it back up. You then go and grab your package at your leisure.

The lock costs $129.

The company appeared on everyone’s favorite show, Shark Tank, where they demonstrated the system with a fake door and fake UPS dude.

The internal battery lasts 30 days on one charge and it connects to your phone and house via Wi-Fi. While the system does require a box – it’s called BoxLock, after all, not LockBox – it’s a clever solution to those pesky porch pirates who endlessly steal my YorkieLoversBox deliveries.

Powered by WPeMatico

Everyday home gear made smart

Posted by | Android, Assistant, Belkin, belkin wemo, Bluetooth, Column, electronics manufacturing, Gadgets, Google, Home Automation, iRobot, kwikset, Nest Labs, Roomba, smart devices, smart thermostat, smartphone, Speaker, wi-fi, Wirecutter | No Comments
Makula Dunbar
Contributor

Makula Dunbar is a writer with Wirecutter.

Editor’s note: This post was done in partnership with Wirecutter. When readers choose to buy Wirecutter’s independently chosen editorial picks, Wirecutter and TechCrunch may earn affiliate commissions.

If you only have one smart home device, it’s likely something simple and fun like a voice-controlled speaker or color-changing LED light bulb. As you expand your smart home setup, you can begin to swap out gear that isn’t as flashy but you still use everyday.

Switching to connected locks, power outlets and smoke alarms are all simple installs that can improve your safety and comfort in your own home. We’ve pulled together some of our favorite essentials made smart for anyone looking to upgrade.

Smart lock: Kwikset Kevo Smart Lock 2nd Gen

The Kwikset Kevo Smart Lock 2nd Gen is the most versatile smart lock that we’ve tested. Whether you prefer to use a wireless fob, smartphone app or key, you’ll be able to control the lock with all of them. When we compared it to similar models, the Kevo’s Bluetooth-activated tap-to-unlock mechanism was the easiest to use.

The second generation of the Kevo improved on security and has all-metal internal components for better protection against forced break-in attempts. With the optional Kevo Plus upgrade, you’ll add the ability to control the lock remotely and receive status-monitoring updates.

Photo: Liam McCabe

Robot Vacuum: iRobot Roomba 960

If cleaning is neither your forte or preferred pastime, a robot vacuum will come in handy. Our upgrade pick, the iRobot Roomba 960, is one of the most powerful models that we tested. It can be controlled through the iRobot Home app and uses a bump-and-track navigation system that helps vacuum an entire floor without missing spots.

If its battery is running low during a session, it’ll return to its dock to power up before finishing the job. It’s easy to disassemble for maintenance and is equipped with repairable parts that make it worth its price over some of our less serviceable picks.

Photo: Rachel Cericola

Plug-in Smart Outlet: Belkin Wemo Mini

We tested 26 smart outlet models over more than 45 hours and chose the Belkin Wemo Mini Wi-Fi plug as our top pick. If you’ve ever thought it’d be nice to remotely turn on or off home essentials such as lamps, air conditioners and fans from your smartphone, plugging them into a smart outlet makes it possible.

The Wemo Mini has proven to be reliable throughout long-term testing, it doesn’t block other outlets on the same wall plate and it’s compatible with iOS and Android devices and assistants, including HomeKit/Siri, Alexa and Google Assistant. The interface of the Wemo app is intuitive and easy to use. You can view all of your connected devices on one screen, set powering timers and from anywhere power on or off a device plugged into the Wemo outlet.

Photo: Jennifer Pattison Tuohy

Smart Thermostat: Nest Thermostat E

For a smart thermostat that’s affordable and doesn’t require extensive programming, we recommend the Nest Thermostat E. After about a week, it creates a schedule after learning cooling and heating preferences that you’ve set. It isn’t compatible with as many HVAC systems as similar Nest models, but it’s easy to install and doesn’t lack any features we expect.

It does come with Eco Mode — an energy-saving geofencing feature that detects when your home is empty (or when your smartphone is nowhere near your house). The Nest app uses the same technology to set the thermostat to a preferred temperature when it senses you’re on your way home. If you don’t have your smartphone on hand, you can still operate the Thermostat E by turning its outer ring and pressing selections on its touchscreen.

Photo: Michael Hession

Smart Smoke Alarm: Nest Protect

A smoke alarm is one of the most relied-upon safety devices in every home. Nonetheless, it’s easy to forget to do routine checks to ensure it’s in tip-top shape and functioning properly. With a smart smoke alarm like the Nest Protect, we found that its simple app, self-tests, monthly sound checks and consistent alerts are enough to keep fire safety worries at bay.

It isn’t difficult to install, has a sleek design and integrates with other smart home devices like the Nest Cam (which can record video of a fire) and the Nest Learning Thermostat (which shuts down HVAC systems that may be the cause of a fire). It’s sensitive to fast- and slow-burning fires, plus it monitors homes for both smoke and carbon monoxide.

These picks may have been updated by Wirecutter. When readers choose to buy Wirecutter’s independently chosen editorial picks, Wirecutter and TechCrunch may earn affiliate commissions.

Powered by WPeMatico

The VoCore2 is a tiny computer that can play tiny Doom

Posted by | Computer Hardware, computing, ethernet, Gadgets, indiegogo, TC, usb, wi-fi | No Comments

The VoCore2 is a Wi-Fi capable computer with a 580 MHz CPU and 128 RAM that supports video, USB, and Ethernet. And it plays Doom. That’s right: this is a computer you can easily swallow and allow your biome flora to play a hard core FPS while you slowly digest the package.

The product started life on Indiegogo where it raised $100,000. Now it’s available for $17 for the barebones unit or $24 for the unit with USB and MicroSD card. You can also buy a four inch display for it that lets you display video at 25fps.

What is this thing good for? Well, like all single board computers it pushes the limits on what computing means in the 21st century. A computer the size of a Euro coin could fit in all sorts of places and for all sorts of weird projects and even if you don’t use it to build the next unmanned Red-Tailed Hawk nest surveillance drone it could be cool to blast some demons on a computer the size of a joystick button.

The VoCore2 is shipping soon and is available for purchase here.

Powered by WPeMatico