Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


kya100 last won the day on September 16 2018

kya100 had the most liked content!

About kya100

  • Rank
    Advanced Member

Profile Information

  • Gender
    Not Telling

Recent Profile Visitors

487 profile views
  1. Setting up an Android smartphone or tablet as a WiFi adapter is easy to do. It can be good for a quick solution for a Desktop computer that needs a wireless connection or broken WiFi on a laptop. Be aware not all cell phone Carriers allow for this and may turn off the WiFi forcing you to use your Data plan. How To Use Your Android Phone as a USB WiFi Adapter Tethering No For this reason it is best to use an Android device not setup on a Cell Plan so there is no chance of running up the data. Any old Android Device will work. Even used old Galaxy S2 and S5 will work very well. There is many cheap low cost WiFi dongles for a long term solution but an Android smartphone can be used as a short term quick fix. Below are the steps to follow to use an Android Device as a wireless USB adapter. Some phones and Android version may vary in setup but will be close to the following instructions with no need to Root the phone. Steps To Use Your Android Phone as a USB WiFi Adapter Go to Settings–>Wireless & Networks Connect To the WiFi Connect to a PC with a USB Cable Go to Setting find Mobile HotSpot or Tethering and Enable it 1… Connect the Android Smartphone or Tablet to the WiFi. How To Use Your Android Phone as a USB WiFi Adapter Setup 1 2… Plug in the phone to the computer with a USB cable. How To Use Your Android Phone as a USB WiFi Adapter 1 Sometimes Drivers for the phone will need to be loaded. Usually it is automatically found. 3… Go to Setting and find Mobile HotSpot and Tethering On the new smartphones it is under Connections. How To Use Your Android Phone as a USB WiFi Adapter Tethering On the old Galaxy S1 it is called Tethering and Portable HotSpot. How To Use Your Android Phone as a USB WiFi Adapter Setup 2 4… If a warning box comes up and says the WiFi is being shut off the phone can Not be used as a WiFi Adapter. How To Use Your Android Phone as a USB WiFi Adapter Tethering No If you use a smartphone tied to a Cell Plan and it turns off the WiFi it may run up your bill depending on your Data Plan. 5… After Tethering is turned on it should be ready to use. Summary Usign a Android device and a USB WiFi adapter is easy to do simply be careful if the device is on a cell plan. Many cell phone Carriers will turn off the WiFi and force it to use the Data Plan which can run a bill up. Using a old cell phone with no cell plan is best since there is no chance of it using Cell Data.
  2. The add-on will still use Edge to open untrusted URLs, though. Microsoft has developed and started testing Windows Defender Application Guard extensions for both Chrome and Firefox to better protect enterprise PCs. The feature, which used to be an Edge exclusive, keeps PCs safe by opening web pages not included in administrators' trusted sites in a virtual container. That way, it can prevent attackers from gaining entry into the company's system if the website turns out to be malicious. While the extensions can be downloaded from the browsers' respective stores, Windows Defender for Chrome and Firefox won't work without help from Edge. If it determines that the URL is not in the trusted list, it will open the website in an isolated Edge session. However, any link clicked in the isolated session will still launch in the original browser if it's a trusted website. To use the feature, both the Windows Defender companion application from the Microsoft Store and the browser-specific extension must be installed. Since it's still in preview mode, only Insiders can access it at the moment, though it will eventually have a wide release once it's been tested more thoroughly.
  3. Some even labeled themselves as viruses. It can be wise to secure your Android phone with antivirus software, but which ones can you count on? You can rule out most of them, apparently. AV-Comparatives has tested 250 antivirus apps for Google's platform, and only 80 of them (just under one third) passed the site's basic standards -- that is, they detected more than 30 percent of malicious apps from 2018 and had zero false positives. Some of the apps that fell short would even flag themselves, according to the researchers. In some cases, the failure is a simple one: they're not really scanning app code. AV-Comparatives found that are just using app whitelists or blacklists, and sometimes very broad ones at that. They may allow all apps whose package files start with "com.instagram," but it would be trivial to create rogue apps that used a variant on that name. The apps that passed muster came from familiar security brands, with big names like AVG, Kaspersky, McAfee and Symantec catching everything. Those that fell short had a familiar pattern, however. Many of them were written by amateurs, cookie-cutter apps or from companies that clearly aren't focused on security. Anti-malware apps from 32 of the vendors in the test have vanished in the two months since the test took place in January. It's safe to say this serves as a reminder to stick to antivirus tools from companies with solid track records. However, this also illustrates the challenge Google and other store operators face in screening apps. They can verify that the apps aren't causing harm to users or violating the law, but they can't enforce a baseline level of quality needed to keep your phone safe.
  4. It could be used for broadband, imaging and beyond. Never mind the possibilities opened up by millimeter wave 5G and other many-gigahertz technologies -- the FCC is already thinking about the next generation beyond that. The Commission has voted unanimously in favor of creating a category of experimental licenses that range from 95GHz to a whopping 3THz -- effectively, the limits of usable wireless technology. The Spectrum Horizons order would let companies experiment with this ultra-high frequency tech for as long as 10 years, and would make it easier for them to sell real-world products while they're in that test phase. The measure also sets aside 21.2GHz of spectrum to share for unlicensed devices. The airwaves in question were chosen to minimize possible interference with current "governmental and scientific" uses in those areas, such as space science. These frequencies could lead to extremely fast wireless network data, advanced imaging and very fine-grained sensors, among other purposes. However, you might not want to get your hopes up for a cellphone with terahertz 6G any time soon. Even more so than with millimeter waves, the terahertz range would be limited by short ranges and difficulty penetrating objects. That's what the experiments are for, though -- it could establish uses that aren't even on the radar yet.
  5. In the UK, folks making contactless (NFC) card payments at stores and supermarkets are limited on how much they can ring up at the checkouts. But for a few NatWest customers that limit is set to disappear, as the bank launches a trial for using biometric authentication when making card payments. As in other countries around the world, many stores, service stations and eateries in the UK now cater for contactless payments by card, where a customer waves a chipped card over the top of a reader until a beep sounds and payment is made without having to enter a security code. Such transactions are limited to £30 a pop for security reasons. NatWest has teamed up with digital security company Gemalto, along with Visa and Mastercard, to trial a card that scans a user's fingerprint to verify identity, and then unlocks the per transaction limit that's normally applied. "Using a fingerprint rather than a PIN code to authorize transactions has many advantages, primarily enhanced security and greater convenience," said Gemalto's Howard Berg. "Cardholders can pay quickly and easily with just a simple touch, and they no longer need to worry about the limit on contactless payment transactions." A user's registered fingerprint is stored on the card itself and verification takes place directly on the card too, so retailers won't need to update their point-of-sale technology. The card can be set up at a branch or at home, the latter involving bank customers being sent a special sleeve with their card. Once a fingerprint has been added to a card, it can't be changed. The fingerprint-sensing card trial is due to start in the coming weeks, with NatWest choosing 200 of its customers to take part. The video below gives an idea of how the system might work. https://www.youtube.com/watch?v=xsYyvx6q-xs Source: NatWest (RBS)
  6. To maintain communications during emergencies or in remote areas, Lockheed Martin has come up with a new LTE-over-Satellite system that will allow LTE mobile phones to hook up with satellites to provide 4G connections. Designed to complement satellite phones, the new system produces a pop-up cellular network that can be accessed by commercial phones to connect for voice, SMA, and data transfers at broadband service rates. Mobile phones have become so much a part of our lives that we often forget how fragile mobile networks are compared to old-fashioned landlines. Natural disasters such as hurricanes or earthquakes can knock out vital parts of the cellular communications infrastructure and large numbers of people trying to contact emergency services or making sure that loved ones are safe can overload capacity even if there's no physical damage. It's a situation that can not only make recovery efforts difficult, it can also cause massive economic disruption. Even if human lives are not at risk, modern society is so dependent on wireless communications that disruption can seriously impact commerce to the point where something as simple as buying a cup of coffee can be affected. Lockheed hasn't released too many details about its new LTE-over-Satellite system, but it very likely takes advantage of LTE's increased speed and data capacity as well as its digital signal processing techniques and unique radio spectrum to connect with powerful orbital satellites. The company says that in an emergency the new system can work with hot spots mounted on land vehicles or ships for wider coverage to not only help individuals, but also to help responders remain in contact. In addition, the new system can provide cargo shippers with the ability to exchange location and shipment information, as well as connecting remote locations with no coverage, including remote mining camps, research stations, fishing vessels or agricultural operations. "When disaster strikes, cell phone networks often go down – whether because of the event or because of the sheer volume of traffic," says Maria Demaree, vice president and general manager of Mission Solutions at Lockheed Martin Space. "So, it's important to have new ways to connect families and first responders with people who would be otherwise cut off from contact." Source: Lockheed Martin
  7. Mozilla has made it easy for you to share large files securely and privately with whomever you want, eliminating the need to depend upon less secure free third-party services or file upload tools that burn a hole in your pocket. Mozilla has finally launched its free, end-to-end encrypted file-transfer service, called Firefox Send, to the public, allowing users to securely share large files like video, audio or photo files that can be too big to fit into an email attachment. Firefox Send was initially rolled out by Mozilla to test users way back in August 2017 as part of the company's now-defunct "Test Pilot" experimental program. Firefox Send allows you to send files up to 1GB in size, but if you sign up for a free Firefox account, you can upload files as large as 2.5GB in size. The service uses a browser-based encryption technology that encrypts your files before uploading them to the Mozilla server, which can only be decrypted by the recipients. Unlike popular file storage and sharing services like Dropbox, Google Drive, Microsoft OneDrive and Box, Firefox Send is not available as desktop software or internally integrated with other products, i.e., Firefox, from its parent company. It's just an online website where you can quickly upload a file → protect it with a password (optional) and set an expiration period → use any medium to share the link it generates with whomever the sender wants. The recipients can then simply download the file just by visiting the shared URL regardless of whether they have a Firefox account or not. Here are the key features of Firefox Send: •End-to-End Encryption — Firefox Send uses 128-bit AES-GCM encryption via the Web Crypto API to encrypt files in the web browser before uploading them to the server. •Set Time Limit — While uploading the file, you can choose a time range between 5 minutes and week after which your file link expires, making it unable to download at the recipient's end. •Limit Number of Downloads — You can also set a number of file downloads (between 1 and 100 downloads) after which the download link automatically expires. •Set a Password — For an extra layer of security, you can also opt to set a password that would be required before a recipient can download a file. "We know there are several cloud sharing solutions out there, but as a continuation of our mission to bring you more private and safer choices, you can trust that your information is safe with Send," Nick Nguyen, Mozilla's Vice President of Firefox Product, said in a blog post. "As with all Firefox apps and services, Send is Private By Design, meaning all of your files are protected, and we stand by our mission to handle your data privately and securely. Unlike other popular file storage services like Dropbox and Google Drive, Firefox Send does not have any paid option for users, which means you can not buy extra space. Firefox Send has launched on the web at send,firefox,com, which you can bookmark to avoid manually entering the address in your web browser every time you want to send files using the service. The service works with any browser. Besides its online portal, Mozilla is also launching a Send Android app in beta later this week, allowing users to share large files with their friends, colleagues, or anybody else using their mobile devices. If you want to take a peek under the hood, you can head over to the GitHub page of the new Firefox Send service. https://www.youtube.com/watch?v=eRHpEn2eHJA
  8. Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide. Why? Because the WinRAR software doesn't have an auto-update feature, which, unfortunately, leaves millions of its users vulnerable to cyber attacks. The critical vulnerability (CVE-2018-20250) that was patched late last month by the WinRAR team with the release of WinRAR version 5.70 beta 1 impacts all prior versions of WinRAR released over the past 19 years. For those unaware, the vulnerability is "Absolute Path Traversal" bug that resides in the old third-party library UNACEV2.DLL of WinRAR and allows attackers to extract a compressed executable file from the ACE archive to one of the Windows Startup folders, where the malicious file would automatically run on the next reboot. Therefore, to successfully exploit this vulnerability and take full control over the targeted computers, all an attacker needs to do is just convincing users into opening a maliciously-crafted compressed archive file using WinRAR. Immediately after the details and proof-of-concept (PoC) exploit code went public, malicious attackers started exploiting the vulnerability in a malspam email campaign to install malware on users' computers running the vulnerable version of the software. Now, security researchers from McAfee reported that they identified more than "100 unique exploits and counting" in the first week since the vulnerability was publicly disclosed, with most of the initial targets residing in the United States. One recent campaign spotted by the researchers piggybacks on a bootlegged copy of an Ariana Grande's hit album, which is currently being detected as malware by only 11 security products, whereas 53 antivirus products fail to alert their users at the time of writing. The malicious RAR file (Ariana_Grande-thank_u,_next(2019)_[320].rar) detected by McAfee extracts a list of harmless MP3 files to the victim's download folder but also drops a malicious EXE file to the startup folder, which has been designed to infect the targeted computer with malware. "When a vulnerable version of WinRAR is used to extract the contents of this archive, a malicious payload is created in the Startup folder behind the scenes," the researchers explain. "User Access Control (UAC) is bypassed, so no alert is displayed to the user. The next time the system restarts, the malware is run." Unfortunately, such campaigns are still ongoing, and the best way to protect yourself from such attacks is to update your system by installing the latest version of the WinRAR software as soon as possible and avoid opening files received from unknown sources.
  9. Get paid within seconds, if you don't mind a fee PayPal made it possible for businesses to get paid instantly, but what if you're an individual who just wants funds in a hurry? You might be set after today. The payment service has launched an Instant Transfer option in the US that shuttles money directly to your bank account, not just your debit card. It'll carry a 1 percent transaction fee and isn't worth it in most cases, but it could be vital if you need to pay a bill and would rather wait seconds for your funds instead of hours or days. Businesses will have the option in the weeks ahead. PayPal's Bill Ready told TechCrunch that Instant Transfer for bank accounts is coming to the US through JPMorgan Chase's access to The Clearing House, a platform major banks use for faster payment networks. International availability is in the works, but it would require a significantly different solution. The addition expands the potential audience to people who don't have debit cards. Ready also noted that it could be useful for gig economy workers, freelancers and others who receive irregular pay and may need flexibility in how they receive funds. While this limits the number of people who'll keep their funds in PayPal, it may convince them to use the service where it was too slow before.
  10. It would ban targeted ads and require an 'Eraser Button' for data Some politicians don't believe the Children's Online Privacy Protection Act does enough to protect kids in the modern era, and they're hoping to update it accordingly. Senators Ed Markey and Josh Hawley have introduced a bill that would amend COPPA with stricter controls on kids' data. It would ban ads targeted at kids, and would require an "Eraser Button" that would let kids and parents wipe data. The measure would still ban the collection of personal data for kids under 13 without their parents' consent, but it would also ban collecting data from the 13- to 15-year-old crowd without the user's permission. The bill would also ban the sale of connected toys and other child-oriented devices unless they can meet "robust" security standards, and would require that those devices have a privacy "dashboard" on their packaging that shows how they collect, use and secure data. Companies might also have a tougher time feigning ignorance of underage users: the amendment would change COPPA's requirement for "actual knowledge" of under-13 use to "constructive knowledge." If the bill becomes law, it would give companies a year to implement many of the changes, including a requirement to clearly disclose their data collection. The amendment could have significant ramifications for tech companies. App and website creators would have to create staggered data collection policies, and may need stricter age enforcement verification. You might also see fewer companies making child-focused connected devices, at least not without a better understanding of the risks involved.
  11. Insiders will be able to mirror their phone screens on their PCs thanks to the Your Phone update When Microsoft launched the "Your Phone" app last year, it gave users instant access to their mobile photos and text messages on Windows 10 PCs. And at its Surface launch last fall, it teased at something even better: mirroring and accessing your entire phone via your PC. With this week's Your Phone update, Windows Insiders will finally get to test the "phone screen" mirroring feature. So rather than reach for your phone to respond to a Snap, you'll be able to respond directly from your desktop. There are a few stipulations. You'll need a Windows 10 PC running Windows build 1803 or later and an Android phone running Android version 7.0 or newer. Microsoft specifically says to make sure you've updated to the latest Insider build, and your PC will need to support Bluetooth's low energy peripheral mode. Right now, if you have a Samsung Galaxy S8, S8+, S9, S9+ and a PC that meets the specs, the "phone screen" feature should work. Out of Microsoft's own Surface PCs, the only one that's compatible right now is the Surface Go. Microsoft promises it will update the list of compatible devices as it grows. This is an alternative to running mobile apps on a PC. One of Windows shortcomings as desktop OS has been its lack of touch-friendly apps. If Microsoft can get the "phone screen" feature right, it might make up for this shortcoming. Of course, Microsoft's competitors are working on similar initiatives. Chrome OS has supported Android apps for a few years now, and Apple is making it easier for developers to bring their iOS apps to the Mac.
  12. Disney, Comcast, NBCUniversal, CBS and others want to sell your data to advertisers By now, we're all used to targeted ads on social media. And whether you're comfortable with having your interests shared with advertisers or not, it looks like "addressable advertising" is coming to your smart TV too, sooner rather than later. Several top media companies -- including Disney, Comcast, NBCUniversal, CBS and Discovery -- announced they're teaming up with smart TV company Vizio to develop a new standard that might make commercials feel eerily personal. The companies are calling themselves a consortium, and they've dubbed this "Project OAR," or Open Addressable Ready. Once developed, the new, open standard will make it possible for all connected TV companies to sell targeted ads in scheduled and on-demand programs. While this will theoretically make ads more successful and therefore more valuable, it also means viewers' data will be shared with third parties. That raises the usual data privacy concerns. You may also remember Vizio as the company that got itself in hot water for tracking its customers' viewing histories and selling that data to advertisers -- all without its TV owners' knowledge or permission. The company settled those charges for $2.2 million with the Federal Trade Commission and New Jersey Attorney General in 2017. We can only hope that, after learning that lesson the hard way, Vizio will bake added consent and privacy safeguards into this new standard. According to Adweek, the consortium plans to have a prototype as early as this spring and a working product that can be used by any TV maker by later this year or early next. In the meantime, we're left wondering if targeted television ads will be able to avoid the pitfalls we've seen on social media.
  13. We bet this doesn't happen often. The Pagani Huarya has a starting price of over $2 million. Most owners wouldn't dare take their cars out in the rain, much less onto a frozen lake. The driver of this Huayra braved the elements, though, and for that we're proud. But things didn't turn out so well for him. The International Concourse of Elegance happened last weekend in the small town of St. Moritz, Switzerland, and a bunch of awesome Italian supercars came out to play. Towards the end of the weekend, temperatures started to rise and the snow started to melt, making traversing the parking area difficult. This Huayra owner quickly got stranded, and it wasn't long before a group of people came to the owner's assistance. After a few tries, the Huayra is eventually freed from its slushy trap, with no visible damage to the car. We suspect the same can't be said for the owner's pride, though. https://www.youtube.com/watch?v=YwMEzurqPt4
  14. Drones are increasingly used to survey battlefields and spot targets Humans will always make the final decision on whether armed robots can shoot, the US Department of Defense has said. The statement comes as plans emerge for gun platforms that can choose their own targets on the battlefield. The plans seek to upgrade existing aiming systems, using developments in machine intelligence. The US said rules governing armed robots still stood and humans would retain the power to veto their actions. Engage targets The defence department's plans seek to upgrade the current Advanced Targeting and Lethality Automated System (Atlas) used on ground combat vehicles to help human gunners aim. The military is seeking commercial partners to help develop aiming systems to "acquire, identify, and engage targets at least three times faster than the current manual process". And some commentators feared this would mean systems that could choose their own targets and make an autonomous decision to fire. The US Army then updated its proposal, to emphasise the key role of humans in the aiming process. Human involvement It said it remained committed to the rules governing human-robot interaction, known as directive 3000.09, which require a human finger on every trigger. The US Army also said it would issue a series of "talking points" around human-robot interaction to be debated on 12 March, when industry is invited to an open day to explore how Atlas can be updated. The US Army was not putting robots in a position to kill anyone, an official told military news site Defense One. Prof Michael Horowitz, a political scientist at the University of Pennsylvania and a senior adjunct fellow at the Center for New American Security, told Defense One: "It is critical that any revisions to the Atlas program... clarify the degree of autonomy and the level of human involvement in the use of force."
  15. Wireless spectrum is the name for the invisible electromagnetic bands that allow wireless devices to talk to each other What's happening? Starting at 10 a.m. on Tuesday, Ottawa is auctioning off wireless spectrum in the 600 megahertz range to a dozen companies that will bid on the rights to use airwaves for the next 20 years. The bidders are major wireless firms like Bell, Rogers and Telus, along with nine other smaller companies, all of which are listed on Industry Canada's website. One name noticeably absent from the list is Montreal-based Cogeco Inc., which says it won't be in the running but maintains it is still interested in expanding its wireless service. What is spectrum? Spectrum is the term used to describe electromagnetic waves that travel within a certain wavelength. Spectrum is the invisible signal that allows wireless service providers to transmit data across long distances to cellphones and other internet-connected devices. AM and FM radio travels over a certain part of the wireless spectrum. So do television signals. The band up for grabs on Tuesday is in the 600 megahertz range. Why are companies bidding on it? A quality wireless network runs on a number of different bands, so your device can always get a signal if one of the spectrum bands is temporarily unavailable where you are — in a remote rural area, or several metres below the ground in a downtown parking garage, for example. A reliable network has a good mix of low and high megahertz, because, broadly speaking, the lower the number, the better it is at travelling over long distances and into hard-to-reach places. The higher the number, the better it is at moving large amounts of data. Relatively low-frequency spectrum in the 600 megahertz band is useful for filling in existing network gaps. With more and more internet-connected devices, networks need more and more spectrum to keep that data flowing, no matter where you are. How does the auction work? Starting at 10 a.m. on Tuesday, companies involved in the auction will bid for the rights to use seven blocks of spectrum, in 16 different areas across the country — 112 different blocks in total. Bids will be anonymous, and work on what's called a "combinatorial clock" format. You can read more about the complicated rules here but the gist is that it makes sure winning bidders pay more than the second-place bidders would have paid, but nothing beyond that. It also makes sure companies get multiple blocks of spectrum to ensure they have a big enough network. Similar to previous ones, the auction has been set up, as best as possible, to ensure that incumbents don't gobble up all the spectrum. In this case, three out of the seven spectrum blocks up for grabs in each market have been set aside for new players — meaning Bell, Rogers and Telus can't buy them. That's done to encourage other companies to offer services to compete with them. The rules also stipulate that those newcomers can't turn around and sell their spectrum to the Big Three, at least for the first five years. There are minimum bids in every block up for grabs, too. The minimum bid for a block to service Nunavut and Yukon, for example, is $48,000. But a block of that same spectrum in southern Ontario will cost at least $85,302,000 — because a winning bidder could use that spectrum to sell services to so many more people, thus recouping their investment. When will we know who won? Probably not for a while. To avoid gaming the system — having companies put in bids they don't want, just to drive up the price for a rival — Ottawa is going to stay completely silent about how the process is going until five days after the bidding has ended. Analyst Vince Valentini at TD Bank said in a research note last month he expects the process could take a month or two. In keeping with the slow pace, he also doesn't expect feverish bidding, as some of the big companies will likely be saving their money for higher-band spectrum that's coming down the line. So, why should I care? Well, your wireless service is likely to improve, once bidders start deploying their newfangled spectrum. That means if you're already a wireless customer, you should expect fewer coverage dead zones and dropped calls, even as companies roll out even faster 5G networks. And theoretically, it could give you more options of companies to choose from. A similar auction in 2008 led to the birth of companies like Wind, Public Mobile and Mobilicity. But don't expect your cellphone bill to come down — at least in the short term. Analysts say telecom companies are likely to spend at least $2 billion on this auction, and an outlay like that isn't generally what prompts them to turn around and cut their prices. "It takes a while for this spectrum to be used," says Laura Tribe, executive director of consumer-focused telecom watchdog OpenMedia, but says prices will likely go up before long. Tribe cites recent stories of incumbent players raising their prices on big-data plans, which they launched in late 2017. Companies justified those moves when they were reported because they said they were investing in and updating their infrastructure to give customers better service. "This is a really clear example of what that looks like," Tribe says. She says the auction could be good news for consumers if it manages to get the spectrum in the hands of new companies that can truly shake up the industry. But TD's Vince Valentini says he doesn't expect any new names to step up in a big way. A 2014 auction in which companies spent an average of $2.32 per megahertz pop — an industry metric referring to the amount of bandwidth passing one person in the coverage area in a spectrum licence — raised more than $5 billion. The next year, in 2015, an auction of so-called AWS-3 spectrum, in which Rogers didn't even buy, raised $2.1 billion, or an average of $1.49 per megahertz pop. Valentini doesn't expect the per person price tag for this batch to go up. "We would be shocked and disappointed if anyone coveted this 600 spectrum to the point of paying $3 or more per megahertz pop," he said. "And we see very low odds of new entrants trying to disrupt the bidding outside of their current wireless footprints."