Connect with us

Tech

How Deepfakes and Injection Attacks Are Breaking Identity Verification

Published

on

Person looking into a mirror and not seeing themselves reflected

By Ricardo Amper, Founder & CEO, Incode

Deepfakes are evolving and are no longer confined to misinformation campaigns or viral media manipulation. Most security teams already understand the deepfake problem; however, the more urgent shift is how synthetic media is being operationalized.

This fraud vector is being leveraged inside the identity moments that power the internet and economy – such as customer onboarding at a bank, driver onboarding for gig and delivery platforms, marketplace seller verification, account recovery, remote hiring, partner access, and privileged access workflows.

As more work and business is done remotely, identity has become a primary control point – and a primary target. Bad actors don’t only want to fool a selfie check; they want to impersonate a real person, establish durable access, and reuse that foothold across consumer and enterprise environments.

Advertisement

Cybersecurity and fraud teams are now dealing with a convergence of tactics that all aim at the same decision – the moment a system concludes “this is a real person”:

  • High-fidelity synthetic faces and voices that can pass quick checks
  • Replayed real footage from stolen or harvested sessions
  • Automation that probes verification flows at scale
  • Injection attacks that compromise the capture pipeline and substitute the input stream upstream

This is why “deepfake detection” alone is no longer enough. Enterprises need full-session validation: including perception, device integrity, and behavioral signals… all in a single, real-time control.

That is the model behind Incode Deepsight: an approach built to validate identity sessions end-to-end, not just evaluate the media in isolation.

The right question is not only “Does this face look real?” It is “Can we trust this entire session end-to-end?”

Deepfakes and injection are enterprise security issues

In enterprise systems, a successful bypass is not a reputation event; it’s an access event. When verification accepts a manipulated or compromised session as real, attackers can:

Advertisement
  • Create fraudulent accounts using synthetic identities
  • Take over existing user accounts
  • Bypass HR verification in remote hiring
  • Gain unauthorized access to sensitive internal systems

Unlike social media deception, these attacks can enable persistent access inside trusted environments. The downstream impact is durable: account persistence, privilege-escalation pathways, and lateral movement opportunities that start with a single false verification decision.

An independent study from Purdue University evaluated leading biometric vendors under advanced deepfake and presentation attack scenarios.

See how Incode’s DeepSight performance ranked across real-world attack simulations.

Read the Study

Where identity checks fail: assuming the sensor is trustworthy

Most identity checks are built around two signals: facial similarity and “liveness.” Both are useful,  and both can be undermined if the system assumes the input stream is authentic.

Attackers break that assumption in two complementary ways.

Advertisement

First, they mimic real media. Deepfakes and voice clones are improving under real operating conditions – short clips, mobile capture, compression, and imperfect lighting. A workflow that depends on a narrow visual surface area is increasingly exposed to false acceptance.

Second, they bypass the sensor entirely. Injection attacks substitute the input stream before it reaches analysis. Instead of presenting a face to a camera, attackers can:

  • Use virtual camera software to feed synthetic or pre-recorded video
  • Run verification sessions inside emulators designed to mimic legitimate mobile devices
  • Operate from rooted or jailbroken devices that bypass integrity checks
  • Substitute live capture with manipulated streams upstream

In these scenarios, the media can look perfect because it never had to survive a real capture path. That is why perception-only defenses (even strong ones) are necessary but not sufficient.

What the Purdue Political Deepfakes Incident Database benchmark shows

One practical problem for deepfake defense is generalization: detectors that test well in controlled settings often degrade in “in-the-wild” conditions.

Researchers at Purdue University evaluated deepfake detection systems using their real-world benchmark based on the Political Deepfakes Incident Database (PDID).

Advertisement

PDID contains real incident media distributed on platforms such as X, YouTube, TikTok, and Instagram, meaning the inputs are compressed, re-encoded, and post-processed in the same ways defenders often see in production.

Key factors include:

  • Heavy compression and re-encoding
  • Sub-720p resolution
  • Short, mobile-first clips
  • Heterogeneous generation pipelines

Detectors were evaluated end-to-end using metrics such as accuracy, AUC, and false-acceptance rate (FAR). In identity workflows, FAR is often the more consequential metric, because even a small false-acceptance rate can allow persistent unauthorized access.

Purdue’s results also highlight a practical reality for defenders: performance varies dramatically across detectors once inputs look like production.

Among the commercial systems evaluated in Purdue’s PDID benchmark, Incode’s Deepsight delivered the strongest results when the task is purely visual deepfake detection – evaluating video content itself under real incident conditions.

Advertisement

But that is only the first layer of the problem.

It’s important to be precise: PDID measures robustness of media detection on real incident content. It does not model injection, device compromise, or full-session attacks.

In real identity workflows, attackers do not choose one technique at a time; they stack them. A high-quality deepfake can be replayed. A replay can be injected. An injected stream can be automated at scale.

The best media detectors still can be bypassed if the capture path is untrusted. That’s why Deepsight goes even deeper than asking “Is this video a deepfake?”

Advertisement

Deepsight closes that gap by validating the full session across three layers: perception, integrity, and behavior, so that the system can stop attacks whether they arrive as a convincing deepfake, a replay, or an injected stream.

Manual review doesn’t close the gap

Human review can reduce some classes of fraud, but it is not a scalable security control against synthetic media.

Even trained reviewers struggle to determine real from fake as generative models improve.

Today’s injection attacks invalidate the premise and undermine human judgment entirely: a session can appear legitimate while the input stream is substituted upstream. Even consensus reviews among several experts cannot establish that the capture path was authentic.

Advertisement

The security model that holds up: trust the session, not just the pixels.

If attackers can win either by improving the media or by bypassing the sensor, defenses have to validate the session across multiple layers in real time:

  • Perception: Is the media itself manipulated?
  • Integrity: Is the device, camera, and session authentic?
  • Behavior: Does the interaction reflect a real human and a normal verification flow?

This model creates resilience. If a high-quality deepfake evades perception, integrity and behavioral signals can still prevent a successful bypass. If media is injected, integrity checks can fail the session regardless of how realistic the pixels look.

How Incode Deepsight blocks deepfakes and injection attacks in real time

Attackers are scaling. They can iterate against verification flows quickly, probe edge cases, and operationalize what works. Deepfakes raise the baseline risk of false acceptance, injection removes the camera as a reliable sensor and automation increases the volume of attempts.

Enterprises that treat identity verification as a one-time check rather than a real-time security process will struggle to keep pace.

Advertisement

Incode Deepsight is designed around a simple premise: if identity workflows are being attacked at both the media layer and session layer, defenses must validate the entire verification session end-to-end.

During live verification, Deepsight combines three layers in real time:

  • Perception analysis: Multi-modal AI that evaluates video, motion, and depth signals across multiple frames to detect synthetic media and physical spoofs. Deepsight also protects ID capture by detecting AI-generated identity documents.
  • Integrity validation: Camera and device authenticity checks to identify and block injected media sources, such as virtual cameras, emulators, and compromised environments.
  • Behavioral risk signals: Detection of automation indicators and bot-like interaction patterns that frequently accompany scaled attacks.

This layered model is what makes Deepsight resilient in practice. If a high-quality deepfake evades perception, integrity and behavioral signals can still prevent a successful bypass. If media is injected, integrity checks can fail the session regardless of how realistic the pixels look.

The goal is straightforward: determine whether the entire verification session can be trusted – not only whether a face looks real, but whether a real human is present on a trusted device in a live, untampered interaction.

Closing the gap between detection and deployment

Defending identity workflows now requires controls that assume adversarial AI and untrusted capture environments.

Advertisement

Deepfake defense must evolve from spotting manipulated pixels to validating the authenticity of entire verification sessions. Layered defenses across media authenticity, device integrity, and behavioral signals are the most reliable way to reduce false acceptance without adding unnecessary friction for legitimate users.

Learn how Deepsight blocks deepfakes and injection attacks in real time. incode.com/deepsight

Sponsored and written by Incode.

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Iran Is Still Flying These American-Built Fighter Jets Decades Later

Published

on





Ongoing fighting in Iran is giving the world a look at what the country’s current military hardware looks like. As one would expect, there is a fair amount of Russian and Soviet-era technology, including MiG and Sukhoi fighter jets like the MiG-29 and Sukhoi Su-30. Additionally, Iran constructs most of its own ballistic missiles and drones. 

For the people who are just taking a look at what Iran is flying, it may seem odd that there are some American-made planes in Iran’s inventory, as Iran and the U.S. have been politically opposed for decades. 

Aviation enthusiasts especially may notice that F-14 Tomcats, F-5 Tigers, and F-4 Phantom IIs have made an occasional appearance in both conversations online and in footage from the ongoing war. The F-4 Phantom II saw extensive service in the Vietnam War. The F-14, of “Top Gun” fame, of course went out of service with the United States in 2006 after having served continually since the closing years of the Vietnam War in 1973. 

Advertisement

How are the jets still flying?

SlashGear has reported on how Iran got a hold of Tomcats and its extensive operational history during the Iran-Iraq War. 

Now, several decades after the war and more than 50 years after the Tomcat first entered service, Iran still fields the plane. Concrete information about how the planes are maintained and whether or not most of them are even airworthy is hard to come by. As late as 2007, Iran was able to still buy surplus F-14 parts until American lawmakers banned the sale of technology they deemed sensitive. The United States even went through great effort to destroy remaining parts. Since then, it has relied on smuggling and the black market. Plus, given the high-profile nature of the plane itself, parked Tomcats and Phantoms have a high likelihood of being targeted or destroyed during Israeli and American sorties. 

Advertisement

However, Global Security, a defense-related think tank, reported that Iran had as many as 43 Tomcats and 60 Phantom IIs in its inventory as of 2025. It is unknown how many have been destroyed since.



Advertisement

Source link

Continue Reading

Tech

Daily Deal: Adobe Lightroom 1-Year Subscription

Published

on

from the good-deals-on-cool-stuff dept

Adobe Lightroom is a cloud-based photo editing and organizing tool designed for photographers of all levels. With an intuitive interface and advanced features, it allows you to create stunning images, manage your photo library, and work seamlessly across desktop, mobile, and web. Lightroom Classic provides robust tools for handling large volumes of images, offering precise control over photo organization and editing. It includes powerful modules like Develop and Map, making it ideal for desktop users who need in-depth editing capabilities. Enhance your photos effortlessly with easy-to-use editing tools. Adjust exposure, contrast, and color balance, crop and straighten images, and apply presets and filters with one click to achieve professional-quality results. With 1TB of cloud storage and automatic synchronization, Lightroom ensures your entire photo library is backed up and accessible from any device. Edit on the go and never lose your work—your photos are always at your fingertips. This one year subscription is on sale for $119.88.

Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.

Filed Under: daily deal

Source link

Advertisement
Continue Reading

Tech

Starlink’s next-gen satellite network could provide 150 Mbps speeds by end of next year

Published

on

Starlink is getting ready to launch its second generation of satellites, and it’s expected to match the speeds of a traditional terrestrial network. During a keynote at Mobile World Congress, Starlink execs detailed the roadmap for the company’s upgrade towards the next generation of satellites called V2.

“The goal of Starlink Mobile … is to provide a terrestrial-like connectivity when you’re connected to the satellite system,” Michael Nicolls, SpaceX’s senior vice president of Starlink engineering, said during the MWC keynote. “In the right conditions, it should look and feel like you’re connected to a high-performing 5G terrestrial network.”

Nicolls detailed that the V2 satellite constellation could offer download speeds up to 150 Mbps in ideal conditions, comparing it to a broadband experience. According to Starlink, next-gen satellites will offer 100 times the data density of its predecessors, which should help users with faster streaming and browsing as well as more reliable voice calls. Notably, Nicolls added that the V2 satellite constellation would offer better coverage to Earth’s polar regions, which are known to have unreliable coverage with traditional networks.

Nicolls said that SpaceX is planning to send out more than 50 V2 satellites on each SpaceX launch starting in mid-2027, with a goal of building out a full constellation in six months. Outside its MWC presser, Starlink also announced a partnership with German telecommunications company Deutsche Telekom. The partnership would help Deutsche Telekom address internet coverage gaps in Europe using Starlink’s constellation, starting in 2028.

Advertisement

Source link

Continue Reading

Tech

Cynus Chess Robot: A Chess Board With A Robotic Arm

Published

on

Downward-facing camera and microphone in the arm. (Credit: Techmoan, YouTube)
Downward-facing camera and microphone in the arm. (Credit: Techmoan, YouTube)

There are many chess robots, most of which require the human player to move the opposing pieces themselves, or have a built-in mechanism that can slide the opposing pieces around to their new location. Ideally, such a chess robot would move the pieces just like how a human would, of course. That’s pretty much the promise behind the Manya Cynus chess robot, which [Matt] over at the Techmoan YouTube channel bought from the Kickstarter campaign.

Advertising itself as a ‘Portable AI Chess Robot’, the Manya Cynus chess robot comes in the form of a case that unfolds into a chess board and also contains the robotic arm that contains the guts of the operation. Powered by the open source Stockfish chess engine, it can play games against a human opponent at a few difficulty levels without requiring any online connectivity or a companion app. It moves its own pieces by picking up the metal-cored chess pieces with its arm, while its front display tries to display basic emotions with animated eyes. A 3-MP downward-facing camera is located on the head section, along with a microphone.

As for how well it works, [Matt] isn’t the best chess player, but he had a fair bit of fun with the machine. His major complaints circle around how unfinished the firmware still feels, with e.g., invalid moves basically ignored with only a barely visible warning popping up on the screen. In general, he’d rather classify it as an interesting development kit for a chess robot, which is where the BLE 5.1-based interface and a purported Python-based development environment provided by Manya seem to come into focus.

From the site, it’s not clear where this documentation and software can be found, and the chess robot appears to be fully sold out on the Kickstarter page. In addition to this, a promised companion app seems to have gone AWOL, too.

With no clear support or even availability, it would seem that this is less of a crowdfunding scam and more of a confusing product which may or may not become available again, yet which could perhaps provide inspiration to some DIY projects, as the basic principle seems sound enough. Or, keep it simple and use a gantry.

Advertisement

Source link

Advertisement
Continue Reading

Tech

MWC: All the News and New Gear at Mobile World Congress

Published

on

There’s no bigger event for mobile tech enthusiasts than the Mobile World Congress in Barcelona, Spain. While CES in January has seen fewer major mobile announcements over the years, MWC remains the go-to event for major breakthroughs in the mobile industry.

In 2026, the show will take place from March 2 to March 5 at Fira Barcelona Gran Via, once again bringing the biggest names in mobile together for one of the year’s most important tech events.

Source link

Advertisement
Continue Reading

Tech

US Military Shoots Down CBP Drone, Which Certainly Instills Confidence In Its Offshore Murder Program

Published

on

from the goons-with-tech-are-still-goons dept

Wow. Imagine if you could just make this shit up.

The U.S. military used a laser Thursday to shoot down a “seemingly threatening” drone flying near the U.S.-Mexico border. It turned out the drone belonged to Customs and Border Protection, lawmakers said.

It is to LOL. Not only did the military friendly fire a CBP drone into the dirt, it also caused a bit of disruption. The military is required to notify the FAA when it engages in any anti-drone “action” in US airspace.

So it did, which is how this came out. It would be great if it were an isolated incident, but apparently this is just the sort of thing we’re doing regularly in the El Paso area.

It was the second time in two weeks that a laser was fired in the area. The last time it was CBP that used the weapon and nothing was hit. That incident occurred near Fort Bliss and prompted the FAA to shut down air traffic at El Paso airport and the surrounding area. This time, the closure was smaller and commercial flights were not affected.

The Associated Press is being far too coy in this paragraph. First off, CBP did not coordinate with the FAA before firing the anti-drone laser, which resulted in a scramble to secure the airspace after the fact, leading to a shutdown that grounded flights and raised alarm.

Advertisement

The link in the paragraph doesn’t lead to the full story. Here’s what happened the last time the laser was fired at something that shouldn’t have been fired at:

The sudden closure of El Paso’s airspace Wednesday came sometime after U.S. Customs and Border Protection officials used an anti-drone laser that was provided by the military to shoot down objects that were later identified as party balloons, four people familiar with the matter said.

I can only hope the Defense Department’s downing of a CBP drone was the result of determining the CBP itself couldn’t be trusted with the tech. If this isn’t the case, there’s a non-zero chance the CBP will shoot down its own drone at some point in the near future. I mean, it really doesn’t look like anyone is learning anything from these experiences.

But here’s what we can learn: tech is fallible. And given this chain of events, one has every right to demand more answers on the US military’s drone strike program targeting alleged drug traffickers in international waters. Even if you choose to ignore the legal issues, the logistics issues should be enough to keep you up at night. I mean, we’re only seeing what the administration chooses to share with us. What’s happening out there that we’re not seeing on DoD X timelines?

If drone-detecting lasers are being used to (1) shoot down friendly drones and (2) FAIL to shoot down party balloons, why should we believe the drones themselves are a better option when it comes to neutralizing threats? In both cases, humans are making mistakes, but their mistakes trigger tech that’s capable of killing people. Fuck around enough and there’s a chance someone with a federal paycheck is going to down an airliner.

Advertisement

It’s not really a matter of “if.” It’s a matter of when. This administration cranked up the proverbial heat, encouraging a shoot-first, sort-through-the-wreckage-later approach to pretty much everything. For the love of all that is unholy, it has rebranded the Defense Department as the Department of War. It’s all hair triggers and under-trained personnel. A national tragedy awaits, willed into being by an administration that considers collateral damage little more than viral content.

Filed Under: cbp, defense department, drone strikes, dumbfuckery, el paso, national security

Source link

Advertisement
Continue Reading

Tech

Hands-on with the Xiaomi 17 Ultra: three upgrades I love and two things I wish it had

Published

on


The Xiaomi 17 Ultra boasts a refined design, an impressive camera with a 1-inch sensor and a variable telephoto zoom, plus a huge battery.

Source link

Continue Reading

Tech

macOS Tahoe 26.4 absent from third round of developer betas

Published

on

Apple’s developer beta program has reached the third round, with fresh builds of iOS 26.4, iPadOS 26.4, watchOS 26.4, tvOS 26.4, and visionOS 26.4 testable, but not macOS Tahoe 26.4.

Various Apple devices including a laptop, tablet, smartphone, smartwatch, and VR headset displayed together on a white background.
Apple’s hardware that works with the 26-generation operating systems – Image Credit: Apple

The third developer betas for iOS 26.4, iPadOS 26.4, watchOS 26.4, tvOS 26.4, and visionOS 26.4 arrive after the second, which appeared on February 23. The first round landed on February 16.
However, it’s not a clean sweep of builds, as there’s not a third developer beta for macOS Tahoe 26.4. It could still be introduced at a later point in the coming week.
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

Bytedance’s Upcoming Project Swan VR Headset Wants to Be the Computer Meta’s Isn’t Yet

Published

on

In the last few months, Meta has seemingly taken its foot off the gas when it comes to developing next-generation VR hardware and experiences. The Beijing-based Chinese competitor, ByteDance, the creator of TikTok, is going the other way — and it appears focused on expanding its work beyond just gaming.

The Pico Project Swan, announced at Mobile World Congress in Barcelona this week, is a lot of head hardware. Coming “later this year,” according to ByteDance, it doesn’t sound cheap. An onboard micro OLED display will have 40 pixels per degree of resolution density, which should be in line with what the Apple Vision Pro and Samsung Galaxy XR offer. The headset will have similar capabilities to create mixed-reality overlays of graphics in real-world settings using passthrough cameras.

The headset is also powered by its own dual-chip custom processors that ByteDance claims are twice as powerful as Qualcomm’s Snapdragon XR2 Gen 2 chip that’s on Meta’s Quest 3 and 3S headsets, and in a stepped-up version on Samsung Galaxy XR. While that may still lag behind Apple’s M5 chip on the Vision Pro, it’s a lot for a mixed reality headset.

Advertisement

As for the price of Project Swan and what software it’ll run, that’s still a mystery. Pico headsets already run Android apps and can connect to Windows PCs, but the landscape of VR/AR is changing rapidly.

Apple and Samsung’s headsets feel like prototypes for future computers that still don’t have enough unique software yet. Meta’s emphasis on smaller AR glasses to come mirrors planned moves by Google and Samsung, and Apple could be following suit.

Meanwhile, Valve’s gaming-focused Steam Frame headset, coming later this year, shows another interesting wrinkle in the mix. Valve is running Steam on smaller ARM chips, which could mean Steam OS running on other XR hardware after that. Running more types of software on smaller chipsets is exactly what VR headsets needed more of in the first place.

I’m curious about Project Swan, though. At the least, it shows that other companies are keeping the ball rolling on high-end headsets, even if Meta currently seems not to be. 

Advertisement

Source link

Continue Reading

Tech

Honor’s New Foldable Phone Is Forbidden Fruit Of The Most Frustrating Kind

Published

on





A few things remain consistent about Honor phones from year to year. They will be powerful, they will be very thin, they’ll have awesome cameras, and they won’t be coming to the Unites States. All of those look to be consistent this year as well. The Honor Magic V6, launched at MWC 2026, is another version of that same theme.

Lovely hardware and a long-lasting battery lead the charge for this phone to make it one you should definitely consider if you’re in the market for a new, book-style foldable. There are also a few common themes from last year, including extraordinary thinness, a camera island that has its own zip code, and a case with the same ring/stand for extra grip.

I’m a fan of Honor foldables, and I’m thankful for the chance to play with one, even though most of my fellow countrymen won’t get the same chance. It should be mentioned that this isn’t a full review (in the traditional sense) since the software on the phone is still not complete. As such, we can’t include camera samples or performance metrics. But I’ve been using the phone for two weeks, and these are my thoughts so far.

Advertisement

Hardware is still stunning.

The Honor Magic V5 sample I got last year was black and has a vegan leather backplate. It came along with a case that covered the back, along with a flap over the hinge that was fun to play with, fidget-toy style, and added a ring stand that flips out from around the camera island and makes the phone easier to hold when it’s open. I primarily used it when reading, or when I wanted to stand the phone up to watch something.

This year’s phone case has all those same features which is great. My review sample is the gold colorway, which looks really nice — much preferred over black. There’s also a red colorway with a marble pattern to it that looks stunning, though some reports indicate it feels weird to hold. I haven’t tried that one myself, but if you’re considering that version, you might want to try to find it at a store to try out before you order it.

Advertisement

Both screens are AMOLED LTPO 2.0 with the dynamic refresh rater of 1-120Hz. They’re both extremely bright, with the outside screen reaching 6,000 nits and the inner screen achieving 5,000 nits of brightness at their peaks. Speaking of the screens, the outside screen checks in at 6.52 inches while the inner screen is just shy of eight.

Advertisement

Where the hardware goes a little wild.

Foldable screens are already a little crazy, but Honor has really outdone itself with the hardware this time. Starting off with the fact that this phone has a 6,660 mAh silicon carbon battery which is as insane as it sounds. I can’t speak to actual longevity numbers because of the beta software, but I found this was easily a two-day phone without breaking a sweat. I’ll have to wait until the production software rolls in, but this bodes well.

The phone itself is just 4mm thick when opened (not including the camera bump, of course), and 8.57mm when closed, with is by the way about the same thickness as an iPhone 17 Pro Max. It’s also a couple of dozen grams lighter than Apple’s biggest handset.

The folding screen has a crease that is just as visible as any other foldable on the market (though Samsung showed off a remarkably flat folding screen at CES 2026). The hinge is rated for up to 500,000 folds, though full disclosure — I didn’t test that actual metric.

Advertisement

Water and dust protection king.

Where this phone really stands out is in its IP68 and IP69 water resistance ratings. This is a book-style foldable that is achieving water and dust resistance ratings that were first reached just over a year ago on a bar-style phone — the OnePlus 13. Since then, a number of other phones have reached those same levels of dust and water resistance, but not in a foldable.

The closest we’ve gotten so far is in the Pixel 10 Pro Fold that has an IP68 water resistance rating. The difference between the two, is that IP69 is resistant to heated water jets. You can put this foldable into a dishwasher. Just let that sink in — no pun intended.

Again, in the interest of disclosure I should point out that I did not actually test that capability. I like testing phones to their extremes, but even that is a little too far outside the lines for me. Also, I tested this phone during the winter, so there were no trips to the beach for me. That is something I would happily test once the mercury climbs higher in Chicago.

Advertisement

Apple ready, so to speak.

One thing Honor is happy to talk about is how well its phones work with the Apple ecosystem. I feel like a broken record here, but as far as an Apple ecosystem is concerned, I do not have any Apple devices outside of the iPhone 17, iPhone Air, iPhone 17 Pro, and a last-generation iPad mini, so my capabilities in testing these features were negligible.

I could, and did, test the ability to transfer files between an iPhone and the Honor Magic V6 and it worked…fine. This is achieved via Honor Connect, an app that allows you to transfer files by way of a QR code. The app needs to be installed on the receiving iDevice, so this is not the seamless transfer that you can get with Airdrop, nor even the Airdthe drop functionality that Google built into Pixels.

Other Honor apps will allow you to connect an Apple Watch, or extend your MacBook’s screen to the phone, and even transfer a file from the phone to the MacBook by tapping it. Honor is directly addressing the fact that Apple does not have a folding phone yet, which is a gap that some people may want to take advantage of. The real question is how seamless it’ll feel in practice.

Advertisement

So far, so good, to a point.

Overall, we’re hampered by the fact that we don’t have final software yet. We’ll be sure to update this article when more facts come to light. We don’t have camera samples, we don’t have battery tests, and we don’t have benchmarks. I can tell you that historically, Honor cameras are usually top notch, and Honor still makes my favorite portrait mode I’ve ever had on a phone.

The Snapdragon 8 Elite Gen 5, which resides in the Magic V6, is still the undisputed king of phone processors. At last year’s Snapdragon Summit, it handily beat the best processors by Apple and MediaTek. So, this phone is a beast in multiple ways.

Advertisement

We still don’t know pricing, nor general availability, except that it won’t come to the U.S. But we do know that this phone is excellent in multiple ways, and the U.S. phone market is poorer for not being able to experience it. When I went to CES 2026, the Magic V5 was my main phone because of its camera and battery life, and it did not disappoint. When IFA and CES roll around next year, the V6 will likely take its place.



Advertisement

Source link

Continue Reading

Trending

Copyright © 2025