
The smaller Fairphone 6 introduces swappable accessories
Fairphone has announced its latest repairable smartphone, nearly two years after introducing the last upgrade. The new Fairphone 6 is smaller and 9 percent lighter than its predecessor, but it includes a larger 4,415mAh battery — easily replaceable by removing just seven screws — that will power the phone for up to 53 hours on a full charge. It's also more modular than previous versions, with new accessories like a card holder and finger loop that can be attached to the back of the phone.
The Fairphone 6 is available now through the company's online store and other European retailers for €599 (around $696). There are black, green, and white color options. But as with previous versions dating back to the Fairphone 3, the new model will only be available in the US through Murena, and delivery is expected sometime in August. Instead of running standard Android, the Murena version of the Fairphone 6 will feature a privacy-focused and de-Googled version of Android that the company calls /e/OS. It's available for preorder now for $899.
The Fairphone 6 has a Snapdragon 7s Gen 3 mobile processor, 8GB of RAM, and 512GB of storage that's expandable up to 2TB using an SDXC card. It also features a 6.31-inch LTPO OLED display that's slightly smaller than the Fairphone 5's 6.46-inch screen, but with a refresh rate boosted from 90Hz to 120Hz.
On the back, you'll find a 50MP main camera and a 13MP ultrawide camera, while the front has a 32MP hole-punch camera for selfies and video calls. That's a significant step down from the Fairphone 5, which used 50MP sensors on all three of its cameras.
The Fairphone 6's physical design is similar to the previous model, although the lenses on the back are no longer located on a small camera bump and instead sit directly on the back panel. That panel is more modular now, allowing the lower section to be removed using just two screws and replaced with alternatives that add more functionality, like a wallet for holding cards or a finger loop for more securely holding the phone with one hand. The idea is similar to the swappable accessories Nothing offers for its CMF Phone 1 and Phone Pro 2, but how useful it will actually be depends on how many accessories Fairphone makes available.
Repairability is still a priority for Fairphone, and its new phone carries forward the same modular design of past versions. The modular aspect lets you access and swap 12 different parts — including the screen, battery, and USB port — using just a single standard screwdriver instead of specialized tools.
To further extend the Fairphone 6's lifespan, the company includes a five-year warranty and promises eight years of software support through 2033. But the downside to not having everything inside the phone being glued in place and sealed tight is that the Fairphone 6 still has a limited IP55 rating for dust and water resistance. It can get splashed or even blasted with a jet of water, but it won't survive an accidental submersion.
Aside from performance improvements and the new modular accessories, Fairphone seems to be staying the course with its latest smartphone, but it is introducing one additional new feature on the software side: Fairphone Moments. Activated through a physical switch on the phone's side, it will let you 'toggle between a full-featured smartphone and a minimalist experience.'
We don't know exactly what Fairphone Moments will be minimizing, but since the company describes it as being 'a mindful way to engage with technology, putting owners in control, not their notifications,' it sounds like an alternate mode that reduces distractions so you can focus on specific tasks.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Bloomberg
26 minutes ago
- Bloomberg
Klarna Founder's VC Firm Pledges €300 Million Investment in AI
Swedish impact investor Norrsken VC has pledged to invest €300 million ($348 million) in artificial intelligence startups that aim to help solve some of the climate's most pressing needs. The venture capital firm, founded by Klarna co-founder Niklas Adalberth, plans to invest in AI companies alongside its early-stage funds Norrsken Accelerator and Norrsken Launcher, according to a statement on Wednesday.
Yahoo
31 minutes ago
- Yahoo
Every AST SpaceMobile Investor Should Keep an Eye on This Number
AST SpaceMobile plans on building a space-based broadband cellular network. Investors should monitor the company's progress toward deploying satellites. Investing in AST involves notable risks since it's not generating substantial revenue. 10 stocks we like better than AST SpaceMobile › There's no doubt that investors often flock to the numbers at the top and the bottom of income statements when investigating companies. But it's often critical for investors to monitor other figures as well in order to gain insight. Take, for example, AST SpaceMobile (NASDAQ: ASTS), which is working to build a space-based broadband cellular network. In fact, investors would be well advised to pay close attention to a number not even found in the company's financial statements. Striving to provide global customers with unique broadband service, AST SpaceMobile is developing what it calls the "first and only space-based cellular broadband network." In order to develop this network, management projects it will deploy more than 60 satellites in 2025 and 2026 -- a feat that will provide continuous coverage to the company's key markets: the United States, Europe, and Japan, to name a few. Since AST SpaceMobile's success depends on developing this constellation of satellites, investors should be acutely focused on commentary from the company confirming that it's on pace to achieve this deployment. Another figure that investors can gauge for insight to the company's progress is the rate at which it's manufacturing satellites. Management forecasts achieving a production rate of six satellites monthly in the fourth quarter of 2025. Should the company fail to achieve this cadence, it may portend a failure to achieve the target of deploying 60 satellites by the end of 2026. Because it's still the early innings for AST SpaceMobile's development, investors won't gain as much insight into the company's operations combing through the income statement in the way they would for a more well-established company. Therefore, space investors will want to consult other metrics such as the number of satellites deployed and the rate at which satellites are manufactured. As a young company that's not generating substantial and consistent revenue, AST SpaceMobile should only attract investors who aren't risk averse. For those comfortable with the risks, though, AST SpaceMobile is certainly worth watching closely. Before you buy stock in AST SpaceMobile, consider this: The Motley Fool Stock Advisor analyst team just identified what they believe are the for investors to buy now… and AST SpaceMobile wasn't one of them. The 10 stocks that made the cut could produce monster returns in the coming years. Consider when Netflix made this list on December 17, 2004... if you invested $1,000 at the time of our recommendation, you'd have $689,813!* Or when Nvidia made this list on April 15, 2005... if you invested $1,000 at the time of our recommendation, you'd have $906,556!* Now, it's worth noting Stock Advisor's total average return is 809% — a market-crushing outperformance compared to 175% for the S&P 500. Don't miss out on the latest top 10 list, available when you join . See the 10 stocks » *Stock Advisor returns as of June 23, 2025 Scott Levine has no position in any of the stocks mentioned. The Motley Fool has no position in any of the stocks mentioned. The Motley Fool has a disclosure policy. Every AST SpaceMobile Investor Should Keep an Eye on This Number was originally published by The Motley Fool Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Forbes
an hour ago
- Forbes
Browser-Based SaaS: The New Face Of Shadow IT
Andrius Buinovskis is Head of Product at NordLayer, a toggle-ready network security platform for business. As more applications migrate to the web, businesses are becoming increasingly reliant on the browser. While a browser-first approach offers various benefits, it also introduces additional risks. The growth of shadow IT and shadow transition of data are key concerns cybersecurity leaders should consider when navigating the shift to a web-based work environment. Popular desktop software is moving to the web, and enterprises are following suit. According to research, most employees can complete 80% of their work tasks using a browser. Browser-based applications boost productivity and enhance team collaboration by delivering a smooth, user-friendly experience. Moreover, they're easier and less expensive to maintain, adding to their appeal. Considering the benefits of shifting to a browser-based work environment and its eager adoption, it seems the future is web-based. However, emerging trends come with new (or rather old but revolutionized) risks—the increasing use of web-based software-as-a-service (SaaS) applications is expanding the scope of shadow IT and shadow transition of data. The Hidden Dangers Of Web-Based Applications With the rise of web-based applications, shadow IT has turned into a software zoo. Before the shift toward a browser-first approach, the primary concerns associated with shadow IT were unmanaged devices and unauthorized desktop software. However, these risks were more limited—the bring-your-own-device (BYOD) phenomenon wasn't as widespread, desktop software needed to be installed, and security admins would eventually discover unauthorized applications during security audits. Now, CISOs are faced with a new, stealthier threat. Employees can instantly start using any web-based SaaS application by simply clicking on a link in the browser. Not all consumer-grade platforms are safe. Many do not have sufficient security controls, increasing the risk of experiencing a cybersecurity incident, such as exposing sensitive corporate data or employee log-in credentials. They lack strong user authentication while additional integrations create unauthorized data pipelines to third-party services. Also, they do not protect users from accidentally making confidential information visible to the public via search engines or large language models (LLMs). Moreover, because they prioritize performance over security, they rarely meet regulatory requirements, opening the door to potential compliance violations. As a result of the lack of observability security admins have into employees' use of unauthorized web-based applications, data movement can easily go undetected. Users can copy sensitive information, documents or files and transfer them to unauthorized applications. Because these platforms can be accessed from anywhere with just a web browser, are usually connected to other applications and often come equipped with copy-paste or drag-and-drop functionalities, unintentionally leaking information has become almost inevitable. These information leaks increase the scope of information existing outside of security admins' oversight (shadow data), which can result in a devastating cybersecurity incident. According to a report by IBM, one in three data breaches in 2024 involved the use of shadow data. How To Prevent Browser-Based Cybersecurity Incidents Web-based applications can create a significant security blind spot. Although securing the browser can be challenging, the high risk of experiencing a cybersecurity incident requires that no security gaps are left unattended. Here are some key areas businesses need to focus on to ensure they're prepared to combat browser-based attacks: High observability and the ability to enforce security policies are the main tools to help protect businesses against web-based threats. Traditional browsers do not have built-in security tools. As a result, businesses that have embraced a browser-first approach should consider switching to an enterprise browser, allowing security teams to observe employee activity and enforce security policies across the company. Stolen employee login credentials can lead to a data breach, particularly when employees reuse their organizational network passwords to access unauthorized web-based SaaS applications. Enforcing effective password management policies, such as always using different, random and complex passwords, helps to reduce the risk of cybercriminals infiltrating the company's network. Employees are the first line of defense against browser-based attacks. Ensuring they know the dangers of using unauthorized web-based SaaS applications and how unsafe the majority of these platforms are can help dissuade users from engaging with them, reducing the overall scope of shadow IT. In Conclusion Embracing web-based SaaS applications can be transformative for productivity and collaboration, but without robust security measures, a browser-first approach can ultimately do more harm than good. Considering the rapid rate at which organizations and employees embrace the browser, the shift to a web-based environment is inevitable. By prioritizing a comprehensive cybersecurity strategy, you can ensure you're safeguarded against browser-based incidents. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?