Marc Andreessen says this is the key to becoming the next Apple
Some companies are already experimenting with devices that could one day challenge smartphones.
Sam Altman and Jony Ive are developing an AI-powered device, while Meta is focused on smart glasses.
The iPhone catapulted Apple onto the Mount Rushmore of tech, and the device's successor could do the same for someone else.
Smartphones as we know them will eventually feel "primitive," billionaire venture capitalist Marc Andreessen said in a new interview on the "TBPN" technology podcast that aired Friday. At some point, he said, everything becomes obsolete.
The big question: What comes after the smartphone?
"Whoever cracks the code on that will be the next Apple," Andreessen, cofounder of venture capital firm Andreessen Horowitz, said.
Creating a product that makes the smartphone obsolete will require a level of innovation that the world has yet to see, Andreessen said. It could take three years or two decades.
However, companies are already working to develop gadgets that don't require a screen.
OpenAI cofounder Sam Altman, for one, is developing an AI-powered device that isn't a smartphone or wearable. Altman has teamed up with the former Apple design chief Jony Ive, one of the key figures behind the iPhone, though they've kept much of the details under wraps, including its form factor.
Elsewhere, AI startups like Rabbit and Humane are experimenting with screenless devices that operate as a companion to your smartphone or use projections instead of a screen.
Meanwhile, Meta's smart glasses, fitted with cameras, a voice assistant, and speakers, are showing signs of consumer interest. However, CEO Mark Zuckerberg doesn't expect them to replace phones anytime soon.
"It's not like we're going to throw away our phones," Zuckerberg told The Verge in September, "but I think what's going to happen is that, slowly, we're just going to start doing more things with our glasses and leaving our phones in our pockets more."
Andreessen said the object that kicks off a new era of technology could be eye-based, voice-operated, or have some sort of environmental computing. (His VC firm Andreessen Horowitz did not immediately respond to a request for comment from Business Insider.)
Apple itself could be the one to lead the next revolution in tech. It likely has time to work on it, Andreessen said.
"I think it's highly likely that we'll have a phone for a very long time," he said.
Read the original article on Business Insider

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Tom's Guide
12 minutes ago
- Tom's Guide
I used a Meta Quest 3 for work so you don't have to — and there's one huge problem nobody talks about
If you're looking to jump on the VR bandwagon and explore all the ways you can work, game and watch shows in virtual reality, look no further than our list of the best VR headsets. Plus, you'll find more than just Meta Quest headsets on there. Making the most of my Meta Quest 3 has opened my eyes to the possibilities mixed reality (MR) presents — features that go well beyond punching, shooting or dancing your way through the best VR games. Thanks to the Quest 3's MR capabilities, I've cooked up a storm in the kitchen while streaming shows on Netflix, given my room a makeover by visualizing furniture and measurements in the Layout app, and even started learning to draw thanks to the Pencil app. More importantly, these have worked fairly flawlessly. So, why not put this VR headset to work? Meta strived to make its Meta Quest Pro the office machine replacement, and the Apple Vision Pro has also tried its hand at this. But, as you can guess, those ventures didn't catch on (and price wasn't the only major fault). However, thanks to Microsoft's Mixed Reality Link for Meta Quest 3 and Quest 3S, using these VR headsets as an extension to your PC has become significantly more accessible, affordable, and, yes, actually usable. Well, for the most part. It offers the huge benefit of being able to utilize up to three virtual monitors, which you can resize and place wherever you want in mixed reality. This can easily act as a handy, affordable replacement for the best monitors, there's still one issue that stops me from using my Meta Quest 3 for work — and it all has to do with its video passthrough. Since linking my Meta Quest headset to a Windows 11 PC, I've been boasting a three-monitor setup without actually having physical displays crowding my desk. The Mixed Reality Link feature has been a treat, even though it still has some wrinkles to iron out (namely, video calls not working properly and some minor audio connection issues). Get instant access to breaking news, the hottest reviews, great deals and helpful tips. Being able to add three virtual monitors anywhere in my field of view while wearing the VR headset makes for an incredibly versatile setup — one that all types of workers would appreciate. They can be stacked on top of one another, placed side by side, reshaped to be used vertically and even offer the massive, ultra-wide treatment. This adjustability is a boon, and moving and resizing these virtual screens is as simple as dragging and placing them via the Meta Quest 3's hand-tracking feature or Touch Plus controller. Sure, I may boast a 32-inch 4K monitor for my usual desk setup, but for scrolling through websites while watching a YouTube video or show on Netflix, all while playing games like Doom: The Dark Ages on Xbox Game Pass? That's a setup that's hard to beat — even if I have to wear a whole VR headset to make it happen. Now, here's the thing: despite its advantages, and still being able to see the real space around you through the Meta Quest 3's full-colour passthrough for mixed reality visuals, I'd find it hard to actually put this setup to good use while working. With the thousands of words I write each week as per my job here at Tom's Guide, a keyboard is easily my biggest asset. I need to be able to type with ease without any interruptions or irritations, and that makes it hard with a Meta Quest VR headset on my head. I've been impressed with the Quest 3S and Quest 3's full-color passthrough, which allows for an overall clear view of my immediate environment while using apps or watching shows. However, there's no way to get a detailed look at real-world objects — and that includes my keyboard. The Meta Quest 3's passthrough view is too grainy and struggles when lighting conditions aren't right for more precise motions. While that's fine for general tasks like picking up a glass, typing can be a struggle when you need to look down at keys every once in a while. I know, touch typists probably won't have a problem with this, but as someone who looks down at their keyboard sometimes to find the right flow or enter a shortcut, I can't for the life of me get a clear view of my keyboard when I've got my headset on. It leads to typos, stalling to find the right key and general discomfort every time I have to look down with a clunky headset on my head — it doesn't feel nearly as natural as it would without being in MR. Additionally, if there isn't enough light in the room, it's challenging to find anything via passthrough. It's too damn dark! Oh, and as another red flag, sipping on a hot cup of coffee with a VR headset on is not recommended — so says my now-stained shirt. This is all to say that wearing a full-blown VR headset for work and other productivity needs isn't ideal when there's a noticeably weighty device wrapped around your head with blurry video passthrough. However, I still believe this is an incredibly efficient way to work. And that's exactly what the best AR glasses today aim to offer. First off, they're far more subtle than a VR headset, but still offer the versatility of a virtual monitor setup, like the Viture Luma Pro's massive 152-inch virtual screen with a 1200p resolution. Our own Anthony Spadafora even tested this out by ditching his laptop for a mini PC and AR glasses, and it worked like a charm when working on the go. Plus, we've seen how AR glasses used with a laptop can beat the dreaded "tech neck." However, more importantly for me and my fellow typists who prefer to see their surroundings in clear detail, AR glasses still offer a real-world view of the environment, making it far easier to glance at my keyboard, pick up cups of coffee, and handle objects. Although it's still a niche market, working in mixed reality settings offers numerous benefits — some of which are also cost-saving. I'll still be using my Meta Quest 3 with the Mixed Reality Link feature to give my Windows PC an extra set of easily adjustable monitors, but I'll use it primarily for play rather than work. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button.


Forbes
14 minutes ago
- Forbes
Apple iPhone 17, iPhone 17 Pro Release Date: New Date Enters The Schedule
Updated Aug. 13 with further details for the full schedule of what's coming when. In less than four weeks, all will be revealed about the iPhone 17 series. That's because on Tuesday, Sept. 9, Apple will hold its keynote unveiling the new hardware, I believe. Now, a new date has been added to the mix. You can read the full schedule here but it's also laid out in detail below. Apple iPhone 17 Release Date: The New Entry In The Schedule Mark Gurman's Bloomberg Power On newsletter is always full of interesting nuggets. In the latest issue, he mentioned something that has so far been absent from release date schedules. Among all the talk of the keynote date, the onsale date and even the date for when the keynote date will be unveiled (all of which are below, with timings down to the minute), there has been scant talk of the release for iOS 26. More than in recent years, the new software has captured the public's imagination this year. Although iOS 26 will be pre-installed on the iPhone 17 series, it will also work on iPhones all the way back to the iPhone 11. So, when will it go on general release? Gurman commented that the new software is 'pretty smooth', and has since said on X that the latest, sixth developer beta is 'ridiculously snappy'. So much so that 'it's clear that we're pretty close to the release of the final, public versions,' he said. I believe it's possible to pin the release down further than 'the first half of September,' as Gurman comments. Last year, iOS 18 went on general release on Monday, Sept. 16, exactly a week after the keynote and four days before the Friday, Sept. 20 onsale date of the iPhone 16 series. I believe this year's general release for iOS 26 will follow a near-identical schedule, and will be available from around 10 a.m. Pacific on either Monday, Sept. 15 or just possibly Tuesday, Sept. 16. I favor the Monday because excitement in the new software is so high Apple will want it out as soon as it can, plus, it seems in good shape already. iPhone 17 Release Date: The Full Schedule As for the rest of the schedule, here are the most important dates. I'll also update this post as soon as any are confirmed officially. First up is the announcement of the keynote. This is likely to be around 8 a.m Pacific, on Tuesday, Aug. 26. This is when invites are sent out by email to selected members of the press and special guests. The exact time is subject to an hour or so's leeway, and it's even possible that the invites will go out a day before. Check back here for details as soon as it's gone live. The next big piece of the puzzle will be the keynote itself. The time will be 10 a.m. Pacific, as this is always Apple's chosen time for Cupertino unveilings. I believe it will be on Tuesday, Sept. 9 and the possibility of a date change now seems vanishingly small. Pre-orders open: 8 a.m. Pacific, Friday Sept. 12. Reviews appear: Tuesday, Sept. 16 or Wednesday, Sept. 17, likely 6 a.m. Pacific. Onsale date: Friday, Sept. 19 at 7.a.m. wherever you are.
Yahoo
20 minutes ago
- Yahoo
How we found TeaOnHer spilling users' driver's licenses in less than 10 minutes
For an app all about spilling the beans on who you're allegedly dating, it's ironic that TeaOnHer was spilling the personal information of thousands of its users to the open web. TeaOnHer was designed for men to share photos and information about women they claim to have been dating. But much like Tea, the dating-gossip app for women it was trying to replicate, TeaOnHer had gaping holes in its security that exposed its users' personal information, including photos of their driver's licenses and other government-issued identity documents, as TechCrunch reported last week. These gated community-like apps were created ostensibly to let users share information about their relationships under the guise of personal safety. However, shoddy coding and security flaws highlight the ongoing privacy risks inherent in requiring users to submit sensitive information to use apps and websites. Such risks are only going to worsen; popular apps and web services are already having to comply with age verification laws that require people to submit their identity documents before they can be granted access to adult-themed content, despite the privacy and security risks associated with storing databases of people's personal information. When TechCrunch published our story last week, we did not publish specific details of the bugs we discovered in TeaOnHer, erring on the side of caution so as to not help bad actors exploit the bug. Instead, we decided to publish a limited disclosure, because of the app's rising popularity and the immediate risks that users faced when using the app. As of the time of disclosure, TeaOnHer was #2 in the free app charts on the Apple App Store, a position still held by the app today. The flaws we found appear to be resolved. TechCrunch can now share how we were able to find users' driver's licenses within 10 minutes of being sent a link to the app in the App Store, thanks to easy to find flaws in the app's public-facing backend system, or API. The app's developer, Xavier Lampkin, did not respond to multiple requests for comment after we submitted details of the security flaws, nor would Lampkin commit to notifying affected TeaOnHer users or state regulators of the security lapse. We also asked Lampkin if any security reviews were carried out before the TeaOnHer app was launched, but we got no reply. (We have more on disclosure later on.) Alright, start the clock. TeaOnHer exposed 'admin panel' credentials Before we even downloaded the app, we first wanted to find out where TeaOnHer was hosted on the internet by looking at its public-facing infrastructure, such as its website and anything hosted on its domain. This is usually a good place to start as it helps understand what other services the domain is connected to on the internet. To find the domain name, we first looked (by chance) at the app's listing on the Apple App Store to find the app's website. This can usually be found in its privacy policy, which apps must include before Apple will list them. (The app listing also claims the developer 'does not collect any data from this app,' which is demonstrably false, so take that as you will.) TeaOnHer's privacy policy was in the form of a published Google Doc, which included an email address with a domain, but no website. The website wasn't public at the time, so with no website loading, we looked at the domain's public-facing DNS records, which can help to identify what else is hosted on the domain, such as the type of email servers or web hosting. We also wanted to look for any public subdomains that the developer might use to host functionality for the app (or host other resources that should probably not be public), such as admin dashboards, databases, or other web-facing services. But when we looked at the TeaOnHer's public internet records, it had no meaningful information other than a single subdomain, When we opened this page in our browser, what loaded was the landing page for TeaOnHer's API (for the curious, we uploaded a copy here). An API simply allows things on the internet to communicate with each other, such as linking an app to its central database. It was on this landing page that we found the exposed email address and plaintext password (which wasn't that far off 'password') for Lampkin's account to access the TeaOnHer 'admin panel.' The API page showed that the admin panel, used for the document verification system and user management, was located at 'localhost,' which simply refers to the physical computer running the server and may not have been directly accessible from the internet. It's unclear if anyone could have used the credentials to access the admin panel, but this was in itself a sufficiently alarming finding. At this point, we were only about two minutes in. Otherwise, the API landing page didn't do much other than offer some indication as to what the API can do. The page listed several API endpoints, which the app needs to access in order to function, such as retrieving user records from TeaOnHer's database, for users to leave reviews, and sending notifications. With knowledge of these endpoints, it can be easier to interact with the API directly, as if we were imitating the app itself. Every API is different, so learning how an API works and how to communicate with one can take time to figure out, such as which endpoints to use and the parameters needed to effectively speak its language. Apps like Postman can be helpful for accessing and interacting directly with APIs, but this requires time and a certain degree of trial and error (and patience) to make APIs spit out data when they shouldn't. But in this case, there was an even easier way. TeaOnHer API allowed unauthenticated access to user data This API landing page included an endpoint called /docs, which contained the API's auto-generated documentation (powered by a product called Swagger UI) that contained the full list of commands that can be performed on the API. This documentation page was effectively a master sheet of all the actions you can perform on the TeaOnHer API as a regular app user, and more importantly, as the app's administrator, such as creating new users, verifying users' identity documents, moderating comments, and more. The API documentation also featured the ability to query the TeaOnHer API and return user data, essentially letting us retrieve data from the app's backend server and display it in our browser. While it's not uncommon for developers to publish their API documentation, the problem here was that some API requests could be made without any authentication — no passwords or credentials were needed to return information from the TeaOnHer database. In other words, you could run commands on the API to access users' private data that should not have been accessible to a user of the app, let alone anyone on the internet. All of this was conveniently and publicly documented for anyone to see. Requesting a list of users currently in the TeaOnHer identity verification queue, for example — no more than pressing a button on the API page, nothing fancy here — would return dozens of account records on people who had recently signed up to TeaOnHer. The records returned from TeaOnHer's server contained users' unique identifiers within the app (essentially a string of random letters and numbers), their public profile screen name, and self-reported age and location, along with their private email address. The records also included web address links containing photos of the users' driver's licenses and corresponding selfies. Worse, these photos of driver's licenses, government-issued IDs, and selfies were stored in an Amazon-hosted S3 cloud server set as publicly accessible to anyone with their web addresses. This public setting lets anyone with a link to someone's identity documents open the files from anywhere with no restrictions. With that unique user identifier, we could also use the API page to directly look up individual users' records, which would return their account data and any of their associated identity documents. With uninhibited access to the API, a malicious user could have scraped huge amounts of user data from the app, much like what happened with the Tea app to begin with. From bean to cup, that was about 10 minutes, and we hadn't even logged-in to the app yet. The bugs were so easy to find that it would be sheer luck if nobody malicious found them before we did. We asked, but Lampkin would not say if he has the technical ability, such as logs, to determine if anyone had used (or misused) the API at any time to gain access to users' verification documents, such as by scraping web addresses from the API. In the days since our report to Lampkin, the API landing page has been taken down, along with its documentation page, and it now displays only the state of the server that the TeaOnHer API is running on as 'healthy.' At least on cursory tests, the API now appears to rely on authentication, and the previous calls made using the API no longer work. The web addresses containing users' uploaded identity documents have also been restricted from public view. TeaOnHer developer dismissed efforts to disclose flaws Given that TeaOnHer had no official website at the time of our findings, TechCrunch contacted the email address listed on the privacy policy in an effort to disclose the security lapses. But the email bounced back with an error saying the email address couldn't be found. We also tried contacting Lampkin through the email address on his website, Newville Media, but our email bounced back with the same error message. TechCrunch reached Lampkin via LinkedIn message, asking him to provide an email address where we could send details of the security flaws. Lampkin responded with a general 'support' email address. When TechCrunch discloses a security flaw, we reach out to confirm first that a person or company is the correct recipient. Otherwise, blindly sending details of a security bug to the wrong person could create a risk. Before sharing specific details of the flaws, we asked the recipient of the 'support' email address if this was the correct address to disclose a security exposure involving TeaOnHer user data. 'You must have us confused with 'the Tea app',' Lampkin replied by email. (We hadn't.) 'We don't have a security breach or data leak,' he said. (It did.) 'We have some bots at most but we haven't scaled big enough to be in that conversation yet, sorry you were misinformed.' (We weren't.) Satisfied that we had established contact with the correct person (albeit not with the response we received), TechCrunch shared details of the security flaws, as well as several links to exposed driver's licenses, and a copy of Lampkin's own data to underscore the severity of the security issues. 'Thank you for this information. This is very concerning. We are going to jump on this right now,' said Lampkin. Despite several follow-up emails, we have not heard from Lampkin since we disclosed the security flaws. It doesn't matter if you're a one-person software shop or a billionaire vibe coding through a weekend: Developers still have a responsibility to keep their users' data safe. If you can't keep your users' private data safe, don't build it to begin with. If you have evidence of a popular app or service leaking or exposing information, get in touch. You can securely contact this reporter via encrypted message at zackwhittaker.1337 on Signal.