Feeds

LG offers BRAIN-SAVING CANCER-BL... er 'good luck charms'

Quick, block those evil waves ... before they make your phone work

Eight steps to building an HP BladeSystem

MWC 2014 What LG would like us to be writing about is its Knock Code – a system which takes the idea of drawing a shape to unlock a phone and replaces it with a Simon-style pattern of taps. That might have been the case if LG hadn’t chosen to promote the technology by handing out a, ahem, "radiation shield".

This will "protect" you, but not from marketing bollocks

This will "protect" you, but not from marketing bollocks

The gold sticker is labelled a with the term “Product Effects”... It reads:

Using an electromagnetic wave absorbent [sic] technique, this product absorbs the electromagnetic waves from Smart Phone [sic] and other electronic devices, and prevents your harmful electromagnetic waves that cause health problems, such as endocrine malfunctioning, reproductive malfunctioning, cataract [sic] and brain tumour.

Ignoring the interesting use of English and that this is akin to the vegetarian society handing out promotional bacon sandwiches, the idea that – even due to the misguided ideas of a publicity firm – a respectable mobile tech company would endorse a product where the science is so thoroughly discredited gives us pause.

There has been good and detailed study of possible effects of mobile phone radiation and all the studies have turned up a response along the lines of “we can’t find anything”.

And all this leaves aside the simple science that if the gew-gaw did indeed, er, "absorb" the electromagnetic waves – then the phone you’ve so carefully "cleaned" and to which you'd attached the well "rubbed" sticker would stop working.

LG's Ken Hong admits that it was a mistake to bring the stickers – which are apparently given away in shops in South Korea – to the show, but attributes this to cultural differences. He says that they are seen as good luck charms, that people regard them as we would a four-leafed clover and don't really think they do anything.

Hong also says the translation of the blurb makes it appear to be far more serious and scientific-sounding than it actually is, arguing that it wouldn't be anything quite as intimidating in the native Korean.

Following my intervention, LG are now no longer giving them out at Mobile World Congress which I suppose makes mine a little bit of a collector's item. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.