logo
Are You Phone-Snubbing Your Friends? There's an Easy Way to Stop

Are You Phone-Snubbing Your Friends? There's an Easy Way to Stop

CNET17 hours ago
I'd have a hard time staying in touch with most of my friends if I didn't have my smartphone. But when we actually do spend time together, I often wish we didn't have phones at all -- especially if my friend can't stop looking at theirs.
At some point, we've all been phone-snubbed. That's what happens when the person you're spending time with seems more interested in their phone than you. You might be sitting right across from someone, but when they're laughing at a video or meme only they can see, it feels like they're a million miles away.
I've been guilty of paying more attention to my screen than my companion and felt bad about it afterward. There's nothing wrong with replying to an urgent Slack message or pulling up a funny TikTok to share. But I know I probably spend too much time staring at screens, and a lot of that time is unhealthy doomscrolling. These days, when I'm not using my phone, I try to be more deliberate about keeping it out of sight and out of mind. If I do need to keep my phone at hand, I always have it face down.
It can protect your phone screen
I have a few reasons for making sure my phone screen is turned away. The first one is practical: When my phone isn't in my pocket, it's probably sitting on a desk or table -- which means it's probably not far from a glass of water or mug of coffee.
As a somewhat clumsy person, I've spilled beverages on my phone plenty of times. And even though most modern phones are water-resistant, why take chances? With my screen hidden, I can keep the most important part of my phone protected from splashes and other mishaps.
For extra protection, I have a phone case with raised edges. This helps prevent the screen from coming in direct contact with crumbs and debris that might be left on the table.
My colleague David Carnoy told me about an incident where he was charging his phone on his kitchen counter with the screen face up. Someone dropped a mug on top of it and cracked the screen. Unfortunately, he didn't have a screen protector on this device (he knows better now).
It could help save your phone battery
Another good reason to keep my phone face down is that it won't turn on each time I get a notification. That means I can save a little bit of battery charge.
A single notification won't mean the difference between my phone lasting the whole day or dying in the afternoon but notifications can add up, especially if I've enabled them across all of my apps. If I'm in a lot of group chats, my screen might end up turning on dozens of times throughout the day (and that's on the low side -- many teenagers have hundreds of notifications a day).
It also shows that you pay attention
Keeping my phone face down is also a good rule of social etiquette: If I'm hanging out with someone, I keep my screen hidden from view as a subtle way of showing that I won't be distracted by it. I don't want incoming notifications to light up my screen every few seconds, especially if I'm in a bar or other dimly lit setting. I want to keep my eyes on the person I'm talking to.
"Eye contact is one of the most powerful forms of human connection. Neuroscience research indicates that when two people make direct eye contact, their brain activity begins to synchronize, supporting more effective communication and increasing empathy. This synchrony can be disrupted when attention shifts to a phone, even briefly," says Michelle Davis, clinical psychologist at Headspace.
When I'm with the people I've chosen to spend time with, I want to be fully present with them. A sudden notification will tempt me to glance at, or worse, pick up my phone in the middle of a conversation.
It minimizes your phone's presence
I also have a more personal reason for keeping my phone face down and I suspect that other people have had this same thought: My phone takes up too much space in my life.
I mean that quite literally. My phone is bigger than it needs to be. That's been especially true since I upgraded from my iPhone Mini to a "normal-sized" iPhone. Yes, I got a much needed boost in battery life but I also got a screen with more pixels to lure me into the next news headline or autoplaying Instagram reel.
A small smartphone isn't something that really exists anymore. My phone is bigger and better at grabbing my attention. It competes against my friends and family, books and movies, the entire world outside of its 6-inch screen. It often wins. But there's still one small thing I can do to minimize its presence: I can keep the screen turned away from me whenever possible.
It can sometimes feel like there's no escaping from my phone. Whether that ever changes, or phones evolve into some new form factor, I can't say. I can't control everything about my phone but I can control whether the screen stares at me when I'm not staring at it.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

ETH Price Surges as $2.9B Inflows, EthCC, and Robinhood's L2 Fuel Bullish Sentiment
ETH Price Surges as $2.9B Inflows, EthCC, and Robinhood's L2 Fuel Bullish Sentiment

Yahoo

timean hour ago

  • Yahoo

ETH Price Surges as $2.9B Inflows, EthCC, and Robinhood's L2 Fuel Bullish Sentiment

Ether (ETH) 3.5% in the past 24 hours to $2,519 as of 18:59 UTC on June 30, according to CoinDesk Research's technical analysis model, supported by continued institutional demand, network upgrades, and major retail platform integrations. Institutional interest remains robust, with CoinShares reporting $429 million in net inflows into ether investment products over the past week and nearly $2.9 billion year-to-date. This trend has coincided with a declining ETH supply on exchanges and rising staking levels, with over 35 million ETH —a round 28% of the total supply — now locked in proof-of-stake contracts. Market analysts suggest that these factors are reducing liquid supply and bolstering ether's long-term investment thesis. Robinhood announced on Monday that it is developing its own Layer-2 blockchain using Arbitrum's rollup infrastructure. The network is not yet live, but the initiative will eventually support Ethereum staking, tokenized stock trading, and perpetual crypto futures. Although the L2 is under development, the decision to build it on Ethereum's rollup ecosystem is seen as a long-term vote of confidence in Ethereum's scalability roadmap. Ethereum co-founder Vitalik Buterin has also introduced a new digital identity framework using zero-knowledge proofs. This system allows users to verify traits or credentials without revealing private data and is designed to help Web3 apps incorporate privacy-preserving identity systems. Analysts view this as a key step toward wider adoption of decentralized applications requiring sensitive user authentication. Meanwhile, the Ethereum Community Conference (EthCC) kicked off in Cannes, France, gathering more than 6,400 attendees and 500 speakers. The event showcases Ethereum's ongoing developer momentum through presentations on new tools, scaling strategies, and protocol improvements. Despite the positive momentum, ETH remains just below its 200-day moving average, suggesting technical barriers still exist. However, the confluence of inflows, developer progress, and scaling plans continues to support a constructive outlook. Technical Analysis Highlights Ether traded between $2,438.50 and $2,523 from June 29 19:00 to June 30 18:00, marking a 3.47% range. The largest spike occurred during the 22:00–23:00 UTC window on June 29, when ETH surged 2.9% on volume of 368,292 ETH, briefly pushing through the $2,500 barrier. On June 30 at 15:00 UTC, ETH found strong support around $2,438 on above-average volume, confirming a bullish floor. A local high of $2,523 was reached earlier in the day, establishing resistance just above the psychological $2,500 level. During the final hour from 18:00 to 18:59 UTC on June 30, ETH retraced from an intraday peak of $2,499.19 to close at $2,487.19. A sharp upward move between 18:20–18:21 saw ETH climb 1.6% on 6,318 ETH volume, stalling near $2,499. As of 20:23 UTC on June 30, ETH traded at $2,519, up 3.49% in 24 hours, signaling renewed bullish momentum into the Asia open. Parts of this article were generated with the assistance from AI tools and reviewed by our editorial team to ensure accuracy and adherence to our standards. For more information, see CoinDesk's full AI Policy. Error in retrieving data Sign in to access your portfolio Error in retrieving data

Visa's 24/7 war room takes on global cybercriminals
Visa's 24/7 war room takes on global cybercriminals

Yahoo

timean hour ago

  • Yahoo

Visa's 24/7 war room takes on global cybercriminals

In the heart of Data Center Alley -- a patch of suburban Washington where much of the world's internet traffic flows -- Visa operates its global fraud command center. The numbers that the payments giant grapples with are enormous. Every year, $15 trillion flows through Visa's networks, representing roughly 15 percent of the world's economy. And bad actors constantly try to syphon off some of that money. Modern fraudsters vary dramatically in sophistication. To stay ahead, Visa has invested $12 billion over the past five years building AI-powered cyber fraud detection capabilities, knowing that criminals are also spending big. "You have everybody from a single individual threat actor looking to make a quick buck all the way to really corporatized criminal organizations that generate tens or hundreds of millions of dollars annually from fraud and scam activities," Michael Jabbara, Visa's global head of fraud solutions, told AFP during a tour of the company's security campus. "These organizations are very structured in how they operate." The best-resourced criminal syndicates now focus on scams that directly target consumers, enticing them into purchases or transactions by manipulating their emotions. "Consumers are continuously vulnerable. They can be exploited, and that's where we've seen a much higher incidence of attacks recently," Jabbara said. - Scam centers - The warning signs are clear: anything that seems too good to be true online is suspicious, and romance opportunities with strangers from distant countries are especially dangerous. "What you don't realize is that the person you're chatting with is more likely than not in a place like Myanmar," Jabbara warned. He said human-trafficking victims are forced to work in multi-billion-dollar cyber scam centers built by Asian crime networks in Myanmar's lawless border regions. The most up-to-date fraud techniques are systematic and quietly devastating. Once criminals obtain your card information, they automatically distribute it across numerous merchant websites that generate small recurring charges -- amounts low enough that victims may not notice for months. Some of these operations increasingly resemble legitimate tech companies, offering services and digital products to fraudsters much like Google or Microsoft cater to businesses. On the dark web, criminals can purchase comprehensive fraud toolkits. "You can buy the software. You can buy a tutorial on how to use the software. You can get access to a mule network on the ground or you can get access to a bot network" to carry out denial-of-service attacks that overwhelm servers with traffic, effectively shutting them down. Just as cloud computing lowered barriers for startups by eliminating the need to build servers, "the same type of trend has happened in the cyber crime and fraud space," Jabbara explained. These off-the-shelf services can also enable bad actors to launch brute force attacks on an industrial scale -- using repeated payment attempts to crack a card's number, expiry date, and security code. The sophistication extends to corporate-style management, Jabbara said. Some criminal organizations now employ chief risk officers who determine operational risk appetite. They might decide that targeting government infrastructure and hospitals generates an excessive amount of attention from law enforcement and is too risky to pursue. - 'Millions of attacks' - To combat these unprecedented threats, Jabbara leads a payment scam disruption team focused on understanding criminal methodologies. From a small room called the Risk Operations Center in Virginia, employees analyze data streams on multiple screens, searching for patterns that distinguish fraudulent activity from legitimate credit card use. In the larger Cyber Fusion Center, staff monitor potential cyberattacks targeting Visa's own infrastructure around the clock. "We deal with millions of attacks across different parts of our network," Jabbara noted, emphasizing that most are handled automatically without human intervention. Visa maintains identical facilities in London and Singapore, ensuring 24-hour global vigilance. arp/dw Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Visa's 24/7 war room takes on global cybercriminals
Visa's 24/7 war room takes on global cybercriminals

Yahoo

time2 hours ago

  • Yahoo

Visa's 24/7 war room takes on global cybercriminals

In the heart of Data Center Alley -- a patch of suburban Washington where much of the world's internet traffic flows -- Visa operates its global fraud command center. The numbers that the payments giant grapples with are enormous. Every year, $15 trillion flows through Visa's networks, representing roughly 15 percent of the world's economy. And bad actors constantly try to syphon off some of that money. Modern fraudsters vary dramatically in sophistication. To stay ahead, Visa has invested $12 billion over the past five years building AI-powered cyber fraud detection capabilities, knowing that criminals are also spending big. "You have everybody from a single individual threat actor looking to make a quick buck all the way to really corporatized criminal organizations that generate tens or hundreds of millions of dollars annually from fraud and scam activities," Michael Jabbara, Visa's global head of fraud solutions, told AFP during a tour of the company's security campus. "These organizations are very structured in how they operate." The best-resourced criminal syndicates now focus on scams that directly target consumers, enticing them into purchases or transactions by manipulating their emotions. "Consumers are continuously vulnerable. They can be exploited, and that's where we've seen a much higher incidence of attacks recently," Jabbara said. - Scam centers - The warning signs are clear: anything that seems too good to be true online is suspicious, and romance opportunities with strangers from distant countries are especially dangerous. "What you don't realize is that the person you're chatting with is more likely than not in a place like Myanmar," Jabbara warned. He said human-trafficking victims are forced to work in multi-billion-dollar cyber scam centers built by Asian crime networks in Myanmar's lawless border regions. The most up-to-date fraud techniques are systematic and quietly devastating. Once criminals obtain your card information, they automatically distribute it across numerous merchant websites that generate small recurring charges -- amounts low enough that victims may not notice for months. Some of these operations increasingly resemble legitimate tech companies, offering services and digital products to fraudsters much like Google or Microsoft cater to businesses. On the dark web, criminals can purchase comprehensive fraud toolkits. "You can buy the software. You can buy a tutorial on how to use the software. You can get access to a mule network on the ground or you can get access to a bot network" to carry out denial-of-service attacks that overwhelm servers with traffic, effectively shutting them down. Just as cloud computing lowered barriers for startups by eliminating the need to build servers, "the same type of trend has happened in the cyber crime and fraud space," Jabbara explained. These off-the-shelf services can also enable bad actors to launch brute force attacks on an industrial scale -- using repeated payment attempts to crack a card's number, expiry date, and security code. The sophistication extends to corporate-style management, Jabbara said. Some criminal organizations now employ chief risk officers who determine operational risk appetite. They might decide that targeting government infrastructure and hospitals generates an excessive amount of attention from law enforcement and is too risky to pursue. - 'Millions of attacks' - To combat these unprecedented threats, Jabbara leads a payment scam disruption team focused on understanding criminal methodologies. From a small room called the Risk Operations Center in Virginia, employees analyze data streams on multiple screens, searching for patterns that distinguish fraudulent activity from legitimate credit card use. In the larger Cyber Fusion Center, staff monitor potential cyberattacks targeting Visa's own infrastructure around the clock. "We deal with millions of attacks across different parts of our network," Jabbara noted, emphasizing that most are handled automatically without human intervention. Visa maintains identical facilities in London and Singapore, ensuring 24-hour global vigilance. arp/dw Sign in to access your portfolio

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store