• Cheaper than iCloud, this 2TB cloud storage also lasts for life

    Macworld

    iCloud doesn’t seem expensive until you start doing the math. If you want 2TB with iCloud, you’ll have to pay a month. That’s a little under every year. If you want a cheaper alternative to get the same amount of cloud storage, FileJump has a 2TB Cloud Storage Lifetime Subscription that’s on sale for.

    The biggest difference between iCloud and FileJump is that the latter won’t seamlessly integrate with your iOS devices. But with extra in your pocket every month… does it really matter? It’s still practically seamless to upload images, videos, and files under 15GB in size using the simple drag-and-drop, and they’re stored safely for life with AES encryption.

    Unlike other lifetime cloud storage plans, FileJump even has mobile and desktop apps to complete the experience. Conveniently see file previews for images, videos, and spreadsheets.

    Don’t miss your chance to replace a monthly subscription with something you can actually own.

    Get a FileJump 2TB Cloud Storage Lifetime Subscription for FileJump 2TB Cloud Storage: Lifetime SubscriptionSee Deal

    StackSocial prices subject to change.
    #cheaper #than #icloud #this #2tb
    Cheaper than iCloud, this 2TB cloud storage also lasts for life
    Macworld iCloud doesn’t seem expensive until you start doing the math. If you want 2TB with iCloud, you’ll have to pay a month. That’s a little under every year. If you want a cheaper alternative to get the same amount of cloud storage, FileJump has a 2TB Cloud Storage Lifetime Subscription that’s on sale for. The biggest difference between iCloud and FileJump is that the latter won’t seamlessly integrate with your iOS devices. But with extra in your pocket every month… does it really matter? It’s still practically seamless to upload images, videos, and files under 15GB in size using the simple drag-and-drop, and they’re stored safely for life with AES encryption. Unlike other lifetime cloud storage plans, FileJump even has mobile and desktop apps to complete the experience. Conveniently see file previews for images, videos, and spreadsheets. Don’t miss your chance to replace a monthly subscription with something you can actually own. Get a FileJump 2TB Cloud Storage Lifetime Subscription for FileJump 2TB Cloud Storage: Lifetime SubscriptionSee Deal StackSocial prices subject to change. #cheaper #than #icloud #this #2tb
    WWW.MACWORLD.COM
    Cheaper than iCloud, this 2TB cloud storage also lasts for life
    Macworld iCloud doesn’t seem expensive until you start doing the math. If you want 2TB with iCloud, you’ll have to pay $9.99 a month. That’s a little under $120 every year. If you want a cheaper alternative to get the same amount of cloud storage, FileJump has a 2TB Cloud Storage Lifetime Subscription that’s on sale for $69.97 (reg. $467). The biggest difference between iCloud and FileJump is that the latter won’t seamlessly integrate with your iOS devices. But with $10 extra in your pocket every month… does it really matter? It’s still practically seamless to upload images, videos, and files under 15GB in size using the simple drag-and-drop, and they’re stored safely for life with AES encryption. Unlike other lifetime cloud storage plans, FileJump even has mobile and desktop apps to complete the experience. Conveniently see file previews for images, videos, and spreadsheets. Don’t miss your chance to replace a monthly subscription with something you can actually own. Get a FileJump 2TB Cloud Storage Lifetime Subscription for $69.97. FileJump 2TB Cloud Storage: Lifetime SubscriptionSee Deal StackSocial prices subject to change.
    0 Comentários 0 Compartilhamentos 0 Anterior
  • A new movie taking on the tech bros

    Hi, friends! Welcome to Installer No. 85, your guide to the best and Verge-iest stuff in the world.This week, I’ve been reading about Sean Evans and music fraud and ayahuasca, playing with the new Obsidian Bases feature, obsessing over every Cliche” more times than I’m proud of, installing some Elgato Key Lights to improve my WFH camera look, digging the latest beta of Artifacts, and downloading every podcast I can find because I have 20 hours of driving to do this weekend.I also have for you a very funny new movie about tech CEOs, a new place to WhatsApp, a great new accessory for your phone, a helpful crypto politics explainer, and much more. Short week this week, but still lots going on. Let’s do it.The DropMountainhead. I mean, is there a more me-coded pitch than “Succession vibes, but about tech bros?” It’s about a bunch ofbillionaires who more or less run the world and are also more or less ruining it. You’ll either find this hilarious, way too close to home, or both. WhatsApp for iPad. I will never, ever understand why Meta hates building iPad apps. But it finally launched the most important one! The app itself is extremely fine and exactly what you’d think it would be, but whatever. It exists! DO INSTAGRAM NEXT.Post Games.Polygon, all about video games. It’s only a couple episodes deep, but so far I love the format: it’s really smart and extremely thoughtful, but it’s also very silly in spots. Big fan.The Popsockets Kick-Out Grip. I am a longtime, die-hard Popsockets user and evangelist, and the new model fixes my one gripe with the thing by working as both a landscape and portrait kickstand. is highway robbery for a phone holder, but this is exactly the thing I wanted.“Dance with Sabrina.” A new, real-time competitive rhythm game inside of Fortnite, in which you try to do well enough to earn the right to actually help create the show itself. Super fun concept, though all these games are better with pads, guitars, or really anything but a normal controller.Lazy 2.0. Lazy is a stealthy but fascinating note-taking tool, and it does an unusually good job of integrating with files and apps. The new version is very AI-forward, basically bringing a personalized chatbot and all your notes to your whole computer. Neat!Elden Ring Nightreign. A multiplayer-heavy spinoff of the game that I cannot get my gamer friends to shut up about, even years after it came out. I’ve seen a few people call the game a bit small and repetitive, but next to Elden Ring I suppose most things are.The Tapo DL100 Smart Deadbolt Door Lock. A door lock with, as far as I can tell, every feature I want in a smart lock: a keypad, physical keys, super long battery life, and lots of assistant integrations. It does look… huge? But it’s pretty bland-looking, which is a good thing.Implosion: The Titanic Sub Disaster. One of a few Titan-related documentaries coming this summer, meant to try and explain what led to the awful events of a couple years ago. I haven’t seen this one yet, but the reviews are solid — and the story seems even sadder and more infuriating than we thought.“The growing scandal of $TRUMP.” I love a good Zeke Faux take on crypto, whether it’s a book or a Search Engine episode. This interview with Ezra Klein is a great explainer of how the Trump family got so into crypto and how it’s being used to move money in deeply confusing and clearly corrupt ways. Cameron Faulkner isn’t technically new to The Verge, he’s just newly back at The Verge. In addition to being a commerce editor on our team, he also wrote one of the deepest dives into webcams you’ll ever find, plays a lot of games, has more thoughts about monitors than any reasonable person should, and is extremely my kind of person. Since he’s now so very back, I asked Cam to share his homescreen with us, as I always try to do with new people here. Here it is, plus some info on the apps he uses and why:The phone: Pixel 9 Pro.The wallpaper: It’s an “Emoji Workshop” creation, which is a feature that’s built into Android 14 and more recent updates. It mashes together emoji into the patterns and colors of your choosing. I picked this one because I like sushi, and I love melon / coral color tones.The apps: Google Keep, Settings, Clock, Phone, Chrome, Pocket Casts, Messages, Spotify.I haven’t downloaded a new app in ages. What’s shown on my homescreen has been there, unmoved, for longer than I can remember. I have digital light switches, a to-do list with the greatStuff widget, a simple Google Fit widget to show me how much I moved today, and a couple Google Photos widgets of my lovely wife and son. I could probably function just fine if every app shuffled its location on my homescreen, except for the bottom row. That’s set in stone, never to be fiddled with.I also asked Cameron to share a few things he’s into right now. Here’s what he sent back:Righteous Gemstones on HBO Max. It’s a much smarter comedy than I had assumed, and I’m delighted to have four seasons to catch up on. I’m really digging Clair Obscur: Expedition 33, which achieves the feat of breakneck pacingand a style that rivals Persona 5, which is high praise. I have accrued well over a dozen Switch 2 accessories, and I’m excited to put them to the test once I get a console on launch day.CrowdsourcedHere’s what the Installer community is into this week. I want to know what you’re into right now, as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. For even more great recommendations, check out the replies to this post on Threads and this post on Bluesky.“The Devil’s Plan. This Netflix original South Korean reality show locks 14 contestants in a windowless living space that’s part mansion, part prison, part room escape, and challenges them to eliminate each other in a series of complicated tabletop games.” — Travis“If you’re a fan of Drive to Survive, I’m happy to report that the latest season of Netflix’s series on NASCAR is finally good, and a reasonable substitute for that show once you’ve finished it.” — Christopher“I switched to a Pixel 9 Pro XL and Pixel Watch 3 from an iPhone and Apple Watch about 6 months ago and found Open Bubbles, an open source alternative to BlueBubbles that does need a Mac but doesn’t need that Mac to remain on, You just need a one-time hardware identifier from it, then it gives you full iMessage, Find My, FaceTime, and iCloud shared albums on Android and Windows using an email address. So long as you can get your contacts to iMessage your email instead of your number, it works great.” — Tim“Playing Mario Kart 8 Deluxe for the last time before Mario Kart World arrives next week and takes over my life!” — Ravi“With Pocket being killed off I’ve started using my RSS reader — which is Inoreader — instead as a suitable replacement. I only switched over to Pocket after Omnivore shut down.” — James“I just got a Boox Go 10.3 for my birthday and love it. The lack of front lighting is the biggest downfall. It is also only on Android 12 so I cannot load a corporate profile. It feels good to write on just, almost as good as my cheaper fountain pen and paper. It is helping me organize multiple notebooks and scraps of paper.” — Sean“Giving Tweek a bit of a go, and for a lightweight weekly planner it’s beautiful. I also currently use Motion for project management of personal tasks and when I was doing my Master’s. I really like the Gantt view to map out long term personal and study projects.” — Astrid“Might I suggest Elle Griffin’s work at The Elysian? How she’s thinking through speculative futures and a cooperative media system is fascinating.” — Zach“GeForce Now on Steam Deck!” — SteveSigning offOne of the reasons I like making this newsletter with all of you is that it’s a weekly reminder that, hey, actually, there’s a lot of awesome people doing awesome stuff out there on the internet. I spend a lot of my time talking to people who say AI is going to change everything, and we’re all going to just AI ourselves into oblivion and be thrilled about it — a theory I increasingly think is both wrong and horrifying.And then this week I read a blog post from the great Dan Sinker, who called this moment “the Who Cares Era, where completely disposable things are shoddily produced for people to mostly ignore.” You should read the whole thing, but here’s a bit I really loved:“Using extraordinary amounts of resources, it has the ability to create something good enough, a squint-and-it-looks-right simulacrum of normality. If you don’t care, it’s miraculous. If you do, the illusion falls apart pretty quickly. The fact that the userbase for AI chatbots has exploded exponentially demonstrates that good enough is, in fact, good enough for most people. Because most people don’t care.”I don’t think this describes everything and everyone, and neither does Sinker, but I do think it’s more true than it should be. And I increasingly think our job, maybe our method of rebellion, is to be people who care, who have taste, who like and share and look for good things, who read and watch and look at those things on purpose instead of just staring slackjawed at whatever slop is placed between the ads they hope we won’t really notice. I think there are a lot of fascinating ways that AI can be useful, but we can’t let it train us to accept slop just because it’s there. Sorry, this got more existential than I anticipated. But I’ve been thinking about it a lot, and I’m going to try and point Installer even more at the stuff that matters, made by people who care. I hope you’ll hold me to that.See you next week!See More:
    #new #movie #taking #tech #bros
    A new movie taking on the tech bros
    Hi, friends! Welcome to Installer No. 85, your guide to the best and Verge-iest stuff in the world.This week, I’ve been reading about Sean Evans and music fraud and ayahuasca, playing with the new Obsidian Bases feature, obsessing over every Cliche” more times than I’m proud of, installing some Elgato Key Lights to improve my WFH camera look, digging the latest beta of Artifacts, and downloading every podcast I can find because I have 20 hours of driving to do this weekend.I also have for you a very funny new movie about tech CEOs, a new place to WhatsApp, a great new accessory for your phone, a helpful crypto politics explainer, and much more. Short week this week, but still lots going on. Let’s do it.The DropMountainhead. I mean, is there a more me-coded pitch than “Succession vibes, but about tech bros?” It’s about a bunch ofbillionaires who more or less run the world and are also more or less ruining it. You’ll either find this hilarious, way too close to home, or both. WhatsApp for iPad. I will never, ever understand why Meta hates building iPad apps. But it finally launched the most important one! The app itself is extremely fine and exactly what you’d think it would be, but whatever. It exists! DO INSTAGRAM NEXT.Post Games.Polygon, all about video games. It’s only a couple episodes deep, but so far I love the format: it’s really smart and extremely thoughtful, but it’s also very silly in spots. Big fan.The Popsockets Kick-Out Grip. I am a longtime, die-hard Popsockets user and evangelist, and the new model fixes my one gripe with the thing by working as both a landscape and portrait kickstand. is highway robbery for a phone holder, but this is exactly the thing I wanted.“Dance with Sabrina.” A new, real-time competitive rhythm game inside of Fortnite, in which you try to do well enough to earn the right to actually help create the show itself. Super fun concept, though all these games are better with pads, guitars, or really anything but a normal controller.Lazy 2.0. Lazy is a stealthy but fascinating note-taking tool, and it does an unusually good job of integrating with files and apps. The new version is very AI-forward, basically bringing a personalized chatbot and all your notes to your whole computer. Neat!Elden Ring Nightreign. A multiplayer-heavy spinoff of the game that I cannot get my gamer friends to shut up about, even years after it came out. I’ve seen a few people call the game a bit small and repetitive, but next to Elden Ring I suppose most things are.The Tapo DL100 Smart Deadbolt Door Lock. A door lock with, as far as I can tell, every feature I want in a smart lock: a keypad, physical keys, super long battery life, and lots of assistant integrations. It does look… huge? But it’s pretty bland-looking, which is a good thing.Implosion: The Titanic Sub Disaster. One of a few Titan-related documentaries coming this summer, meant to try and explain what led to the awful events of a couple years ago. I haven’t seen this one yet, but the reviews are solid — and the story seems even sadder and more infuriating than we thought.“The growing scandal of $TRUMP.” I love a good Zeke Faux take on crypto, whether it’s a book or a Search Engine episode. This interview with Ezra Klein is a great explainer of how the Trump family got so into crypto and how it’s being used to move money in deeply confusing and clearly corrupt ways. Cameron Faulkner isn’t technically new to The Verge, he’s just newly back at The Verge. In addition to being a commerce editor on our team, he also wrote one of the deepest dives into webcams you’ll ever find, plays a lot of games, has more thoughts about monitors than any reasonable person should, and is extremely my kind of person. Since he’s now so very back, I asked Cam to share his homescreen with us, as I always try to do with new people here. Here it is, plus some info on the apps he uses and why:The phone: Pixel 9 Pro.The wallpaper: It’s an “Emoji Workshop” creation, which is a feature that’s built into Android 14 and more recent updates. It mashes together emoji into the patterns and colors of your choosing. I picked this one because I like sushi, and I love melon / coral color tones.The apps: Google Keep, Settings, Clock, Phone, Chrome, Pocket Casts, Messages, Spotify.I haven’t downloaded a new app in ages. What’s shown on my homescreen has been there, unmoved, for longer than I can remember. I have digital light switches, a to-do list with the greatStuff widget, a simple Google Fit widget to show me how much I moved today, and a couple Google Photos widgets of my lovely wife and son. I could probably function just fine if every app shuffled its location on my homescreen, except for the bottom row. That’s set in stone, never to be fiddled with.I also asked Cameron to share a few things he’s into right now. Here’s what he sent back:Righteous Gemstones on HBO Max. It’s a much smarter comedy than I had assumed, and I’m delighted to have four seasons to catch up on. I’m really digging Clair Obscur: Expedition 33, which achieves the feat of breakneck pacingand a style that rivals Persona 5, which is high praise. I have accrued well over a dozen Switch 2 accessories, and I’m excited to put them to the test once I get a console on launch day.CrowdsourcedHere’s what the Installer community is into this week. I want to know what you’re into right now, as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. For even more great recommendations, check out the replies to this post on Threads and this post on Bluesky.“The Devil’s Plan. This Netflix original South Korean reality show locks 14 contestants in a windowless living space that’s part mansion, part prison, part room escape, and challenges them to eliminate each other in a series of complicated tabletop games.” — Travis“If you’re a fan of Drive to Survive, I’m happy to report that the latest season of Netflix’s series on NASCAR is finally good, and a reasonable substitute for that show once you’ve finished it.” — Christopher“I switched to a Pixel 9 Pro XL and Pixel Watch 3 from an iPhone and Apple Watch about 6 months ago and found Open Bubbles, an open source alternative to BlueBubbles that does need a Mac but doesn’t need that Mac to remain on, You just need a one-time hardware identifier from it, then it gives you full iMessage, Find My, FaceTime, and iCloud shared albums on Android and Windows using an email address. So long as you can get your contacts to iMessage your email instead of your number, it works great.” — Tim“Playing Mario Kart 8 Deluxe for the last time before Mario Kart World arrives next week and takes over my life!” — Ravi“With Pocket being killed off I’ve started using my RSS reader — which is Inoreader — instead as a suitable replacement. I only switched over to Pocket after Omnivore shut down.” — James“I just got a Boox Go 10.3 for my birthday and love it. The lack of front lighting is the biggest downfall. It is also only on Android 12 so I cannot load a corporate profile. It feels good to write on just, almost as good as my cheaper fountain pen and paper. It is helping me organize multiple notebooks and scraps of paper.” — Sean“Giving Tweek a bit of a go, and for a lightweight weekly planner it’s beautiful. I also currently use Motion for project management of personal tasks and when I was doing my Master’s. I really like the Gantt view to map out long term personal and study projects.” — Astrid“Might I suggest Elle Griffin’s work at The Elysian? How she’s thinking through speculative futures and a cooperative media system is fascinating.” — Zach“GeForce Now on Steam Deck!” — SteveSigning offOne of the reasons I like making this newsletter with all of you is that it’s a weekly reminder that, hey, actually, there’s a lot of awesome people doing awesome stuff out there on the internet. I spend a lot of my time talking to people who say AI is going to change everything, and we’re all going to just AI ourselves into oblivion and be thrilled about it — a theory I increasingly think is both wrong and horrifying.And then this week I read a blog post from the great Dan Sinker, who called this moment “the Who Cares Era, where completely disposable things are shoddily produced for people to mostly ignore.” You should read the whole thing, but here’s a bit I really loved:“Using extraordinary amounts of resources, it has the ability to create something good enough, a squint-and-it-looks-right simulacrum of normality. If you don’t care, it’s miraculous. If you do, the illusion falls apart pretty quickly. The fact that the userbase for AI chatbots has exploded exponentially demonstrates that good enough is, in fact, good enough for most people. Because most people don’t care.”I don’t think this describes everything and everyone, and neither does Sinker, but I do think it’s more true than it should be. And I increasingly think our job, maybe our method of rebellion, is to be people who care, who have taste, who like and share and look for good things, who read and watch and look at those things on purpose instead of just staring slackjawed at whatever slop is placed between the ads they hope we won’t really notice. I think there are a lot of fascinating ways that AI can be useful, but we can’t let it train us to accept slop just because it’s there. Sorry, this got more existential than I anticipated. But I’ve been thinking about it a lot, and I’m going to try and point Installer even more at the stuff that matters, made by people who care. I hope you’ll hold me to that.See you next week!See More: #new #movie #taking #tech #bros
    WWW.THEVERGE.COM
    A new movie taking on the tech bros
    Hi, friends! Welcome to Installer No. 85, your guide to the best and Verge-iest stuff in the world. (If you’re new here, welcome, sorry in advance that this week is a tiny bit politics-y, and also you can read all the old editions at the Installer homepage.) This week, I’ve been reading about Sean Evans and music fraud and ayahuasca, playing with the new Obsidian Bases feature, obsessing over every Cliche” more times than I’m proud of, installing some Elgato Key Lights to improve my WFH camera look, digging the latest beta of Artifacts, and downloading every podcast I can find because I have 20 hours of driving to do this weekend.I also have for you a very funny new movie about tech CEOs, a new place to WhatsApp, a great new accessory for your phone, a helpful crypto politics explainer, and much more. Short week this week, but still lots going on. Let’s do it.(As always, the best part of Installer is your ideas and tips. What are you reading / playing / watching / listening to / shopping for / doing with a Raspberry Pi this week? Tell me everything: installer@theverge.com. And if you know someone else who might enjoy Installer, tell them to subscribe here. And if you haven’t subscribed, you should! You’ll get every issue for free, a day early, in your inbox.)The DropMountainhead. I mean, is there a more me-coded pitch than “Succession vibes, but about tech bros?” It’s about a bunch of (pretty recognizable) billionaires who more or less run the world and are also more or less ruining it. You’ll either find this hilarious, way too close to home, or both. WhatsApp for iPad. I will never, ever understand why Meta hates building iPad apps. But it finally launched the most important one! The app itself is extremely fine and exactly what you’d think it would be, but whatever. It exists! DO INSTAGRAM NEXT.Post Games.Polygon, all about video games. It’s only a couple episodes deep, but so far I love the format: it’s really smart and extremely thoughtful, but it’s also very silly in spots. Big fan.The Popsockets Kick-Out Grip. I am a longtime, die-hard Popsockets user and evangelist, and the new model fixes my one gripe with the thing by working as both a landscape and portrait kickstand. $40 is highway robbery for a phone holder, but this is exactly the thing I wanted.“Dance with Sabrina.” A new, real-time competitive rhythm game inside of Fortnite, in which you try to do well enough to earn the right to actually help create the show itself. Super fun concept, though all these games are better with pads, guitars, or really anything but a normal controller.Lazy 2.0. Lazy is a stealthy but fascinating note-taking tool, and it does an unusually good job of integrating with files and apps. The new version is very AI-forward, basically bringing a personalized chatbot and all your notes to your whole computer. Neat!Elden Ring Nightreign. A multiplayer-heavy spinoff of the game that I cannot get my gamer friends to shut up about, even years after it came out. I’ve seen a few people call the game a bit small and repetitive, but next to Elden Ring I suppose most things are.The Tapo DL100 Smart Deadbolt Door Lock. A $70 door lock with, as far as I can tell, every feature I want in a smart lock: a keypad, physical keys, super long battery life, and lots of assistant integrations. It does look… huge? But it’s pretty bland-looking, which is a good thing.Implosion: The Titanic Sub Disaster. One of a few Titan-related documentaries coming this summer, meant to try and explain what led to the awful events of a couple years ago. I haven’t seen this one yet, but the reviews are solid — and the story seems even sadder and more infuriating than we thought.“The growing scandal of $TRUMP.” I love a good Zeke Faux take on crypto, whether it’s a book or a Search Engine episode. This interview with Ezra Klein is a great explainer of how the Trump family got so into crypto and how it’s being used to move money in deeply confusing and clearly corrupt ways. Cameron Faulkner isn’t technically new to The Verge, he’s just newly back at The Verge. In addition to being a commerce editor on our team, he also wrote one of the deepest dives into webcams you’ll ever find, plays a lot of games, has more thoughts about monitors than any reasonable person should, and is extremely my kind of person. Since he’s now so very back, I asked Cam to share his homescreen with us, as I always try to do with new people here. Here it is, plus some info on the apps he uses and why:The phone: Pixel 9 Pro.The wallpaper: It’s an “Emoji Workshop” creation, which is a feature that’s built into Android 14 and more recent updates. It mashes together emoji into the patterns and colors of your choosing. I picked this one because I like sushi, and I love melon / coral color tones.The apps: Google Keep, Settings, Clock, Phone, Chrome, Pocket Casts, Messages, Spotify.I haven’t downloaded a new app in ages. What’s shown on my homescreen has been there, unmoved, for longer than I can remember. I have digital light switches, a to-do list with the great (but paid) Stuff widget, a simple Google Fit widget to show me how much I moved today, and a couple Google Photos widgets of my lovely wife and son. I could probably function just fine if every app shuffled its location on my homescreen, except for the bottom row. That’s set in stone, never to be fiddled with.I also asked Cameron to share a few things he’s into right now. Here’s what he sent back:Righteous Gemstones on HBO Max. It’s a much smarter comedy than I had assumed (but it’s still dumb in the best ways), and I’m delighted to have four seasons to catch up on. I’m really digging Clair Obscur: Expedition 33, which achieves the feat of breakneck pacing (the game equivalent of a page-turner) and a style that rivals Persona 5, which is high praise. I have accrued well over a dozen Switch 2 accessories, and I’m excited to put them to the test once I get a console on launch day.CrowdsourcedHere’s what the Installer community is into this week. I want to know what you’re into right now, as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. For even more great recommendations, check out the replies to this post on Threads and this post on Bluesky.“The Devil’s Plan. This Netflix original South Korean reality show locks 14 contestants in a windowless living space that’s part mansion, part prison, part room escape, and challenges them to eliminate each other in a series of complicated tabletop games. (If this sounds familiar, it’s a spiritual successor to the beloved series The Genius from the mid-2010s.)” — Travis“If you’re a fan of Drive to Survive, I’m happy to report that the latest season of Netflix’s series on NASCAR is finally good, and a reasonable substitute for that show once you’ve finished it.” — Christopher“I switched to a Pixel 9 Pro XL and Pixel Watch 3 from an iPhone and Apple Watch about 6 months ago and found Open Bubbles, an open source alternative to BlueBubbles that does need a Mac but doesn’t need that Mac to remain on, You just need a one-time hardware identifier from it, then it gives you full iMessage, Find My, FaceTime, and iCloud shared albums on Android and Windows using an email address. So long as you can get your contacts to iMessage your email instead of your number, it works great.” — Tim“Playing Mario Kart 8 Deluxe for the last time before Mario Kart World arrives next week and takes over my life!” — Ravi“With Pocket being killed off I’ve started using my RSS reader — which is Inoreader — instead as a suitable replacement. I only switched over to Pocket after Omnivore shut down.” — James“I just got a Boox Go 10.3 for my birthday and love it. The lack of front lighting is the biggest downfall. It is also only on Android 12 so I cannot load a corporate profile. It feels good to write on just, almost as good as my cheaper fountain pen and paper. It is helping me organize multiple notebooks and scraps of paper.” — Sean“Giving Tweek a bit of a go, and for a lightweight weekly planner it’s beautiful. I also currently use Motion for project management of personal tasks and when I was doing my Master’s. I really like the Gantt view to map out long term personal and study projects. (I also got a student discount for Motion, but it’s still expensive.)” — Astrid“Might I suggest Elle Griffin’s work at The Elysian? How she’s thinking through speculative futures and a cooperative media system is fascinating.” — Zach“GeForce Now on Steam Deck!” — SteveSigning offOne of the reasons I like making this newsletter with all of you is that it’s a weekly reminder that, hey, actually, there’s a lot of awesome people doing awesome stuff out there on the internet. I spend a lot of my time talking to people who say AI is going to change everything, and we’re all going to just AI ourselves into oblivion and be thrilled about it — a theory I increasingly think is both wrong and horrifying.And then this week I read a blog post from the great Dan Sinker, who called this moment “the Who Cares Era, where completely disposable things are shoddily produced for people to mostly ignore.” You should read the whole thing, but here’s a bit I really loved:“Using extraordinary amounts of resources, it has the ability to create something good enough, a squint-and-it-looks-right simulacrum of normality. If you don’t care, it’s miraculous. If you do, the illusion falls apart pretty quickly. The fact that the userbase for AI chatbots has exploded exponentially demonstrates that good enough is, in fact, good enough for most people. Because most people don’t care.”I don’t think this describes everything and everyone, and neither does Sinker, but I do think it’s more true than it should be. And I increasingly think our job, maybe our method of rebellion, is to be people who care, who have taste, who like and share and look for good things, who read and watch and look at those things on purpose instead of just staring slackjawed at whatever slop is placed between the ads they hope we won’t really notice. I think there are a lot of fascinating ways that AI can be useful, but we can’t let it train us to accept slop just because it’s there. Sorry, this got more existential than I anticipated. But I’ve been thinking about it a lot, and I’m going to try and point Installer even more at the stuff that matters, made by people who care. I hope you’ll hold me to that.See you next week!See More:
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Crime blotter: Chinese national sentenced in Target iPad scam

    Shawn Kemp agrees to a plea deal in iPhone-related shooting, iCloud evidence is used in crypto indictment, and a stolen iPhone ends up in China in this week's Apple Crime Blotter.The Apple Store in Beavercreek, OhioThe latest in an occasional AppleInsider series, looking at the world of Apple-related crime. Continue Reading on AppleInsider | Discuss on our Forums
    #crime #blotter #chinese #national #sentenced
    Crime blotter: Chinese national sentenced in Target iPad scam
    Shawn Kemp agrees to a plea deal in iPhone-related shooting, iCloud evidence is used in crypto indictment, and a stolen iPhone ends up in China in this week's Apple Crime Blotter.The Apple Store in Beavercreek, OhioThe latest in an occasional AppleInsider series, looking at the world of Apple-related crime. Continue Reading on AppleInsider | Discuss on our Forums #crime #blotter #chinese #national #sentenced
    APPLEINSIDER.COM
    Crime blotter: Chinese national sentenced in Target iPad scam
    Shawn Kemp agrees to a plea deal in iPhone-related shooting, iCloud evidence is used in crypto indictment, and a stolen iPhone ends up in China in this week's Apple Crime Blotter.The Apple Store in Beavercreek, OhioThe latest in an occasional AppleInsider series, looking at the world of Apple-related crime. Continue Reading on AppleInsider | Discuss on our Forums
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Five Great Read-Later Apps to Replace Pocket

    Mozilla recently announced that it's shutting down the read-later app Pocket on July 8, 2025. If you're a fan like I was, now's the time to start looking at alternatives. You have until October 8 of this year to export your saves from Pocket, so get testing now to find the right read-later replacement for you.Use your browser's reading list feature

    Credit: Pranay Parab

    I'm a big fan of recommending simple tools, since you're more likely to use them. Browser-based reading lists definitely fall into that category. Both Chrome and Safari have built-in reading lists, which let you save articles for reading later. The Safari version saves articles for offline reading, but Chrome just loads the saved page. You can technically save articles for offline reading in Chrome, too, but the browser treats it like saving the entire webpage and stores it in files that you have to manage separately. That's a lot less convenient than just marking an article as read and deleting it off the device.Use the reading list in Safari by hitting the Share button and tapping Add to Reading List. To access saved articles on your iPhone, tap the bookmarks icon in Safari's tab bar, then the spectacles icon. In Safari for Mac, click the sidebar button next to the green button in the top-left corner of the browser's window, and select Reading List from the sidebar. To save articles offline by default on your iPhone, go to Settings > Apps > Safari, scroll to the bottom, and enable Automatically Offline. On the Mac, this is under Safari menu > Settings > Advanced > Reading List.Google Chrome's reading list is under the three-dots menu > Bookmarks and Lists > Reading List on the desktop browser. On Android, tap the three-dots menu and select Star. In Chrome for iPhone, this option is located under the three-dots menu > Add to reading list.As convenient as browser-based reading lists are, they do lack a few features when compared with proper read-later apps, such as tagging, organizing articles by topic or creating custom folders.Instapaper: The closest alternative to Pocket

    Credit: Instapaper

    Like Pocket, Instapaper was first launched in the late 2000s, and the service is still around. It offers apps for Android, iPhone, and the web, and has a generous free tier that lets you save, organize, and sync unlimited articles. The free tier shows a few ads to fund the service, though. The premium subscription costs /month or /year, and it adds useful features such as full-text search, offline reading, and removes ads.The best paid features, though, are speed reading and the ability to send articles to your Kindle. Speed reading flashes one word at a time to help you read articles faster. The send-to-Kindle feature is also quite nice to have for long reads that you'd rather view on an e-ink display.GoodLinks: An excellent read-later app for Apple devices

    Credit: GoodLinks

    GoodLinks is a great read-later app for all your Apple devices. You can purchase it off the App Store for which lets you access the app on your iPhone, iPad, and Mac. The app lets you highlight text in articles, color code your highlights, and makes it easy to find highlighted content, too. You can save articles for offline reading easily from any website, simply by using the share sheet. The app also recently added support for saving Bluesky threads, which is a nice touch. GoodLinks doesn't require you to create an account and it uses iCloud to sync your reading lists across devices.Note that the app gives you free feature updates for one year after initial purchase. After that, you can continue to use GoodLinks with the features you paid for. If you want additional features developed in the future, you can pay /year to access that. The app already has almost all the features you'd need, though, so this business model isn't going to lock out any essentials.Readwise Reader: The best read-later service for power users

    Credit: Readwise

    Some people want a read-later service that can host multiple types of content, including videos, text, social media posts, newsletters, and even entire books. Readwise Reader is designed for just that. It lets you highlight text in any text file, and even transcripts of YouTube videos, and syncs those highlights to all your devices. You can even send highlights to apps such as Obsidian or Notion. The app generates a "daily review" for you, too, which is a quick digest of your saved articles that can help you quickly go through important reads.The service also gives you an email address to subscribe to newsletters, and you can also use it to follow RSS feeds of the publications you love. Readwise Reader is an all-in-one app that offers a lot more than just a read-later service, which is great for power users, but it can be overwhelming for someone who just wants to save the occasional article for weekend reading. Readwise Reader has a 30-day free trial, after which it costs /month.Matter: For those who value newsletters above all else

    Credit: Matter

    Matter is a premium read-later app for the iPhone, iPad, and the web. While it has a free tier, almost all of its best features are in the paid subscription. This service also gives you an email address, which you can use to subscribe to newsletters and have them sent directly to Matter. I prefer this approach over having newsletters delivered to my already crowded email inbox, and Matter's choice of fonts and distraction-free reading experience make it even better. If you're a paying subscriber, Matter can also scan your Gmail inbox and automatically pick up newsletters from there. To get you started, this service has a curated list of articles for you to read, just like Pocket, which may appeal to some. Other useful read-later servicesThere are a few other useful read-later apps and services that you might want to check out. These aren't as well-rounded as the picks above, but they're worth checking out for specific use cases.Send to Kindle: Amazon offers many ways to easily send files to your Kindle, but the Chrome extension is probably the smoothest way to use your e-reader as a read-later device.Wallabag: This is an open-source read-later service that costs /year and lets you self-host the service, too. It has apps for Android and iPhone and native clients for Kindle and Kobo, so you can easily access saved articles.Flyleaf: This is one of the best new read-later apps for Apple devices, and its free tier offers all the basics. There is an optional paid subscriptionif you want tagging and custom color schemes.
    #five #great #readlater #apps #replace
    Five Great Read-Later Apps to Replace Pocket
    Mozilla recently announced that it's shutting down the read-later app Pocket on July 8, 2025. If you're a fan like I was, now's the time to start looking at alternatives. You have until October 8 of this year to export your saves from Pocket, so get testing now to find the right read-later replacement for you.Use your browser's reading list feature Credit: Pranay Parab I'm a big fan of recommending simple tools, since you're more likely to use them. Browser-based reading lists definitely fall into that category. Both Chrome and Safari have built-in reading lists, which let you save articles for reading later. The Safari version saves articles for offline reading, but Chrome just loads the saved page. You can technically save articles for offline reading in Chrome, too, but the browser treats it like saving the entire webpage and stores it in files that you have to manage separately. That's a lot less convenient than just marking an article as read and deleting it off the device.Use the reading list in Safari by hitting the Share button and tapping Add to Reading List. To access saved articles on your iPhone, tap the bookmarks icon in Safari's tab bar, then the spectacles icon. In Safari for Mac, click the sidebar button next to the green button in the top-left corner of the browser's window, and select Reading List from the sidebar. To save articles offline by default on your iPhone, go to Settings > Apps > Safari, scroll to the bottom, and enable Automatically Offline. On the Mac, this is under Safari menu > Settings > Advanced > Reading List.Google Chrome's reading list is under the three-dots menu > Bookmarks and Lists > Reading List on the desktop browser. On Android, tap the three-dots menu and select Star. In Chrome for iPhone, this option is located under the three-dots menu > Add to reading list.As convenient as browser-based reading lists are, they do lack a few features when compared with proper read-later apps, such as tagging, organizing articles by topic or creating custom folders.Instapaper: The closest alternative to Pocket Credit: Instapaper Like Pocket, Instapaper was first launched in the late 2000s, and the service is still around. It offers apps for Android, iPhone, and the web, and has a generous free tier that lets you save, organize, and sync unlimited articles. The free tier shows a few ads to fund the service, though. The premium subscription costs /month or /year, and it adds useful features such as full-text search, offline reading, and removes ads.The best paid features, though, are speed reading and the ability to send articles to your Kindle. Speed reading flashes one word at a time to help you read articles faster. The send-to-Kindle feature is also quite nice to have for long reads that you'd rather view on an e-ink display.GoodLinks: An excellent read-later app for Apple devices Credit: GoodLinks GoodLinks is a great read-later app for all your Apple devices. You can purchase it off the App Store for which lets you access the app on your iPhone, iPad, and Mac. The app lets you highlight text in articles, color code your highlights, and makes it easy to find highlighted content, too. You can save articles for offline reading easily from any website, simply by using the share sheet. The app also recently added support for saving Bluesky threads, which is a nice touch. GoodLinks doesn't require you to create an account and it uses iCloud to sync your reading lists across devices.Note that the app gives you free feature updates for one year after initial purchase. After that, you can continue to use GoodLinks with the features you paid for. If you want additional features developed in the future, you can pay /year to access that. The app already has almost all the features you'd need, though, so this business model isn't going to lock out any essentials.Readwise Reader: The best read-later service for power users Credit: Readwise Some people want a read-later service that can host multiple types of content, including videos, text, social media posts, newsletters, and even entire books. Readwise Reader is designed for just that. It lets you highlight text in any text file, and even transcripts of YouTube videos, and syncs those highlights to all your devices. You can even send highlights to apps such as Obsidian or Notion. The app generates a "daily review" for you, too, which is a quick digest of your saved articles that can help you quickly go through important reads.The service also gives you an email address to subscribe to newsletters, and you can also use it to follow RSS feeds of the publications you love. Readwise Reader is an all-in-one app that offers a lot more than just a read-later service, which is great for power users, but it can be overwhelming for someone who just wants to save the occasional article for weekend reading. Readwise Reader has a 30-day free trial, after which it costs /month.Matter: For those who value newsletters above all else Credit: Matter Matter is a premium read-later app for the iPhone, iPad, and the web. While it has a free tier, almost all of its best features are in the paid subscription. This service also gives you an email address, which you can use to subscribe to newsletters and have them sent directly to Matter. I prefer this approach over having newsletters delivered to my already crowded email inbox, and Matter's choice of fonts and distraction-free reading experience make it even better. If you're a paying subscriber, Matter can also scan your Gmail inbox and automatically pick up newsletters from there. To get you started, this service has a curated list of articles for you to read, just like Pocket, which may appeal to some. Other useful read-later servicesThere are a few other useful read-later apps and services that you might want to check out. These aren't as well-rounded as the picks above, but they're worth checking out for specific use cases.Send to Kindle: Amazon offers many ways to easily send files to your Kindle, but the Chrome extension is probably the smoothest way to use your e-reader as a read-later device.Wallabag: This is an open-source read-later service that costs /year and lets you self-host the service, too. It has apps for Android and iPhone and native clients for Kindle and Kobo, so you can easily access saved articles.Flyleaf: This is one of the best new read-later apps for Apple devices, and its free tier offers all the basics. There is an optional paid subscriptionif you want tagging and custom color schemes. #five #great #readlater #apps #replace
    LIFEHACKER.COM
    Five Great Read-Later Apps to Replace Pocket
    Mozilla recently announced that it's shutting down the read-later app Pocket on July 8, 2025. If you're a fan like I was, now's the time to start looking at alternatives. You have until October 8 of this year to export your saves from Pocket, so get testing now to find the right read-later replacement for you.Use your browser's reading list feature Credit: Pranay Parab I'm a big fan of recommending simple tools, since you're more likely to use them. Browser-based reading lists definitely fall into that category. Both Chrome and Safari have built-in reading lists, which let you save articles for reading later. The Safari version saves articles for offline reading, but Chrome just loads the saved page. You can technically save articles for offline reading in Chrome, too, but the browser treats it like saving the entire webpage and stores it in files that you have to manage separately. That's a lot less convenient than just marking an article as read and deleting it off the device.Use the reading list in Safari by hitting the Share button and tapping Add to Reading List. To access saved articles on your iPhone, tap the bookmarks icon in Safari's tab bar, then the spectacles icon. In Safari for Mac, click the sidebar button next to the green button in the top-left corner of the browser's window, and select Reading List from the sidebar. To save articles offline by default on your iPhone, go to Settings > Apps > Safari, scroll to the bottom, and enable Automatically Save Offline. On the Mac, this is under Safari menu > Settings > Advanced > Reading List.Google Chrome's reading list is under the three-dots menu > Bookmarks and Lists > Reading List on the desktop browser. On Android, tap the three-dots menu and select Star. In Chrome for iPhone, this option is located under the three-dots menu > Add to reading list.As convenient as browser-based reading lists are, they do lack a few features when compared with proper read-later apps, such as tagging, organizing articles by topic or creating custom folders.Instapaper: The closest alternative to Pocket Credit: Instapaper Like Pocket, Instapaper was first launched in the late 2000s, and the service is still around. It offers apps for Android, iPhone, and the web, and has a generous free tier that lets you save, organize, and sync unlimited articles. The free tier shows a few ads to fund the service, though. The premium subscription costs $6/month or $60/year, and it adds useful features such as full-text search, offline reading, and removes ads.The best paid features, though, are speed reading and the ability to send articles to your Kindle. Speed reading flashes one word at a time to help you read articles faster. The send-to-Kindle feature is also quite nice to have for long reads that you'd rather view on an e-ink display.GoodLinks: An excellent read-later app for Apple devices Credit: GoodLinks GoodLinks is a great read-later app for all your Apple devices. You can purchase it off the App Store for $10, which lets you access the app on your iPhone, iPad, and Mac. The app lets you highlight text in articles, color code your highlights, and makes it easy to find highlighted content, too. You can save articles for offline reading easily from any website, simply by using the share sheet. The app also recently added support for saving Bluesky threads, which is a nice touch. GoodLinks doesn't require you to create an account and it uses iCloud to sync your reading lists across devices.Note that the app gives you free feature updates for one year after initial purchase. After that, you can continue to use GoodLinks with the features you paid for. If you want additional features developed in the future, you can pay $5/year to access that. The app already has almost all the features you'd need, though, so this business model isn't going to lock out any essentials.Readwise Reader: The best read-later service for power users Credit: Readwise Some people want a read-later service that can host multiple types of content, including videos, text, social media posts, newsletters, and even entire books. Readwise Reader is designed for just that. It lets you highlight text in any text file, and even transcripts of YouTube videos, and syncs those highlights to all your devices. You can even send highlights to apps such as Obsidian or Notion. The app generates a "daily review" for you, too, which is a quick digest of your saved articles that can help you quickly go through important reads.The service also gives you an email address to subscribe to newsletters, and you can also use it to follow RSS feeds of the publications you love. Readwise Reader is an all-in-one app that offers a lot more than just a read-later service, which is great for power users, but it can be overwhelming for someone who just wants to save the occasional article for weekend reading. Readwise Reader has a 30-day free trial, after which it costs $10/month.Matter: For those who value newsletters above all else Credit: Matter Matter is a premium read-later app for the iPhone, iPad, and the web. While it has a free tier, almost all of its best features are in the paid subscription ($15/month or $80/year). This service also gives you an email address, which you can use to subscribe to newsletters and have them sent directly to Matter. I prefer this approach over having newsletters delivered to my already crowded email inbox, and Matter's choice of fonts and distraction-free reading experience make it even better. If you're a paying subscriber, Matter can also scan your Gmail inbox and automatically pick up newsletters from there. To get you started, this service has a curated list of articles for you to read, just like Pocket, which may appeal to some. Other useful read-later servicesThere are a few other useful read-later apps and services that you might want to check out. These aren't as well-rounded as the picks above, but they're worth checking out for specific use cases.Send to Kindle: Amazon offers many ways to easily send files to your Kindle, but the Chrome extension is probably the smoothest way to use your e-reader as a read-later device.Wallabag: This is an open-source read-later service that costs $12.5/year and lets you self-host the service, too. It has apps for Android and iPhone and native clients for Kindle and Kobo, so you can easily access saved articles.Flyleaf: This is one of the best new read-later apps for Apple devices, and its free tier offers all the basics. There is an optional paid subscription ($17/year) if you want tagging and custom color schemes.
    0 Comentários 0 Compartilhamentos 0 Anterior
  • I Spoke With Some of the Most Private People Online, and Here's What They Sacrifice

    How far would you go to keep yourself private online? There’s little doubt that advances in technology over the past three decades have eroded traditional concepts around privacy and security: It was once unthinkable to voluntarily invite big companies to track your every move and decision—now, we happily let them in exchange for the digital goods and services we rely on. Most people these days either tolerate these privacy intrusions or outright don’t care about them. But there’s a growing movement that believes it’s time to claim our privacy back. Some are working piecemeal, blocking trackers and reducing permissions where they can, while not totally ditching modern digital society as a whole. Others, however, are as hardcore as can be—a modern equivalent of "going off the grid."  We put out a call looking for the latter—people who are going to great lengths to protect their privacy in today’s mass surveillance world. We received a number of insightful, fascinating, and unique situations, but for this piece, I want to highlight four specific perspectives: "Ed," "Jane," "Mark," and "Jay."Ed is "ruthless" with app choices and permissionsThe first respondent, I’ll call Ed, since their privacy journey began with the Edward Snowden leaks: “I'd known something was likely up…as early as 2006I remember headlines about AT&T possibly spying, but high school me didn't take it too seriously at the time. The Snowden leaks, when I was in college, really opened my eyes. Ever since, I've taken steps to protect my privacy.”Ed says the biggest step they’ve taken towards a digitally private life has been their Proton account. If you’re not aware, Proton is a company that offers apps designed for privacy. Their email service, Proton Mail, is the most famous of the company’s products, but Proton makes other apps as well. Ed uses many of them, including Proton VPN, Proton Calendar, and Proton Drive. Ed pays for Proton Ultimate, which costs them nearly every two years. You don’t have to pay for Proton, but your experience is much more limited. That’s not totally dissimilar to Google’s offers, which gives you more features if you pay, but most people can definitely get by with a free Google Account. I'm not so sure the reverse is true. Speaking of Google, Ed does have a Google Account, but rarely logs into it. They don’t keep anything attached to it, however—Ed stores all files, for example, in Proton Drive or Tresoirt.Ed uses SimpleLogin for throwaway email addresses. That’s not just for the times Ed wants to avoid giving their email address to someone. According to them, they use an alias anytime an organization asks for their email, and frequently delete it when it’s no longer useful. Each online purchase gets its own alias, and that alias is deleted once the purchase is complete. Whenever Ed travels, they use an alias for any flights, hotels, and rental cars they use. Once the trip is up, they delete the alias. If one of those aliases receives a spam message, they delete it as well.Ed’s smartphone of choice is iPhone, and although Apple arguably has the best reputation for privacy in big tech, Ed is no fan: “Apple is no bastion of privacy of course, but they seem to be the least-worst of the big tech companies.” Ed doesn’t use iCloud for any backups: Any iPhone files are kept in Tresorit. That iPhone, of course, contains apps. But each app is there for a reason, and no app gets access to permissions unless it requires it: “I'm ruthless about apps and app permissions. If I'm not going to use the app regularly, I uninstall it. I grant only those permissions I think the app reasonably needs.” Ed protects his mobile internet traffic with Proton VPN, and only accesses the web via Firefox Focus, a special version of Firefox designed for privacy. Location services are always off on Ed’s iPhone, unless they’re using Apple Maps for navigation. Once they arrive at their destination, Ed disables location services again. They also have an interesting trick for getting back home without revealing their actual address:  “Additionally, when I'm navigating home, I don't enter my home address. I enter the address down the street just as an extra layer so I'm not entering my actual home address…I'll end navigation and turn off location while still driving…if I know the rest of the way home myself."Most of us deal regularlywith spam calls. Not Ed: They use the “Silence Unknown Callers” setting on iOS to send all numbers not in the Contacts app to voicemail. They then review all voicemails, and if they didn’t leave a message, they block the number. Our initial call out for this piece referenced how using a VPN can sometimes block incoming phone calls, but Ed isn’t bothered by that: “Since most calls these days are scams or telemarketing, and most people I do want to talk to aren't going to call me anyway, I see this as more of a feature than a bug.” For their desktop computing needs, Ed uses Windows. They admit they aren’t privacy experts when it comes to Microsoft’s OS, but they do what they can, including changing all privacy settings and uninstalling all programs they don’t use.They also run a clean version of Windows 11 after following Lifehacker’s guide. Firefox is their go-to PC browser, and they use a variety of extensions, including:ClearURLs: removes trackers from links.Decentraleyes: blocks data requests from third-party networks. Disconnect: blocks trackers from "thousands" of third-party sites.Firefox Multi-Account Containers: separates your browsing into siloed "containers" to isolate each session from one another.PopUpOFF: blocks pop-ups, overlays, and cookie alerts.Privacy Badger: blocks invisible trackers.Proton VPN: Proton's Firefox add-on for its VPN.uBlock Origin: popular content blocker.Ed didn’t say how much of an impact this array of extensions and settings has on their browsing, save for YouTube, which they admit does sometimes give them trouble. However, Ed has workarounds: “When YouTube wants me to 'sign in to confirm you're not a bot,' changing VPN servers usually does the trick.” Ed also uses the audible clues for ReCAPTCHA prompts, rather than the pictures, since they don’t want to help train Google’s “braindead AI.”Ed deleted all their social media accounts, including Facebook, X, Instagram, and LinkedIn. Though they’ve never had TikTok installed on their phone, they will watch it in Firefox when a friend sends them a video. Jane uses an open-source smartphone OS designed for privacyWhile Edward Snowden may have kicked off Ed’s interest in personal privacy, "Jane" has many strong beliefs motivating their desire for privacy. They are concerned about data brokers and Meta’s practices of tracking internet activity, and how these companies build profiles based on that data to sell to third-parties; they’re concerned about the possibility of telecommunication companies tracking our locations via cellular towers; they worry about US law enforcement and agencies reviewing citizens’ social media accounts accounts and tracking people. Their focus on privacy is fueled by true concern for their own well-being, not only the value of privacy as a concept.      Jane uses a VPN on all of their devices. Instead of Proton, however, Jane opts for Mullvad. They enable ad and tracker blocking, as well as a kill switch, which blocks your internet if you lose connection with the VPN—thus protecting your connection from being leaked out of the secure network.I’m a big advocate for strong and unique passwords and proper password management, but Jane definitely beats me when it comes to secure credentials. Jane uses six to eight-word passphrases generated by diceware, a tactic that chooses words based on dice rolls. Something like this diceware generator will roll a die five times, then find a word in a bank based on that five-digit number. You can repeat this as many times as you want to come up with a passphrase built up with random words. Jane saves all of their passphrases to a password manager, except for the ones for important accounts, like their bank. They commit those to memory, just in case someone breaches their password manager.     Like Ed, Jane uses Mullvad, but instead of just using their VPN, they opt for the web browser, which has those protections built in. Mullvad’s strict privacy settings break persistent logins on websites, so any sites Jane wants to stay logged in on are kept in Brave browser. For both Mullvad and Brave, Jane uses uBlock Origin.“From time-to-time I do run into sites that will block access due to being on a VPN or blocking ads and trackers. Instead of disablingVPN completely, switching my connection to one of Mullvad's rented servers instead of ones they own usually helps. Barring that, I occasionally go intoand temporarily whitelist a needed. This works for me to get around site blocks most of the time.”  Jane uses a Mac, and configured macOS based on various privacy guides. But instead of an iPhone, Jane opts for a Google Pixel. That might surprise readers who assumed hardcore privacy enthusiasts would break away from Google entirely. But X doesn’t run Android: Instead, they installed GrapheneOS on their Pixel, an open-source OS designed for privacy. Following a restart, Jane configured the Pixel to only unlock with a seven-word dice passphrase—for general use, they use a fingerprint scan and a six-digit PIN. If the don’t unlock their Pixel for a while, their phone automatically reboots to put it back into this “First Unlock” state. They also keep airplane mode on at all times to disable the phone’s radio communications, but maintain a wifi connection with timed automatic Bluetooth and wireless disabling. Jane also deleted all their social media accounts after downloading all data associated with those platforms.Mark uses phone and credit card masks“Mark” is perhaps the least hardcore of the respondents in this story, but that makes their experience both interesting and relatable. Unlike most of the people we spoke to, Mark is still on Facebook and Instagram. That’s due to their job, which requires them to be on the platform, but they’ve been “systematically” deleting everything they can over their 19-year Facebook history and saving the data to an external hard drive. Mark doesn’t follow anything that isn’t relevant to their job, and only uses Facebook and Instagram inside the DuckDuckGo browser. They don’t react to posts they see, and following their privacy tactics, Facebook doesn’t show them relevant ads anymore. “If there is an ad I'm actually interested in I'll search it up in a different browser rather than click it.”Mark has had four Google Accounts in their time online, and has deleted two so far. Like Facebook, they have to use Google for their job, but they delegate all their work to Chrome. All other browsing runs through Firefox, DuckDuckGo, or Tor. The latter is perhaps best known for being the browser of choice for browsing the dark web, but what makes it great for that is also what makes it a great choice for private browsing.Unlike others in this story, Mark hasn’t de-Googled themselves completely. In addition to using Chrome for work, Mark has a phone mask through Google, and has their contacts, calendar, and maps tied to the company—though they are moving away from Google as much as they can. They've been running through their old emails to find and delete outdated accounts they no longer use. Any accounts they do need now use an email mask that forwards to a Mailfence account, an encrypted email service.   Mark was the only respondent to talk about entertainment in relation to privacy: “I've also been switching to physical media over streaming, so buying CDs and DVDs, locally as much as possible. I'm lucky to have a local music store and a local bookstore...one of the owners of our bookstore wrote a book on how to resist Amazon and why. Any book I want, I can either order through them or on Alibris. For music, I use our local record store and Discogs.”When shopping online, Mark uses a credit card mask, but still uses the card itself when shopping in person. They want to start using a credit card mask in retail locations like Janet Vertesi, an associate professor of sociology at Princeton University, but they haven’t quite gotten there yet.   What really piqued my interest most about Mark, however, wasn’t their perspective on their own privacy concerns, but the concerns around the privacy of their kids: “They each have a Gmail, two of them have Snapchat. Their schools use Gaggle and Google to spy on them. I don't even know how to start disconnecting them from all this...I was a kid during the wild west of the internet and this feels like getting back to my roots. My kids are end users who understand apps and touchscreens, not torrenting their music or coding a basic website.I feel like Big Data has its grip on the kids already and I don't have a guidebook on navigating that as a parent.”  Mark’s current focus on their kids’ privacy includes deleting their health data from their local health system. That’s in part due to a data breach impacting the health system, but also the language about autism from Robert F. Kennedy Jr., the current Secretary of Health and Human Services.Jay de-googled their life and uses a VoIP phone number"Jay's" origin story with personal privacy dates back to 2017. That year, Equifax suffered a major hack, where nearly 148 million Americans had sensitive data stolen and weren’t notified about the breach for months. Jay was frustrated: You don’t choose to give your data to Equifax, or any credit bureau, and yet so many people lost their data. They also felt that companies were not properly held responsible for these events, and lawmakers were simply too out of touch to do what was necessary to protect citizens’ privacy, so they took it upon themselves to protect their own data. Ever since this incident, Jay freezes their credit: “It was frustratingly difficult back then, but nowadays, it is very easy...The freeze will not allow anyone to pull credit for large purchases in your name, even if they have your social security number. I decided I wanted to pursue some privacy for the things I do have a choice over.”  From here, Jay de-googled their life, including both Google Search as well as YouTube. They’ve found no issue with using alternative search engines, and, in fact, sees Google getting worse, as it tries to show you results based on what it thinks it knows about you, not what is most relevant to your actual query: “The internet was supposed to be a place you went to find information, not where you became the information that companies take instead."Jay uses tools to prevent fingerprinting, where companies identify you and track you across the internet, but worries that going too far with things like ad blockers puts a target on your back as well. Jay chooses to pick “a couple of effective tools,” and runs with those.For their smartphone needs, Jay goes with Apple. Like Ed, Jay doesn’t believe Apple is perfect, and even considers their privacy policies a bit of a gimmick, but sees them as the better alternative to Android. Jay likes the security of the App Store, and the array of privacy features in both Safari and Apple Accounts as a whole. They highlight Safari’s “Advanced Tracking and Fingerprinting Protection” feature, which helps block trackers as you browse the web; iCloud’s Private Relay, which hides your IP address; and “Hide My Email,” which generates email aliases you can share with others without giving your true email address away.Most of us are plagued with spam calls, but following the Robinhood data breach in 2021, Jay started receiving a flood of them. They decided to change their phone number and made a point of never sharing it with businesses. For the times they need to give out their number to parties they don’t trust, they use a number generated by My Sudo, which, for per year, gives them a VoIPphone number. It works with most services that rely on SMS, but it won’t function for two-factor authentication.My Sudo lets you change your number for an additional so if Jay’s number ever was compromised or started receiving too much spam, they could swap it.        Jay, like many respondents, deleted all social media services: “It has its place in society for a lot of people, and is no doubt a great way to connect. However, I found that the fear of deleting it was a lot worse than actually deleting it. The people you care about won’t forget you exist.” That said, Jay doesn't mind any of the obstacles this lifestyle does throw their way: “It is a challenging topic, as most people consider you a little bit 'out there' if you take steps to make your life a little less convenient, but more private. The modern world sells you convenience, while pretending it is free, and harvesting your data for so much more than you actually get out of your relationship to them.”      What it takes to be private on the modern internetThere's no one way to tackle personal privacy. Every one of the respondents to our query had something unique about their approach, and many had different motivations behind why they were so concerned about their privacy.There are plenty of common through lines, of course. Most privacy people love Proton, which makes sense. Proton seems to be the only company that offers a suite of apps most closely resembling Google's while also prioritizing privacy. If you want your email, calendar, word processor, and even your VPN all tied up nicely under one privacy-focused umbrella, that's Proton. But not everyone wants an ecosystem, either. That's why you see respondents using other VPNs, like Mullvad, or other private storage options, like Tresorit. These apps and services exist—they might just not be owned by one company, like Apple or Google.Google and Meta are more commonalities, in that most privacy enthusiasts ditch them entirely. Some, like Mark, haven't been able to fully shake off these data-hungry companies. In Mark's case, that's because they need these platforms for work. But while most hardcore privacy people delete their Google and Meta accounts, most of us have trouble de-Googling and de-Metaing our digital lives. In general, though, the keys to privacy success include the following: Use a VPN to protect your internet traffic; prioritize privacy in your web browser, both through the browser itself, as well as extensions that block ads and protect your traffic; shield your sensitive information whenever possible, by using email aliases, alternate phone numbers, or credit card masks; use strong and unique passwords for all accounts, and store those passwords in a secure password manager; use two-factor authentication whenever possible; and stick to end-to-end encrypted chat apps to communicate with others. While there's always more you can do, that's the perfect storm to keep your digital life as private as reasonably possible. Some might read through the examples here and see steps that are too much effort to be worth it. It might seem out of reach to ditch Gmail and Instagram, break certain websites, and force your friends and family to learn new numbers and email addresses to protect your privacy, especially if you don't feel your privacy has that much of an impact on your life. But even if you aren't sold on the concept of privacy itself, there are real-world results from sticking with these methods. Jay no longer receives spam calls and texts; Mark no longer sees ads that are freakishly relevant to their likes. It's a lifestyle change, to be sure, but it's not just to serve some concept of privacy. You can see results by changing the way you interact with the internet, all without having to actually disconnect from the internet, and, by extension, the world at large.
    #spoke #with #some #most #private
    I Spoke With Some of the Most Private People Online, and Here's What They Sacrifice
    How far would you go to keep yourself private online? There’s little doubt that advances in technology over the past three decades have eroded traditional concepts around privacy and security: It was once unthinkable to voluntarily invite big companies to track your every move and decision—now, we happily let them in exchange for the digital goods and services we rely on. Most people these days either tolerate these privacy intrusions or outright don’t care about them. But there’s a growing movement that believes it’s time to claim our privacy back. Some are working piecemeal, blocking trackers and reducing permissions where they can, while not totally ditching modern digital society as a whole. Others, however, are as hardcore as can be—a modern equivalent of "going off the grid."  We put out a call looking for the latter—people who are going to great lengths to protect their privacy in today’s mass surveillance world. We received a number of insightful, fascinating, and unique situations, but for this piece, I want to highlight four specific perspectives: "Ed," "Jane," "Mark," and "Jay."Ed is "ruthless" with app choices and permissionsThe first respondent, I’ll call Ed, since their privacy journey began with the Edward Snowden leaks: “I'd known something was likely up…as early as 2006I remember headlines about AT&T possibly spying, but high school me didn't take it too seriously at the time. The Snowden leaks, when I was in college, really opened my eyes. Ever since, I've taken steps to protect my privacy.”Ed says the biggest step they’ve taken towards a digitally private life has been their Proton account. If you’re not aware, Proton is a company that offers apps designed for privacy. Their email service, Proton Mail, is the most famous of the company’s products, but Proton makes other apps as well. Ed uses many of them, including Proton VPN, Proton Calendar, and Proton Drive. Ed pays for Proton Ultimate, which costs them nearly every two years. You don’t have to pay for Proton, but your experience is much more limited. That’s not totally dissimilar to Google’s offers, which gives you more features if you pay, but most people can definitely get by with a free Google Account. I'm not so sure the reverse is true. Speaking of Google, Ed does have a Google Account, but rarely logs into it. They don’t keep anything attached to it, however—Ed stores all files, for example, in Proton Drive or Tresoirt.Ed uses SimpleLogin for throwaway email addresses. That’s not just for the times Ed wants to avoid giving their email address to someone. According to them, they use an alias anytime an organization asks for their email, and frequently delete it when it’s no longer useful. Each online purchase gets its own alias, and that alias is deleted once the purchase is complete. Whenever Ed travels, they use an alias for any flights, hotels, and rental cars they use. Once the trip is up, they delete the alias. If one of those aliases receives a spam message, they delete it as well.Ed’s smartphone of choice is iPhone, and although Apple arguably has the best reputation for privacy in big tech, Ed is no fan: “Apple is no bastion of privacy of course, but they seem to be the least-worst of the big tech companies.” Ed doesn’t use iCloud for any backups: Any iPhone files are kept in Tresorit. That iPhone, of course, contains apps. But each app is there for a reason, and no app gets access to permissions unless it requires it: “I'm ruthless about apps and app permissions. If I'm not going to use the app regularly, I uninstall it. I grant only those permissions I think the app reasonably needs.” Ed protects his mobile internet traffic with Proton VPN, and only accesses the web via Firefox Focus, a special version of Firefox designed for privacy. Location services are always off on Ed’s iPhone, unless they’re using Apple Maps for navigation. Once they arrive at their destination, Ed disables location services again. They also have an interesting trick for getting back home without revealing their actual address:  “Additionally, when I'm navigating home, I don't enter my home address. I enter the address down the street just as an extra layer so I'm not entering my actual home address…I'll end navigation and turn off location while still driving…if I know the rest of the way home myself."Most of us deal regularlywith spam calls. Not Ed: They use the “Silence Unknown Callers” setting on iOS to send all numbers not in the Contacts app to voicemail. They then review all voicemails, and if they didn’t leave a message, they block the number. Our initial call out for this piece referenced how using a VPN can sometimes block incoming phone calls, but Ed isn’t bothered by that: “Since most calls these days are scams or telemarketing, and most people I do want to talk to aren't going to call me anyway, I see this as more of a feature than a bug.” For their desktop computing needs, Ed uses Windows. They admit they aren’t privacy experts when it comes to Microsoft’s OS, but they do what they can, including changing all privacy settings and uninstalling all programs they don’t use.They also run a clean version of Windows 11 after following Lifehacker’s guide. Firefox is their go-to PC browser, and they use a variety of extensions, including:ClearURLs: removes trackers from links.Decentraleyes: blocks data requests from third-party networks. Disconnect: blocks trackers from "thousands" of third-party sites.Firefox Multi-Account Containers: separates your browsing into siloed "containers" to isolate each session from one another.PopUpOFF: blocks pop-ups, overlays, and cookie alerts.Privacy Badger: blocks invisible trackers.Proton VPN: Proton's Firefox add-on for its VPN.uBlock Origin: popular content blocker.Ed didn’t say how much of an impact this array of extensions and settings has on their browsing, save for YouTube, which they admit does sometimes give them trouble. However, Ed has workarounds: “When YouTube wants me to 'sign in to confirm you're not a bot,' changing VPN servers usually does the trick.” Ed also uses the audible clues for ReCAPTCHA prompts, rather than the pictures, since they don’t want to help train Google’s “braindead AI.”Ed deleted all their social media accounts, including Facebook, X, Instagram, and LinkedIn. Though they’ve never had TikTok installed on their phone, they will watch it in Firefox when a friend sends them a video. Jane uses an open-source smartphone OS designed for privacyWhile Edward Snowden may have kicked off Ed’s interest in personal privacy, "Jane" has many strong beliefs motivating their desire for privacy. They are concerned about data brokers and Meta’s practices of tracking internet activity, and how these companies build profiles based on that data to sell to third-parties; they’re concerned about the possibility of telecommunication companies tracking our locations via cellular towers; they worry about US law enforcement and agencies reviewing citizens’ social media accounts accounts and tracking people. Their focus on privacy is fueled by true concern for their own well-being, not only the value of privacy as a concept.      Jane uses a VPN on all of their devices. Instead of Proton, however, Jane opts for Mullvad. They enable ad and tracker blocking, as well as a kill switch, which blocks your internet if you lose connection with the VPN—thus protecting your connection from being leaked out of the secure network.I’m a big advocate for strong and unique passwords and proper password management, but Jane definitely beats me when it comes to secure credentials. Jane uses six to eight-word passphrases generated by diceware, a tactic that chooses words based on dice rolls. Something like this diceware generator will roll a die five times, then find a word in a bank based on that five-digit number. You can repeat this as many times as you want to come up with a passphrase built up with random words. Jane saves all of their passphrases to a password manager, except for the ones for important accounts, like their bank. They commit those to memory, just in case someone breaches their password manager.     Like Ed, Jane uses Mullvad, but instead of just using their VPN, they opt for the web browser, which has those protections built in. Mullvad’s strict privacy settings break persistent logins on websites, so any sites Jane wants to stay logged in on are kept in Brave browser. For both Mullvad and Brave, Jane uses uBlock Origin.“From time-to-time I do run into sites that will block access due to being on a VPN or blocking ads and trackers. Instead of disablingVPN completely, switching my connection to one of Mullvad's rented servers instead of ones they own usually helps. Barring that, I occasionally go intoand temporarily whitelist a needed. This works for me to get around site blocks most of the time.”  Jane uses a Mac, and configured macOS based on various privacy guides. But instead of an iPhone, Jane opts for a Google Pixel. That might surprise readers who assumed hardcore privacy enthusiasts would break away from Google entirely. But X doesn’t run Android: Instead, they installed GrapheneOS on their Pixel, an open-source OS designed for privacy. Following a restart, Jane configured the Pixel to only unlock with a seven-word dice passphrase—for general use, they use a fingerprint scan and a six-digit PIN. If the don’t unlock their Pixel for a while, their phone automatically reboots to put it back into this “First Unlock” state. They also keep airplane mode on at all times to disable the phone’s radio communications, but maintain a wifi connection with timed automatic Bluetooth and wireless disabling. Jane also deleted all their social media accounts after downloading all data associated with those platforms.Mark uses phone and credit card masks“Mark” is perhaps the least hardcore of the respondents in this story, but that makes their experience both interesting and relatable. Unlike most of the people we spoke to, Mark is still on Facebook and Instagram. That’s due to their job, which requires them to be on the platform, but they’ve been “systematically” deleting everything they can over their 19-year Facebook history and saving the data to an external hard drive. Mark doesn’t follow anything that isn’t relevant to their job, and only uses Facebook and Instagram inside the DuckDuckGo browser. They don’t react to posts they see, and following their privacy tactics, Facebook doesn’t show them relevant ads anymore. “If there is an ad I'm actually interested in I'll search it up in a different browser rather than click it.”Mark has had four Google Accounts in their time online, and has deleted two so far. Like Facebook, they have to use Google for their job, but they delegate all their work to Chrome. All other browsing runs through Firefox, DuckDuckGo, or Tor. The latter is perhaps best known for being the browser of choice for browsing the dark web, but what makes it great for that is also what makes it a great choice for private browsing.Unlike others in this story, Mark hasn’t de-Googled themselves completely. In addition to using Chrome for work, Mark has a phone mask through Google, and has their contacts, calendar, and maps tied to the company—though they are moving away from Google as much as they can. They've been running through their old emails to find and delete outdated accounts they no longer use. Any accounts they do need now use an email mask that forwards to a Mailfence account, an encrypted email service.   Mark was the only respondent to talk about entertainment in relation to privacy: “I've also been switching to physical media over streaming, so buying CDs and DVDs, locally as much as possible. I'm lucky to have a local music store and a local bookstore...one of the owners of our bookstore wrote a book on how to resist Amazon and why. Any book I want, I can either order through them or on Alibris. For music, I use our local record store and Discogs.”When shopping online, Mark uses a credit card mask, but still uses the card itself when shopping in person. They want to start using a credit card mask in retail locations like Janet Vertesi, an associate professor of sociology at Princeton University, but they haven’t quite gotten there yet.   What really piqued my interest most about Mark, however, wasn’t their perspective on their own privacy concerns, but the concerns around the privacy of their kids: “They each have a Gmail, two of them have Snapchat. Their schools use Gaggle and Google to spy on them. I don't even know how to start disconnecting them from all this...I was a kid during the wild west of the internet and this feels like getting back to my roots. My kids are end users who understand apps and touchscreens, not torrenting their music or coding a basic website.I feel like Big Data has its grip on the kids already and I don't have a guidebook on navigating that as a parent.”  Mark’s current focus on their kids’ privacy includes deleting their health data from their local health system. That’s in part due to a data breach impacting the health system, but also the language about autism from Robert F. Kennedy Jr., the current Secretary of Health and Human Services.Jay de-googled their life and uses a VoIP phone number"Jay's" origin story with personal privacy dates back to 2017. That year, Equifax suffered a major hack, where nearly 148 million Americans had sensitive data stolen and weren’t notified about the breach for months. Jay was frustrated: You don’t choose to give your data to Equifax, or any credit bureau, and yet so many people lost their data. They also felt that companies were not properly held responsible for these events, and lawmakers were simply too out of touch to do what was necessary to protect citizens’ privacy, so they took it upon themselves to protect their own data. Ever since this incident, Jay freezes their credit: “It was frustratingly difficult back then, but nowadays, it is very easy...The freeze will not allow anyone to pull credit for large purchases in your name, even if they have your social security number. I decided I wanted to pursue some privacy for the things I do have a choice over.”  From here, Jay de-googled their life, including both Google Search as well as YouTube. They’ve found no issue with using alternative search engines, and, in fact, sees Google getting worse, as it tries to show you results based on what it thinks it knows about you, not what is most relevant to your actual query: “The internet was supposed to be a place you went to find information, not where you became the information that companies take instead."Jay uses tools to prevent fingerprinting, where companies identify you and track you across the internet, but worries that going too far with things like ad blockers puts a target on your back as well. Jay chooses to pick “a couple of effective tools,” and runs with those.For their smartphone needs, Jay goes with Apple. Like Ed, Jay doesn’t believe Apple is perfect, and even considers their privacy policies a bit of a gimmick, but sees them as the better alternative to Android. Jay likes the security of the App Store, and the array of privacy features in both Safari and Apple Accounts as a whole. They highlight Safari’s “Advanced Tracking and Fingerprinting Protection” feature, which helps block trackers as you browse the web; iCloud’s Private Relay, which hides your IP address; and “Hide My Email,” which generates email aliases you can share with others without giving your true email address away.Most of us are plagued with spam calls, but following the Robinhood data breach in 2021, Jay started receiving a flood of them. They decided to change their phone number and made a point of never sharing it with businesses. For the times they need to give out their number to parties they don’t trust, they use a number generated by My Sudo, which, for per year, gives them a VoIPphone number. It works with most services that rely on SMS, but it won’t function for two-factor authentication.My Sudo lets you change your number for an additional so if Jay’s number ever was compromised or started receiving too much spam, they could swap it.        Jay, like many respondents, deleted all social media services: “It has its place in society for a lot of people, and is no doubt a great way to connect. However, I found that the fear of deleting it was a lot worse than actually deleting it. The people you care about won’t forget you exist.” That said, Jay doesn't mind any of the obstacles this lifestyle does throw their way: “It is a challenging topic, as most people consider you a little bit 'out there' if you take steps to make your life a little less convenient, but more private. The modern world sells you convenience, while pretending it is free, and harvesting your data for so much more than you actually get out of your relationship to them.”      What it takes to be private on the modern internetThere's no one way to tackle personal privacy. Every one of the respondents to our query had something unique about their approach, and many had different motivations behind why they were so concerned about their privacy.There are plenty of common through lines, of course. Most privacy people love Proton, which makes sense. Proton seems to be the only company that offers a suite of apps most closely resembling Google's while also prioritizing privacy. If you want your email, calendar, word processor, and even your VPN all tied up nicely under one privacy-focused umbrella, that's Proton. But not everyone wants an ecosystem, either. That's why you see respondents using other VPNs, like Mullvad, or other private storage options, like Tresorit. These apps and services exist—they might just not be owned by one company, like Apple or Google.Google and Meta are more commonalities, in that most privacy enthusiasts ditch them entirely. Some, like Mark, haven't been able to fully shake off these data-hungry companies. In Mark's case, that's because they need these platforms for work. But while most hardcore privacy people delete their Google and Meta accounts, most of us have trouble de-Googling and de-Metaing our digital lives. In general, though, the keys to privacy success include the following: Use a VPN to protect your internet traffic; prioritize privacy in your web browser, both through the browser itself, as well as extensions that block ads and protect your traffic; shield your sensitive information whenever possible, by using email aliases, alternate phone numbers, or credit card masks; use strong and unique passwords for all accounts, and store those passwords in a secure password manager; use two-factor authentication whenever possible; and stick to end-to-end encrypted chat apps to communicate with others. While there's always more you can do, that's the perfect storm to keep your digital life as private as reasonably possible. Some might read through the examples here and see steps that are too much effort to be worth it. It might seem out of reach to ditch Gmail and Instagram, break certain websites, and force your friends and family to learn new numbers and email addresses to protect your privacy, especially if you don't feel your privacy has that much of an impact on your life. But even if you aren't sold on the concept of privacy itself, there are real-world results from sticking with these methods. Jay no longer receives spam calls and texts; Mark no longer sees ads that are freakishly relevant to their likes. It's a lifestyle change, to be sure, but it's not just to serve some concept of privacy. You can see results by changing the way you interact with the internet, all without having to actually disconnect from the internet, and, by extension, the world at large. #spoke #with #some #most #private
    LIFEHACKER.COM
    I Spoke With Some of the Most Private People Online, and Here's What They Sacrifice
    How far would you go to keep yourself private online? There’s little doubt that advances in technology over the past three decades have eroded traditional concepts around privacy and security: It was once unthinkable to voluntarily invite big companies to track your every move and decision—now, we happily let them in exchange for the digital goods and services we rely on (or are hopelessly addicted to). Most people these days either tolerate these privacy intrusions or outright don’t care about them. But there’s a growing movement that believes it’s time to claim our privacy back. Some are working piecemeal, blocking trackers and reducing permissions where they can, while not totally ditching modern digital society as a whole. Others, however, are as hardcore as can be—a modern equivalent of "going off the grid."  We put out a call looking for the latter—people who are going to great lengths to protect their privacy in today’s mass surveillance world. We received a number of insightful, fascinating, and unique situations, but for this piece, I want to highlight four specific perspectives: "Ed," "Jane," "Mark," and "Jay."Ed is "ruthless" with app choices and permissionsThe first respondent, I’ll call Ed, since their privacy journey began with the Edward Snowden leaks: “I'd known something was likely up…as early as 2006[.] I remember headlines about AT&T possibly spying, but high school me didn't take it too seriously at the time. The Snowden leaks, when I was in college, really opened my eyes. Ever since, I've taken steps to protect my privacy.”Ed says the biggest step they’ve taken towards a digitally private life has been their Proton account. If you’re not aware, Proton is a company that offers apps designed for privacy. Their email service, Proton Mail, is the most famous of the company’s products, but Proton makes other apps as well. Ed uses many of them, including Proton VPN, Proton Calendar, and Proton Drive. Ed pays for Proton Ultimate, which costs them nearly $200 every two years (a new account is now billed yearly at $119.88). You don’t have to pay for Proton, but your experience is much more limited. That’s not totally dissimilar to Google’s offers, which gives you more features if you pay, but most people can definitely get by with a free Google Account. I'm not so sure the reverse is true. Speaking of Google, Ed does have a Google Account, but rarely logs into it. They don’t keep anything attached to it, however—Ed stores all files, for example, in Proton Drive or Tresoirt (another end-to-end encrypted service).Ed uses SimpleLogin for throwaway email addresses. That’s not just for the times Ed wants to avoid giving their email address to someone. According to them, they use an alias anytime an organization asks for their email, and frequently delete it when it’s no longer useful. Each online purchase gets its own alias, and that alias is deleted once the purchase is complete. Whenever Ed travels, they use an alias for any flights, hotels, and rental cars they use. Once the trip is up, they delete the alias. If one of those aliases receives a spam message, they delete it as well.Ed’s smartphone of choice is iPhone, and although Apple arguably has the best reputation for privacy in big tech, Ed is no fan: “Apple is no bastion of privacy of course, but they seem to be the least-worst of the big tech companies.” Ed doesn’t use iCloud for any backups: Any iPhone files are kept in Tresorit. That iPhone, of course, contains apps. But each app is there for a reason, and no app gets access to permissions unless it requires it: “I'm ruthless about apps and app permissions. If I'm not going to use the app regularly, I uninstall it. I grant only those permissions I think the app reasonably needs.” Ed protects his mobile internet traffic with Proton VPN, and only accesses the web via Firefox Focus, a special version of Firefox designed for privacy. Location services are always off on Ed’s iPhone, unless they’re using Apple Maps for navigation. Once they arrive at their destination, Ed disables location services again. They also have an interesting trick for getting back home without revealing their actual address:  “Additionally, when I'm navigating home, I don't enter my home address. I enter the address down the street just as an extra layer so I'm not entering my actual home address…I'll end navigation and turn off location while still driving…if I know the rest of the way home myself."Most of us deal regularly (if not daily) with spam calls. Not Ed: They use the “Silence Unknown Callers” setting on iOS to send all numbers not in the Contacts app to voicemail. They then review all voicemails, and if they didn’t leave a message, they block the number. Our initial call out for this piece referenced how using a VPN can sometimes block incoming phone calls, but Ed isn’t bothered by that: “Since most calls these days are scams or telemarketing, and most people I do want to talk to aren't going to call me anyway, I see this as more of a feature than a bug.” For their desktop computing needs, Ed uses Windows. They admit they aren’t privacy experts when it comes to Microsoft’s OS, but they do what they can, including changing all privacy settings and uninstalling all programs they don’t use. (That includes OneDrive and Edge.) They also run a clean version of Windows 11 after following Lifehacker’s guide. Firefox is their go-to PC browser, and they use a variety of extensions, including:ClearURLs: removes trackers from links.Decentraleyes: blocks data requests from third-party networks. Disconnect: blocks trackers from "thousands" of third-party sites.Firefox Multi-Account Containers: separates your browsing into siloed "containers" to isolate each session from one another.PopUpOFF: blocks pop-ups, overlays, and cookie alerts.Privacy Badger: blocks invisible trackers.Proton VPN: Proton's Firefox add-on for its VPN.uBlock Origin: popular content blocker.Ed didn’t say how much of an impact this array of extensions and settings has on their browsing, save for YouTube, which they admit does sometimes give them trouble. However, Ed has workarounds: “When YouTube wants me to 'sign in to confirm you're not a bot,' changing VPN servers usually does the trick.” Ed also uses the audible clues for ReCAPTCHA prompts, rather than the pictures, since they don’t want to help train Google’s “braindead AI.”Ed deleted all their social media accounts, including Facebook, X, Instagram, and LinkedIn. Though they’ve never had TikTok installed on their phone, they will watch it in Firefox when a friend sends them a video. Jane uses an open-source smartphone OS designed for privacyWhile Edward Snowden may have kicked off Ed’s interest in personal privacy, "Jane" has many strong beliefs motivating their desire for privacy. They are concerned about data brokers and Meta’s practices of tracking internet activity, and how these companies build profiles based on that data to sell to third-parties; they’re concerned about the possibility of telecommunication companies tracking our locations via cellular towers; they worry about US law enforcement and agencies reviewing citizens’ social media accounts accounts and tracking people. Their focus on privacy is fueled by true concern for their own well-being, not only the value of privacy as a concept.      Jane uses a VPN on all of their devices. Instead of Proton, however, Jane opts for Mullvad. They enable ad and tracker blocking, as well as a kill switch, which blocks your internet if you lose connection with the VPN—thus protecting your connection from being leaked out of the secure network.I’m a big advocate for strong and unique passwords and proper password management, but Jane definitely beats me when it comes to secure credentials. Jane uses six to eight-word passphrases generated by diceware, a tactic that chooses words based on dice rolls. Something like this diceware generator will roll a die five times, then find a word in a bank based on that five-digit number. You can repeat this as many times as you want to come up with a passphrase built up with random words. Jane saves all of their passphrases to a password manager, except for the ones for important accounts, like their bank. They commit those to memory, just in case someone breaches their password manager.     Like Ed, Jane uses Mullvad, but instead of just using their VPN, they opt for the web browser, which has those protections built in. Mullvad’s strict privacy settings break persistent logins on websites, so any sites Jane wants to stay logged in on are kept in Brave browser. For both Mullvad and Brave, Jane uses uBlock Origin.“From time-to-time I do run into sites that will block access due to being on a VPN or blocking ads and trackers. Instead of disabling [my] VPN completely, switching my connection to one of Mullvad's rented servers instead of ones they own usually helps. Barring that, I occasionally go into [uBlock Origin] and temporarily whitelist a needed [URL] ([ReCAPTCHA] etc). This works for me to get around site blocks most of the time.”  Jane uses a Mac, and configured macOS based on various privacy guides. But instead of an iPhone, Jane opts for a Google Pixel. That might surprise readers who assumed hardcore privacy enthusiasts would break away from Google entirely. But X doesn’t run Android: Instead, they installed GrapheneOS on their Pixel, an open-source OS designed for privacy. Following a restart, Jane configured the Pixel to only unlock with a seven-word dice passphrase—for general use, they use a fingerprint scan and a six-digit PIN. If the don’t unlock their Pixel for a while, their phone automatically reboots to put it back into this “First Unlock” state. They also keep airplane mode on at all times to disable the phone’s radio communications, but maintain a wifi connection with timed automatic Bluetooth and wireless disabling. Jane also deleted all their social media accounts after downloading all data associated with those platforms.Mark uses phone and credit card masks“Mark” is perhaps the least hardcore of the respondents in this story, but that makes their experience both interesting and relatable. Unlike most of the people we spoke to, Mark is still on Facebook and Instagram. That’s due to their job, which requires them to be on the platform, but they’ve been “systematically” deleting everything they can over their 19-year Facebook history and saving the data to an external hard drive. Mark doesn’t follow anything that isn’t relevant to their job, and only uses Facebook and Instagram inside the DuckDuckGo browser. They don’t react to posts they see, and following their privacy tactics, Facebook doesn’t show them relevant ads anymore. “If there is an ad I'm actually interested in I'll search it up in a different browser rather than click it.”Mark has had four Google Accounts in their time online, and has deleted two so far. Like Facebook, they have to use Google for their job, but they delegate all their work to Chrome. All other browsing runs through Firefox, DuckDuckGo, or Tor. The latter is perhaps best known for being the browser of choice for browsing the dark web, but what makes it great for that is also what makes it a great choice for private browsing.Unlike others in this story, Mark hasn’t de-Googled themselves completely. In addition to using Chrome for work, Mark has a phone mask through Google, and has their contacts, calendar, and maps tied to the company—though they are moving away from Google as much as they can. They've been running through their old emails to find and delete outdated accounts they no longer use. Any accounts they do need now use an email mask that forwards to a Mailfence account, an encrypted email service.   Mark was the only respondent to talk about entertainment in relation to privacy: “I've also been switching to physical media over streaming, so buying CDs and DVDs, locally as much as possible. I'm lucky to have a local music store and a local bookstore...one of the owners of our bookstore wrote a book on how to resist Amazon and why. Any book I want, I can either order through them or on Alibris. For music, I use our local record store and Discogs.”When shopping online, Mark uses a credit card mask, but still uses the card itself when shopping in person. They want to start using a credit card mask in retail locations like Janet Vertesi, an associate professor of sociology at Princeton University, but they haven’t quite gotten there yet.   What really piqued my interest most about Mark, however, wasn’t their perspective on their own privacy concerns, but the concerns around the privacy of their kids: “They each have a Gmail, two of them have Snapchat. Their schools use Gaggle and Google to spy on them. I don't even know how to start disconnecting them from all this...I was a kid during the wild west of the internet and this feels like getting back to my roots. My kids are end users who understand apps and touchscreens, not torrenting their music or coding a basic website. (Is this my version of "I drank out of the garden hose"?) I feel like Big Data has its grip on the kids already and I don't have a guidebook on navigating that as a parent.”  Mark’s current focus on their kids’ privacy includes deleting their health data from their local health system. That’s in part due to a data breach impacting the health system, but also the language about autism from Robert F. Kennedy Jr., the current Secretary of Health and Human Services.Jay de-googled their life and uses a VoIP phone number"Jay's" origin story with personal privacy dates back to 2017. That year, Equifax suffered a major hack, where nearly 148 million Americans had sensitive data stolen and weren’t notified about the breach for months. Jay was frustrated: You don’t choose to give your data to Equifax, or any credit bureau, and yet so many people lost their data. They also felt that companies were not properly held responsible for these events, and lawmakers were simply too out of touch to do what was necessary to protect citizens’ privacy, so they took it upon themselves to protect their own data. Ever since this incident, Jay freezes their credit: “It was frustratingly difficult back then, but nowadays, it is very easy (it just requires an account, which I use a burner email for)...The freeze will not allow anyone to pull credit for large purchases in your name, even if they have your social security number (and because of the data breach, someone probably does). I decided I wanted to pursue some privacy for the things I do have a choice over.”  From here, Jay de-googled their life, including both Google Search as well as YouTube. They’ve found no issue with using alternative search engines, and, in fact, sees Google getting worse, as it tries to show you results based on what it thinks it knows about you, not what is most relevant to your actual query: “The internet was supposed to be a place you went to find information, not where you became the information that companies take instead."Jay uses tools to prevent fingerprinting, where companies identify you and track you across the internet, but worries that going too far with things like ad blockers puts a target on your back as well. Jay chooses to pick “a couple of effective tools,” and runs with those.For their smartphone needs, Jay goes with Apple. Like Ed, Jay doesn’t believe Apple is perfect, and even considers their privacy policies a bit of a gimmick, but sees them as the better alternative to Android. Jay likes the security of the App Store, and the array of privacy features in both Safari and Apple Accounts as a whole. They highlight Safari’s “Advanced Tracking and Fingerprinting Protection” feature, which helps block trackers as you browse the web; iCloud’s Private Relay, which hides your IP address; and “Hide My Email,” which generates email aliases you can share with others without giving your true email address away.Most of us are plagued with spam calls, but following the Robinhood data breach in 2021, Jay started receiving a flood of them. They decided to change their phone number and made a point of never sharing it with businesses. For the times they need to give out their number to parties they don’t trust, they use a number generated by My Sudo, which, for $20 per year, gives them a VoIP (Voice over Internet Protocol) phone number. It works with most services that rely on SMS, but it won’t function for two-factor authentication. (Which is fine, seeing as SMS-based 2FA is the weakest form of secondary authentication.) My Sudo lets you change your number for an additional $1, so if Jay’s number ever was compromised or started receiving too much spam, they could swap it.        Jay, like many respondents, deleted all social media services: “It has its place in society for a lot of people, and is no doubt a great way to connect. However, I found that the fear of deleting it was a lot worse than actually deleting it. The people you care about won’t forget you exist.” That said, Jay doesn't mind any of the obstacles this lifestyle does throw their way: “It is a challenging topic, as most people consider you a little bit 'out there' if you take steps to make your life a little less convenient, but more private. The modern world sells you convenience, while pretending it is free, and harvesting your data for so much more than you actually get out of your relationship to them.”      What it takes to be private on the modern internetThere's no one way to tackle personal privacy. Every one of the respondents to our query had something unique about their approach, and many had different motivations behind why they were so concerned about their privacy.There are plenty of common through lines, of course. Most privacy people love Proton, which makes sense. Proton seems to be the only company that offers a suite of apps most closely resembling Google's while also prioritizing privacy. If you want your email, calendar, word processor, and even your VPN all tied up nicely under one privacy-focused umbrella, that's Proton. But not everyone wants an ecosystem, either. That's why you see respondents using other VPNs, like Mullvad, or other private storage options, like Tresorit. These apps and services exist—they might just not be owned by one company, like Apple or Google (or Proton).Google and Meta are more commonalities, in that most privacy enthusiasts ditch them entirely. Some, like Mark, haven't been able to fully shake off these data-hungry companies. In Mark's case, that's because they need these platforms for work. But while most hardcore privacy people delete their Google and Meta accounts, most of us have trouble de-Googling and de-Metaing our digital lives. In general, though, the keys to privacy success include the following: Use a VPN to protect your internet traffic; prioritize privacy in your web browser, both through the browser itself, as well as extensions that block ads and protect your traffic; shield your sensitive information whenever possible, by using email aliases, alternate phone numbers, or credit card masks; use strong and unique passwords for all accounts, and store those passwords in a secure password manager; use two-factor authentication whenever possible (perhaps passkeys, when available); and stick to end-to-end encrypted chat apps to communicate with others. While there's always more you can do, that's the perfect storm to keep your digital life as private as reasonably possible. Some might read through the examples here and see steps that are too much effort to be worth it. It might seem out of reach to ditch Gmail and Instagram, break certain websites, and force your friends and family to learn new numbers and email addresses to protect your privacy, especially if you don't feel your privacy has that much of an impact on your life. But even if you aren't sold on the concept of privacy itself, there are real-world results from sticking with these methods. Jay no longer receives spam calls and texts; Mark no longer sees ads that are freakishly relevant to their likes. It's a lifestyle change, to be sure, but it's not just to serve some concept of privacy. You can see results by changing the way you interact with the internet, all without having to actually disconnect from the internet, and, by extension, the world at large.
    0 Comentários 0 Compartilhamentos 0 Anterior
  • These are three Apple Intelligence features I’d like to see with iOS 26

    Apple Intelligence has been off to a rocky start, especially when it comes to Siri. The assistant still has a lot to be desired, and that should definitely be at the forefront of Apple’s priorities.
    Regardless, Bloomberg’s Mark Gurman reports that Apple plans on expanding current Apple Intelligence capabilities to additional apps in iOS 26, and I figured I’d throw out some ideas I’d like to see.

    Summaries in more places
    I think providing summaries is probably one of the better use cases of on-device large language models. Apple introduced notification summaries in iOS 18, and while there were some major inaccuracies early on, things seem to be mostly fine. Apple recently enabled Apple Intelligence on compatible devices by default, rather than making it an opt-in feature.
    For one, I think it’d be neat if there were an API for developers to use summarization models in their apps. I’m sure Apple would put strict guardrails on it, but allowing third-parties to utilize Apple’s summarization models would be a big win. It’d empower indie developers to create AI features without having to worry about an OpenAI bill.
    On top of that, I’d really like to see some summarization improvements in the Messages app, particularly in group chats. If you missed out on a 100-message conversation, Apple should provide a more detailed summary than what can fit within two lines.
    Or, say you’re a student – imagine being able to summarize the notes you took in a class after the fact. You’d still need to read the notes to get a thorough understanding, but a note summary could serve as a great way to jog your memory if you’re quickly trying to recall something.
    Genmoji for everyone
    Genmoji is probably one of the most popular Apple Intelligence features unveiled at WWDC24. Unfortunately though, it’s only available on some of the most recent iPhone models: iPhone 15 Pro/Pro Max, iPhone 16e, iPhone 16/16 Plus, and iPhone 16 Pro/Pro Max.
    If you have anything older, including the one-year-old iPhone 15, you can’t use Genmoji.
    I don’t expect Apple to make its models run locally on less capable hardware, as nice as that would be. However, they did announce Private Cloud Compute – a private server for handling Apple Intelligence requests in the cloud.
    Those servers were likely low capacity when they just begun rolling them out, but it’ll have been over a year since the rollout begun by the time iOS 19 releases to the public.
    While I don’t expect Apple to give out Private Cloud Compute usage for free, I think it’d be pretty neat if they bundled Genmoji in iCloud+ subscriptions for users with older devices – giving people a taste of what Apple Intelligence offers.

    More customizable focus modes
    One of my favorite features in iOS 18 has been the new Reduce Interruptions focus mode. In short, it analyzes every notification that comes through, and only presents what it thinks is important. The rest just stay in notification center.

    I agree with the more granular focus options. I'd like a focus option for when I connect to my home wifi. A separate focus for different workout options...I'd like to be "more" silent when running outside, and less when working out in the gym. Just a few ideas here, and they should be able to work within the present APP options.
    View all comments

    I’d really like to see Apple offer additional granularity here. For example, you could configure a focus mode that only triggers on key words that you set up. I could also see the inverse being useful, where you’d normally allow an app to notify you, but you’d like notifications with matching key words to be muted.
    That’s just scratching the surface, but I really think there could be a lot of opportunity for AI to enable more granular notification management. The new “Reduce Interruptions” focus is just the start.

    My favorite Apple accessory recommendations:
    Follow Michael: X/Twitter, Bluesky, Instagram

    Add 9to5Mac to your Google News feed. 

    FTC: We use income earning auto affiliate links. More.You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    #these #are #three #apple #intelligence
    These are three Apple Intelligence features I’d like to see with iOS 26
    Apple Intelligence has been off to a rocky start, especially when it comes to Siri. The assistant still has a lot to be desired, and that should definitely be at the forefront of Apple’s priorities. Regardless, Bloomberg’s Mark Gurman reports that Apple plans on expanding current Apple Intelligence capabilities to additional apps in iOS 26, and I figured I’d throw out some ideas I’d like to see. Summaries in more places I think providing summaries is probably one of the better use cases of on-device large language models. Apple introduced notification summaries in iOS 18, and while there were some major inaccuracies early on, things seem to be mostly fine. Apple recently enabled Apple Intelligence on compatible devices by default, rather than making it an opt-in feature. For one, I think it’d be neat if there were an API for developers to use summarization models in their apps. I’m sure Apple would put strict guardrails on it, but allowing third-parties to utilize Apple’s summarization models would be a big win. It’d empower indie developers to create AI features without having to worry about an OpenAI bill. On top of that, I’d really like to see some summarization improvements in the Messages app, particularly in group chats. If you missed out on a 100-message conversation, Apple should provide a more detailed summary than what can fit within two lines. Or, say you’re a student – imagine being able to summarize the notes you took in a class after the fact. You’d still need to read the notes to get a thorough understanding, but a note summary could serve as a great way to jog your memory if you’re quickly trying to recall something. Genmoji for everyone Genmoji is probably one of the most popular Apple Intelligence features unveiled at WWDC24. Unfortunately though, it’s only available on some of the most recent iPhone models: iPhone 15 Pro/Pro Max, iPhone 16e, iPhone 16/16 Plus, and iPhone 16 Pro/Pro Max. If you have anything older, including the one-year-old iPhone 15, you can’t use Genmoji. I don’t expect Apple to make its models run locally on less capable hardware, as nice as that would be. However, they did announce Private Cloud Compute – a private server for handling Apple Intelligence requests in the cloud. Those servers were likely low capacity when they just begun rolling them out, but it’ll have been over a year since the rollout begun by the time iOS 19 releases to the public. While I don’t expect Apple to give out Private Cloud Compute usage for free, I think it’d be pretty neat if they bundled Genmoji in iCloud+ subscriptions for users with older devices – giving people a taste of what Apple Intelligence offers. More customizable focus modes One of my favorite features in iOS 18 has been the new Reduce Interruptions focus mode. In short, it analyzes every notification that comes through, and only presents what it thinks is important. The rest just stay in notification center. I agree with the more granular focus options. I'd like a focus option for when I connect to my home wifi. A separate focus for different workout options...I'd like to be "more" silent when running outside, and less when working out in the gym. Just a few ideas here, and they should be able to work within the present APP options. View all comments I’d really like to see Apple offer additional granularity here. For example, you could configure a focus mode that only triggers on key words that you set up. I could also see the inverse being useful, where you’d normally allow an app to notify you, but you’d like notifications with matching key words to be muted. That’s just scratching the surface, but I really think there could be a lot of opportunity for AI to enable more granular notification management. The new “Reduce Interruptions” focus is just the start. My favorite Apple accessory recommendations: Follow Michael: X/Twitter, Bluesky, Instagram Add 9to5Mac to your Google News feed.  FTC: We use income earning auto affiliate links. More.You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel #these #are #three #apple #intelligence
    9TO5MAC.COM
    These are three Apple Intelligence features I’d like to see with iOS 26
    Apple Intelligence has been off to a rocky start, especially when it comes to Siri. The assistant still has a lot to be desired, and that should definitely be at the forefront of Apple’s priorities. Regardless, Bloomberg’s Mark Gurman reports that Apple plans on expanding current Apple Intelligence capabilities to additional apps in iOS 26, and I figured I’d throw out some ideas I’d like to see. Summaries in more places I think providing summaries is probably one of the better use cases of on-device large language models. Apple introduced notification summaries in iOS 18, and while there were some major inaccuracies early on, things seem to be mostly fine. Apple recently enabled Apple Intelligence on compatible devices by default, rather than making it an opt-in feature. For one, I think it’d be neat if there were an API for developers to use summarization models in their apps. I’m sure Apple would put strict guardrails on it, but allowing third-parties to utilize Apple’s summarization models would be a big win. It’d empower indie developers to create AI features without having to worry about an OpenAI bill. On top of that, I’d really like to see some summarization improvements in the Messages app, particularly in group chats. If you missed out on a 100-message conversation, Apple should provide a more detailed summary than what can fit within two lines. Or, say you’re a student – imagine being able to summarize the notes you took in a class after the fact. You’d still need to read the notes to get a thorough understanding, but a note summary could serve as a great way to jog your memory if you’re quickly trying to recall something. Genmoji for everyone Genmoji is probably one of the most popular Apple Intelligence features unveiled at WWDC24. Unfortunately though, it’s only available on some of the most recent iPhone models: iPhone 15 Pro/Pro Max, iPhone 16e, iPhone 16/16 Plus, and iPhone 16 Pro/Pro Max. If you have anything older, including the one-year-old iPhone 15, you can’t use Genmoji. I don’t expect Apple to make its models run locally on less capable hardware, as nice as that would be. However, they did announce Private Cloud Compute – a private server for handling Apple Intelligence requests in the cloud. Those servers were likely low capacity when they just begun rolling them out, but it’ll have been over a year since the rollout begun by the time iOS 19 releases to the public. While I don’t expect Apple to give out Private Cloud Compute usage for free, I think it’d be pretty neat if they bundled Genmoji in iCloud+ subscriptions for users with older devices – giving people a taste of what Apple Intelligence offers. More customizable focus modes One of my favorite features in iOS 18 has been the new Reduce Interruptions focus mode. In short, it analyzes every notification that comes through, and only presents what it thinks is important. The rest just stay in notification center. I agree with the more granular focus options. I'd like a focus option for when I connect to my home wifi. A separate focus for different workout options...I'd like to be "more" silent when running outside, and less when working out in the gym. Just a few ideas here, and they should be able to work within the present APP options. View all comments I’d really like to see Apple offer additional granularity here. For example, you could configure a focus mode that only triggers on key words that you set up. I could also see the inverse being useful, where you’d normally allow an app to notify you, but you’d like notifications with matching key words to be muted. That’s just scratching the surface, but I really think there could be a lot of opportunity for AI to enable more granular notification management. The new “Reduce Interruptions” focus is just the start. My favorite Apple accessory recommendations: Follow Michael: X/Twitter, Bluesky, Instagram Add 9to5Mac to your Google News feed.  FTC: We use income earning auto affiliate links. More.You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comentários 0 Compartilhamentos 0 Anterior
  • New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data

    May 30, 2025Ravie LakshmananBrowser Security / Malware

    A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages.
    "This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as credentials, browser information, and cryptocurrency wallet details," Elastic Security Labs researcher Jia Yu Chan said in an analysis.
    The attack chains begin with threat actors compromising legitimate websites with malicious JavaScript payloads that serve bogus CAPTCHA check pages, which prompt site visitors to "prove you are notrobot" by following a three-step process, a prevalent tactic called ClickFix.
    This involves instructing the potential victim to open the Windows Run dialog prompt, paste an already copied command into the "verification window", and press enter. This effectively causes the obfuscated PowerShell command to be executed, resulting in the retrieval of a next-stage payload from an external server.
    The JavaScript payloadis subsequently saved to the victim's Downloads folder and executed using cscript in a hidden window. The main goal of the intermediate script is to fetch the EDDIESTEALER binary from the same remote server and store it in the Downloads folder with a pseudorandom 12-character file name.
    Written in Rust, EDDIESTEALER is a commodity stealer malware that can gather system metadata, receive tasks from a command-and-controlserver, and siphon data of interest from the infected host. The exfiltration targets include cryptocurrency wallets, web browsers, password managers, FTP clients, and messaging apps.
    "These targets are subject to change as they are configurable by the C2 operator," Elastic explained. "EDDIESTEALER then reads the targeted files using standard kernel32.dll functions like CreateFileW, GetFileSizeEx, ReadFile, and CloseHandle."

    The collected host information is encrypted and transmitted to the C2 server in a separate HTTP POST request after the completion of each task.
    Besides incorporating string encryption, the malware employs a custom WinAPI lookup mechanism for resolving API calls and creates a mutex to ensure that only one version is running at any given time. It also incorporates checks to determine if it's being executed in a sandboxed environment, and if so, deletes itself from disk.
    "Based on a similar self-deletion technique observed in Latrodectus, EDDIESTEALER is capable of deleting itself through NTFS Alternate Data Streams renaming, to bypass file locks," Elastic noted.
    Another noteworthy feature built into the stealer is its ability to bypass Chromium's app-bound encryption to gain access to unencrypted sensitive data, such as cookies. This is accomplished by including a Rust implementation of ChromeKatz, an open-source tool that can dump cookies and credentials from the memory of Chromium-based browsers.
    The Rust version of ChromeKatz also incorporates changes to handle scenarios where the targeted Chromium browser is not running. In such cases, it spawns a new browser instance using the command-line arguments "--window-position=-3000,-3000 ; effectively positioning the new window far off-screen and making its invisible to the user.

    In opening the browser, the objective is to enable the malware to read the memory associated with the network service child process of Chrome that's identified by the "-utility-sub-type=network.mojom.NetworkService" flag and ultimately extract the credentials.
    Elastic said it also identified updated versions of the malware with features to harvest running processes, GPU information, number of CPU cores, CPU name, and CPU vendor. In addition, the new variants tweak the C2 communication pattern by preemptively sending the host information to the server before receiving the task configuration.
    That's not all. The encryption key used for client-to-server communication is hard-coded into the binary, as opposed to retrieving it dynamically from the server. Furthermore, the stealer has been found to launch a new Chrome process with the --remote-debugging-port=<port_num> flag to enable DevTools Protocol over a local WebSocket interface so as to interact with the browser in a headless manner, without requiring any user interaction.
    "This adoption of Rust in malware development reflects a growing trend among threat actors seeking to leverage modern language features for enhanced stealth, stability, and resilience against traditional analysis workflows and threat detection engines," the company said.
    The disclosure comes as c/side revealed details of a ClickFix campaign that targets multiple platforms, such as Apple macOS, Android, and iOS, using techniques like browser-based redirections, fake UI prompts, and drive-by download techniques.
    The attack chain starts with an obfuscated JavaScript hosted on a website, that when visited from macOS, initiates a series of redirections to a page that guides victims to launch Terminal and run a shell script, which leads to the download of a stealer malware that has been flagged on VirusTotal as the Atomic macOS Stealer.
    However, the same campaign has been configured to initiate a drive-by download scheme when visiting the web page from an Android, iOS, or Windows device, leading to the deployment of another trojan malware.

    The disclosures coincide with the emergence of new stealer malware families like Katz Stealer and AppleProcessHub Stealer targeting Windows and macOS respectively, and are capable of harvesting a wide range of information from infected hosts, according to Nextron and Kandji.
    Katz Stealer, like EDDIESTEALER, is engineered to circumvent Chrome's app-bound encryption, but in a different way by employing DLL injection to obtain the encryption key without administrator privileges and use it to decrypt encrypted cookies and passwords from Chromium-based browsers.

    "Attackers conceal malicious JavaScript in gzip files, which, when opened, trigger the download of a PowerShell script," Nextron said. "This script retrieves a .NET-based loader payload, which injects the stealer into a legitimate process. Once active, it exfiltrates stolen data to the command and control server."
    AppleProcessHub Stealer, on the other hand, is designed to exfiltrate user files including bash history, zsh history, GitHub configurations, SSH information, and iCloud Keychain.
    Attack sequences distributing the malware entail the use of a Mach-O binary that downloads a second-stage bash stealer script from the server "appleprocesshubcom" and runs it, the results of which are then exfiltrated back to the C2 server. Details of the malware were first shared by the MalwareHunterTeam on May 15, 2025, and by MacPaw's Moonlock Lab last week.
    "This is an example of a Mach-O written in Objective-C which communicates with a command and control server to execute scripts," Kandji researcher Christopher Lopez said.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #new #eddiestealer #malware #bypasses #chrome039s
    New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data
    May 30, 2025Ravie LakshmananBrowser Security / Malware A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. "This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as credentials, browser information, and cryptocurrency wallet details," Elastic Security Labs researcher Jia Yu Chan said in an analysis. The attack chains begin with threat actors compromising legitimate websites with malicious JavaScript payloads that serve bogus CAPTCHA check pages, which prompt site visitors to "prove you are notrobot" by following a three-step process, a prevalent tactic called ClickFix. This involves instructing the potential victim to open the Windows Run dialog prompt, paste an already copied command into the "verification window", and press enter. This effectively causes the obfuscated PowerShell command to be executed, resulting in the retrieval of a next-stage payload from an external server. The JavaScript payloadis subsequently saved to the victim's Downloads folder and executed using cscript in a hidden window. The main goal of the intermediate script is to fetch the EDDIESTEALER binary from the same remote server and store it in the Downloads folder with a pseudorandom 12-character file name. Written in Rust, EDDIESTEALER is a commodity stealer malware that can gather system metadata, receive tasks from a command-and-controlserver, and siphon data of interest from the infected host. The exfiltration targets include cryptocurrency wallets, web browsers, password managers, FTP clients, and messaging apps. "These targets are subject to change as they are configurable by the C2 operator," Elastic explained. "EDDIESTEALER then reads the targeted files using standard kernel32.dll functions like CreateFileW, GetFileSizeEx, ReadFile, and CloseHandle." The collected host information is encrypted and transmitted to the C2 server in a separate HTTP POST request after the completion of each task. Besides incorporating string encryption, the malware employs a custom WinAPI lookup mechanism for resolving API calls and creates a mutex to ensure that only one version is running at any given time. It also incorporates checks to determine if it's being executed in a sandboxed environment, and if so, deletes itself from disk. "Based on a similar self-deletion technique observed in Latrodectus, EDDIESTEALER is capable of deleting itself through NTFS Alternate Data Streams renaming, to bypass file locks," Elastic noted. Another noteworthy feature built into the stealer is its ability to bypass Chromium's app-bound encryption to gain access to unencrypted sensitive data, such as cookies. This is accomplished by including a Rust implementation of ChromeKatz, an open-source tool that can dump cookies and credentials from the memory of Chromium-based browsers. The Rust version of ChromeKatz also incorporates changes to handle scenarios where the targeted Chromium browser is not running. In such cases, it spawns a new browser instance using the command-line arguments "--window-position=-3000,-3000 ; effectively positioning the new window far off-screen and making its invisible to the user. In opening the browser, the objective is to enable the malware to read the memory associated with the network service child process of Chrome that's identified by the "-utility-sub-type=network.mojom.NetworkService" flag and ultimately extract the credentials. Elastic said it also identified updated versions of the malware with features to harvest running processes, GPU information, number of CPU cores, CPU name, and CPU vendor. In addition, the new variants tweak the C2 communication pattern by preemptively sending the host information to the server before receiving the task configuration. That's not all. The encryption key used for client-to-server communication is hard-coded into the binary, as opposed to retrieving it dynamically from the server. Furthermore, the stealer has been found to launch a new Chrome process with the --remote-debugging-port=<port_num> flag to enable DevTools Protocol over a local WebSocket interface so as to interact with the browser in a headless manner, without requiring any user interaction. "This adoption of Rust in malware development reflects a growing trend among threat actors seeking to leverage modern language features for enhanced stealth, stability, and resilience against traditional analysis workflows and threat detection engines," the company said. The disclosure comes as c/side revealed details of a ClickFix campaign that targets multiple platforms, such as Apple macOS, Android, and iOS, using techniques like browser-based redirections, fake UI prompts, and drive-by download techniques. The attack chain starts with an obfuscated JavaScript hosted on a website, that when visited from macOS, initiates a series of redirections to a page that guides victims to launch Terminal and run a shell script, which leads to the download of a stealer malware that has been flagged on VirusTotal as the Atomic macOS Stealer. However, the same campaign has been configured to initiate a drive-by download scheme when visiting the web page from an Android, iOS, or Windows device, leading to the deployment of another trojan malware. The disclosures coincide with the emergence of new stealer malware families like Katz Stealer and AppleProcessHub Stealer targeting Windows and macOS respectively, and are capable of harvesting a wide range of information from infected hosts, according to Nextron and Kandji. Katz Stealer, like EDDIESTEALER, is engineered to circumvent Chrome's app-bound encryption, but in a different way by employing DLL injection to obtain the encryption key without administrator privileges and use it to decrypt encrypted cookies and passwords from Chromium-based browsers. "Attackers conceal malicious JavaScript in gzip files, which, when opened, trigger the download of a PowerShell script," Nextron said. "This script retrieves a .NET-based loader payload, which injects the stealer into a legitimate process. Once active, it exfiltrates stolen data to the command and control server." AppleProcessHub Stealer, on the other hand, is designed to exfiltrate user files including bash history, zsh history, GitHub configurations, SSH information, and iCloud Keychain. Attack sequences distributing the malware entail the use of a Mach-O binary that downloads a second-stage bash stealer script from the server "appleprocesshubcom" and runs it, the results of which are then exfiltrated back to the C2 server. Details of the malware were first shared by the MalwareHunterTeam on May 15, 2025, and by MacPaw's Moonlock Lab last week. "This is an example of a Mach-O written in Objective-C which communicates with a command and control server to execute scripts," Kandji researcher Christopher Lopez said. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #new #eddiestealer #malware #bypasses #chrome039s
    THEHACKERNEWS.COM
    New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data
    May 30, 2025Ravie LakshmananBrowser Security / Malware A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. "This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as credentials, browser information, and cryptocurrency wallet details," Elastic Security Labs researcher Jia Yu Chan said in an analysis. The attack chains begin with threat actors compromising legitimate websites with malicious JavaScript payloads that serve bogus CAPTCHA check pages, which prompt site visitors to "prove you are not [a] robot" by following a three-step process, a prevalent tactic called ClickFix. This involves instructing the potential victim to open the Windows Run dialog prompt, paste an already copied command into the "verification window" (i.e., the Run dialog), and press enter. This effectively causes the obfuscated PowerShell command to be executed, resulting in the retrieval of a next-stage payload from an external server ("llll[.]fit"). The JavaScript payload ("gverify.js") is subsequently saved to the victim's Downloads folder and executed using cscript in a hidden window. The main goal of the intermediate script is to fetch the EDDIESTEALER binary from the same remote server and store it in the Downloads folder with a pseudorandom 12-character file name. Written in Rust, EDDIESTEALER is a commodity stealer malware that can gather system metadata, receive tasks from a command-and-control (C2) server, and siphon data of interest from the infected host. The exfiltration targets include cryptocurrency wallets, web browsers, password managers, FTP clients, and messaging apps. "These targets are subject to change as they are configurable by the C2 operator," Elastic explained. "EDDIESTEALER then reads the targeted files using standard kernel32.dll functions like CreateFileW, GetFileSizeEx, ReadFile, and CloseHandle." The collected host information is encrypted and transmitted to the C2 server in a separate HTTP POST request after the completion of each task. Besides incorporating string encryption, the malware employs a custom WinAPI lookup mechanism for resolving API calls and creates a mutex to ensure that only one version is running at any given time. It also incorporates checks to determine if it's being executed in a sandboxed environment, and if so, deletes itself from disk. "Based on a similar self-deletion technique observed in Latrodectus, EDDIESTEALER is capable of deleting itself through NTFS Alternate Data Streams renaming, to bypass file locks," Elastic noted. Another noteworthy feature built into the stealer is its ability to bypass Chromium's app-bound encryption to gain access to unencrypted sensitive data, such as cookies. This is accomplished by including a Rust implementation of ChromeKatz, an open-source tool that can dump cookies and credentials from the memory of Chromium-based browsers. The Rust version of ChromeKatz also incorporates changes to handle scenarios where the targeted Chromium browser is not running. In such cases, it spawns a new browser instance using the command-line arguments "--window-position=-3000,-3000 https://google.com," effectively positioning the new window far off-screen and making its invisible to the user. In opening the browser, the objective is to enable the malware to read the memory associated with the network service child process of Chrome that's identified by the "-utility-sub-type=network.mojom.NetworkService" flag and ultimately extract the credentials. Elastic said it also identified updated versions of the malware with features to harvest running processes, GPU information, number of CPU cores, CPU name, and CPU vendor. In addition, the new variants tweak the C2 communication pattern by preemptively sending the host information to the server before receiving the task configuration. That's not all. The encryption key used for client-to-server communication is hard-coded into the binary, as opposed to retrieving it dynamically from the server. Furthermore, the stealer has been found to launch a new Chrome process with the --remote-debugging-port=<port_num> flag to enable DevTools Protocol over a local WebSocket interface so as to interact with the browser in a headless manner, without requiring any user interaction. "This adoption of Rust in malware development reflects a growing trend among threat actors seeking to leverage modern language features for enhanced stealth, stability, and resilience against traditional analysis workflows and threat detection engines," the company said. The disclosure comes as c/side revealed details of a ClickFix campaign that targets multiple platforms, such as Apple macOS, Android, and iOS, using techniques like browser-based redirections, fake UI prompts, and drive-by download techniques. The attack chain starts with an obfuscated JavaScript hosted on a website, that when visited from macOS, initiates a series of redirections to a page that guides victims to launch Terminal and run a shell script, which leads to the download of a stealer malware that has been flagged on VirusTotal as the Atomic macOS Stealer (AMOS). However, the same campaign has been configured to initiate a drive-by download scheme when visiting the web page from an Android, iOS, or Windows device, leading to the deployment of another trojan malware. The disclosures coincide with the emergence of new stealer malware families like Katz Stealer and AppleProcessHub Stealer targeting Windows and macOS respectively, and are capable of harvesting a wide range of information from infected hosts, according to Nextron and Kandji. Katz Stealer, like EDDIESTEALER, is engineered to circumvent Chrome's app-bound encryption, but in a different way by employing DLL injection to obtain the encryption key without administrator privileges and use it to decrypt encrypted cookies and passwords from Chromium-based browsers. "Attackers conceal malicious JavaScript in gzip files, which, when opened, trigger the download of a PowerShell script," Nextron said. "This script retrieves a .NET-based loader payload, which injects the stealer into a legitimate process. Once active, it exfiltrates stolen data to the command and control server." AppleProcessHub Stealer, on the other hand, is designed to exfiltrate user files including bash history, zsh history, GitHub configurations, SSH information, and iCloud Keychain. Attack sequences distributing the malware entail the use of a Mach-O binary that downloads a second-stage bash stealer script from the server "appleprocesshub[.]com" and runs it, the results of which are then exfiltrated back to the C2 server. Details of the malware were first shared by the MalwareHunterTeam on May 15, 2025, and by MacPaw's Moonlock Lab last week. "This is an example of a Mach-O written in Objective-C which communicates with a command and control server to execute scripts," Kandji researcher Christopher Lopez said. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    12 Comentários 0 Compartilhamentos 0 Anterior
  • This Game-Changing Phone Charger Also Backs Up Your Photos To A 2TB SD Card

    Sometimes the simplest ideas pack the biggest punches. Everyone charges their phone overnight… so what if your phone also ran a data backup while it charged? Sounds really elementary right? Well, that’s exactly what the PhotoPower does. The world’s only power brick with a built-in SD card, this device charges your battery while running a backup of all your photos, contacts, calendars, to the card.
    Here’s why it’s so genius. The backup happens entirely locally to an SD card… it happens every single time you charge your phone without you needing to remember anything or manually perform a backup. And the best part? The SD card inside the PhotoPower becomes an alternative to that pesky iCloud or Google One subscription that can cost hundreds each year.
    Designer: PhotoFast
    Click Here to Buy Now:Hurry! Only 6 days left.

    Sure, your fast-charger can, well, charge your phone fast. But can it ensure your data is safely backed up just in case your storage becomes full? I thought not. Well, that’s the PhotoPower’s genius, really. You’re plugging your phone to charge it overnight anyway – why not have the cable also transfer data so it gets duplicated onto a physical storage device just in case your phone’s storage gets full, or worse, corrupted.

    The charger looks and performs like any average charger – it’s the same size as the standard power brick, houses foldable pins for easy storage, and has a 45W charging capacity, giving you fairly fast charging. The difference, however, is that MicroSD card on the top, which backs up your photos/videos, contacts, and calendar every time you plug it in. The cable that connects to your phone performs double-duty, transferring power to your phone and data FROM your phone. No Wi-Fi, no complicated setups.

    An app lets you program backups, choosing what you get backed up and what you leave out. The app also lets the charger know that it needs to back up just YOUR phone and not everyone’s phone. It’s a smart protocol because multiple people could use the same charger, and you could also use the same charger with multiple devices. You don’t want your phone’s backup to get combined with your sibling’s phone backup, right? Or maybe you don’t want to accidentally back up your tablet onto the charger that’s just meant for your phone. If a device has the PhotoPower’s companion app, the charger performs the backup. If it doesn’t have the app, the charger just works as a regular 45W charger – simple.

    Backups get faster every time you plug your phone in. The PhotoPower app ensures it doesn’t re-capture duplicates or media it’s already backed up – just the new material. And yes, even if you share a charger with a partner or sibling, you CAN have multi-device backups. The charger merely creates separate folders to ensure data doesn’t get muddled up together. USB 3.2 technology ensures transfers at speeds of 5Gbps, so a single charge cycle could also work as a backup cycle.

    Data gets backed up onto the MicroSD card docked inside the PhotoPower. Once the SD card runs out of data, simply swap it for another one and you’re good to go. The PhotoPower accepts cards as large as 2 terabytes in size, making it something you can plug in and forget about. Trust me, as a guy with an iPhone 15 Pro, I haven’t even hit the 200GB mark on my gallery yet. That said, the PhotoPower works with iPhones, iPads, as well as Android phones and tablets.

    The app is free, obviously. The folks at PhotoPower really believe in crushing any subscription model, especially for cloud storage. You shouldn’t have to ‘rent’ storage when you can just buy it. And you shouldn’t have to manually remember to back up your phone when your charger could just do it for you. It’s sheer genius, if you ask me, because it solves such a crucial problem. I’m frankly tired of paying Google every month for storing my photos when I should just be able to buy the storage instead of renting it. What the PhotoPower does is simple, foolproof, and actually safer than storing your data on a cloud, where it could be vulnerable to hacks, outages, or being snooped on by third parties and governments.
    Click Here to Buy Now:Hurry! Only 6 days left.The post This Game-Changing Phone Charger Also Backs Up Your Photos To A 2TB SD Card first appeared on Yanko Design.
    #this #gamechanging #phone #charger #also
    This Game-Changing Phone Charger Also Backs Up Your Photos To A 2TB SD Card
    Sometimes the simplest ideas pack the biggest punches. Everyone charges their phone overnight… so what if your phone also ran a data backup while it charged? Sounds really elementary right? Well, that’s exactly what the PhotoPower does. The world’s only power brick with a built-in SD card, this device charges your battery while running a backup of all your photos, contacts, calendars, to the card. Here’s why it’s so genius. The backup happens entirely locally to an SD card… it happens every single time you charge your phone without you needing to remember anything or manually perform a backup. And the best part? The SD card inside the PhotoPower becomes an alternative to that pesky iCloud or Google One subscription that can cost hundreds each year. Designer: PhotoFast Click Here to Buy Now:Hurry! Only 6 days left. Sure, your fast-charger can, well, charge your phone fast. But can it ensure your data is safely backed up just in case your storage becomes full? I thought not. Well, that’s the PhotoPower’s genius, really. You’re plugging your phone to charge it overnight anyway – why not have the cable also transfer data so it gets duplicated onto a physical storage device just in case your phone’s storage gets full, or worse, corrupted. The charger looks and performs like any average charger – it’s the same size as the standard power brick, houses foldable pins for easy storage, and has a 45W charging capacity, giving you fairly fast charging. The difference, however, is that MicroSD card on the top, which backs up your photos/videos, contacts, and calendar every time you plug it in. The cable that connects to your phone performs double-duty, transferring power to your phone and data FROM your phone. No Wi-Fi, no complicated setups. An app lets you program backups, choosing what you get backed up and what you leave out. The app also lets the charger know that it needs to back up just YOUR phone and not everyone’s phone. It’s a smart protocol because multiple people could use the same charger, and you could also use the same charger with multiple devices. You don’t want your phone’s backup to get combined with your sibling’s phone backup, right? Or maybe you don’t want to accidentally back up your tablet onto the charger that’s just meant for your phone. If a device has the PhotoPower’s companion app, the charger performs the backup. If it doesn’t have the app, the charger just works as a regular 45W charger – simple. Backups get faster every time you plug your phone in. The PhotoPower app ensures it doesn’t re-capture duplicates or media it’s already backed up – just the new material. And yes, even if you share a charger with a partner or sibling, you CAN have multi-device backups. The charger merely creates separate folders to ensure data doesn’t get muddled up together. USB 3.2 technology ensures transfers at speeds of 5Gbps, so a single charge cycle could also work as a backup cycle. Data gets backed up onto the MicroSD card docked inside the PhotoPower. Once the SD card runs out of data, simply swap it for another one and you’re good to go. The PhotoPower accepts cards as large as 2 terabytes in size, making it something you can plug in and forget about. Trust me, as a guy with an iPhone 15 Pro, I haven’t even hit the 200GB mark on my gallery yet. That said, the PhotoPower works with iPhones, iPads, as well as Android phones and tablets. The app is free, obviously. The folks at PhotoPower really believe in crushing any subscription model, especially for cloud storage. You shouldn’t have to ‘rent’ storage when you can just buy it. And you shouldn’t have to manually remember to back up your phone when your charger could just do it for you. It’s sheer genius, if you ask me, because it solves such a crucial problem. I’m frankly tired of paying Google every month for storing my photos when I should just be able to buy the storage instead of renting it. What the PhotoPower does is simple, foolproof, and actually safer than storing your data on a cloud, where it could be vulnerable to hacks, outages, or being snooped on by third parties and governments. Click Here to Buy Now:Hurry! Only 6 days left.The post This Game-Changing Phone Charger Also Backs Up Your Photos To A 2TB SD Card first appeared on Yanko Design. #this #gamechanging #phone #charger #also
    WWW.YANKODESIGN.COM
    This Game-Changing Phone Charger Also Backs Up Your Photos To A 2TB SD Card
    Sometimes the simplest ideas pack the biggest punches. Everyone charges their phone overnight… so what if your phone also ran a data backup while it charged? Sounds really elementary right? Well, that’s exactly what the PhotoPower does. The world’s only power brick with a built-in SD card, this device charges your battery while running a backup of all your photos, contacts, calendars, to the card. Here’s why it’s so genius. The backup happens entirely locally to an SD card (no Wi-Fi, no Bluetooth, no cloud drive)… it happens every single time you charge your phone without you needing to remember anything or manually perform a backup. And the best part? The SD card inside the PhotoPower becomes an alternative to that pesky iCloud or Google One subscription that can cost hundreds each year. Designer: PhotoFast Click Here to Buy Now: $59 $109 (46% off) Hurry! Only 6 days left. Sure, your fast-charger can, well, charge your phone fast. But can it ensure your data is safely backed up just in case your storage becomes full? I thought not. Well, that’s the PhotoPower’s genius, really. You’re plugging your phone to charge it overnight anyway – why not have the cable also transfer data so it gets duplicated onto a physical storage device just in case your phone’s storage gets full, or worse, corrupted. The charger looks and performs like any average charger – it’s the same size as the standard power brick, houses foldable pins for easy storage, and has a 45W charging capacity, giving you fairly fast charging. The difference, however, is that MicroSD card on the top, which backs up your photos/videos, contacts, and calendar every time you plug it in. The cable that connects to your phone performs double-duty, transferring power to your phone and data FROM your phone. No Wi-Fi, no complicated setups. An app lets you program backups, choosing what you get backed up and what you leave out. The app also lets the charger know that it needs to back up just YOUR phone and not everyone’s phone. It’s a smart protocol because multiple people could use the same charger, and you could also use the same charger with multiple devices. You don’t want your phone’s backup to get combined with your sibling’s phone backup, right? Or maybe you don’t want to accidentally back up your tablet onto the charger that’s just meant for your phone. If a device has the PhotoPower’s companion app, the charger performs the backup. If it doesn’t have the app, the charger just works as a regular 45W charger – simple. Backups get faster every time you plug your phone in. The PhotoPower app ensures it doesn’t re-capture duplicates or media it’s already backed up – just the new material. And yes, even if you share a charger with a partner or sibling, you CAN have multi-device backups. The charger merely creates separate folders to ensure data doesn’t get muddled up together. USB 3.2 technology ensures transfers at speeds of 5Gbps, so a single charge cycle could also work as a backup cycle. Data gets backed up onto the MicroSD card docked inside the PhotoPower. Once the SD card runs out of data, simply swap it for another one and you’re good to go. The PhotoPower accepts cards as large as 2 terabytes in size, making it something you can plug in and forget about. Trust me, as a guy with an iPhone 15 Pro, I haven’t even hit the 200GB mark on my gallery yet (and I record videos in 4K). That said, the PhotoPower works with iPhones, iPads, as well as Android phones and tablets. The app is free, obviously. The folks at PhotoPower really believe in crushing any subscription model, especially for cloud storage. You shouldn’t have to ‘rent’ storage when you can just buy it. And you shouldn’t have to manually remember to back up your phone when your charger could just do it for you. It’s sheer genius, if you ask me, because it solves such a crucial problem. I’m frankly tired of paying Google every month for storing my photos when I should just be able to buy the storage instead of renting it. What the PhotoPower does is simple, foolproof, and actually safer than storing your data on a cloud, where it could be vulnerable to hacks, outages, or being snooped on by third parties and governments. Click Here to Buy Now: $59 $109 (46% off) Hurry! Only 6 days left.The post This Game-Changing Phone Charger Also Backs Up Your Photos To A 2TB SD Card first appeared on Yanko Design.
    0 Comentários 0 Compartilhamentos 0 Anterior
CGShares https://cgshares.com