Taking Photos? Use a “Real” Camera Instead of Your Phone

lakesuperiorUsually my annual “Steve’s Road Trip” adventures are out west to the mountains, or down to the desert southwest, but for the second summer I’m headed to the north shore of Lake Superior before summer gives way to the fall. I’ll also go up to Ely for a day (and stop at former National Geographic photographer, Jim Brandenburg’s gallery) and so I can also head over to Sigurd Olson’s Listening Point and take some photos. (You can read my 2014 post about my first visit to Listening Point here).

When I mentioned my trip to a buddy of mine he asked, “Are you going to shoot with your iPhone?” I thought he was joking, but in the past we’ve talked about the “photography revolution” since smartphone shooting has essentially killed the “point and shoot” lower end camera market, and ad campaigns like Apple’s Shot on iPhone make it seem like anyone running around with their iPhone will get National Geographic-worthy photos (reality check: you won’t).

So that begs the question: Do you shoot important photos with your smartphone? Read More

Private Internet Access Pulls Out of Russia

pia-logo2_12xgPrivate Internet Access (PIA), my VPN of choice, just made a gutsy move that any of us who use the service are applauding, and one I’ll wager will also pay off with heightened awareness of their service.

You may have heard about a new “anti-terror” law that Russian President Vladimir Putin signed into law this past week. At its core the law dictates that communication companies doing business in Russia will have to keep a record of their users’ calls, text messages, photos, and internet activity for six months, and store ‘metadata’ for three years, according to the International Business Times.

Since PIA’s servers in Russia keep no logs—and key to the PIA service is that do not log any traffic or usage by customers on any of their servers—the Russian government seized their servers!

This is what was sent out late yesterday to PIA customers:

To Our Beloved Users,

The Russian Government has passed a new law that mandates that every provider must log all Russian internet traffic for up to a year. We believe that due to the enforcement regime surrounding this new law, some of our Russian Servers (RU) were recently seized by Russian Authorities, without notice or any type of due process. We think it’s because we are the most outspoken and only verified no-log VPN provider.

Luckily, since we do not log any traffic or session data, period, no data has been compromised. Our users are, and will always be, private and secure.

Upon learning of the above, we immediately discontinued our Russian gateways and will no longer be doing business in the region.

To make it clear, the privacy and security of our users is our number one priority. For preventative reasons, we are rotating all of our certificates. Furthermore, we’re updating our client applications with improved security measures to mitigate circumstances like this in the future, on top of what is already in place. In addition, our manual configurations now support the strongest new encryption algorithms including AES-256, SHA-256, and RSA-4096.

All Private Internet Access users must update their desktop clients at https://www.privateinternetaccess.com/pages/client-support/ and our Android App at Google Play. Manual openvpn configurations users must also download the new config files from the client download page.

We have decided not to do business within the Russian territory. We’re going to be further evaluating other countries and their policies.

In any event, we are aware that there may be times that notice and due process are forgone. However, we do not log and are default secure against seizure.

If you have any questions, please contact us at helpdesk@privateinternetaccess.com.

Thank you for your continued support and helping us fight the good fight.

Sincerely,
Private Internet Access Team

Thank you PIA team for keeping us safe and taking a stand against repressive regimes like Russia.

Microsoft’s “Skype Meetings” Fail

skype-meetingsHere is how to acquire a perfectly good technology, Skype, and morph it into such a horrendously bad user interface (UI) kludge as to make it a running joke in tech circles. Virtually everyone I know is quitting Skype and is using an alternative*.

I’ve used Skype for over ten years. The Windows and Mac versions were never the same, but they were both standalone clients and it was relatively easy for me (on a Mac) to coach someone (on Windows) on how to use the platform and I frequently used it for collaboration. Not anymore!

The UI on Mac, Windows, iOS, Android, the Web and now this God-awful-excuse-for-meetings, Skype Meetings, are each different and seem to change frequently. The only way for someone to coach someone through getting set up and using Skype in any form is to actually have that version (and device) in front of them. Otherwise it’s basically impossible to tell someone what to do and what to click to get the thing to work (or do something simple like screensharing).

If you don’t believe me, click on these screenshots from Google images showing the explosion of UIs for Skype:

Don’t believe me that it is hard to coach someone on how to use Skype? Windows has standalone clients (XP, 7, 8) and Metro UI in 8.1 and the new Win10 version, but ALL OF THEM ARE DIFFERENT so try telling a friend, family member or colleague the process of setting up their audio input and speakers and then sharing their screen with you. Go ahead….I’ll wait.

Oh…you couldn’t do it, heh? Then try finding and sending them a URL for their particular version. Oh….there are at least half a dozen places on the Skype site to find how-to information so that doesn’t make it any easier.

My guess is that Skype Meetings is supposed to change all of that by leveraging Skype’s audio, video and screensharing in to a single platform. If my experience trying to get setup today is any indication, THAT certainly won’t happen!

Read More

Suburban Chev’s Completely Worthless Live Chat

suburbanchev

Saw a commercial last night about a General Motors “up to $X cash back” on several of their cars, including the 2016 Chevrolet Volt. The $7,820 cash back would take the “Premier” model price-point drop down around the current 2017 entry-level model’s price.

So before heading over to our local dealer, Suburban Chevrolet, I was at my computer doing some other stuff so thought I’d try out their live chat and just ask about availability. There was no 2016 inventory on their website, but dealers know they have a limited window to dump last year’s models and will swap out vehicles when needed.

This live chat was such a complete and utter waste of time that I am drop-jawed American car companies still use such plaid-sport-coat sales tactics and it felt like I was car shopping in the 1970s.

Just so you know, the live chat was all about qualifying, and obtaining an email or phone number, instead of answering ANY simple question (one they should know, of course).

Read how this third party chat group evades answering anything… Read More

Eeros Wifi System’s Backdoor

image

Started to research the eero Wifi system today after a tech buddy’s endorsement this past week. My wife and I would love to saturate our 3500 sq ft home with 5ghz Wifi signal, instead of our remote spaces only getting the 2.4ghz, and the eero super-simple setup and mesh networking seems VERY intriguing.

The eero system is described by the company as “self-healing” because it “phones home” to their servers to update as it learns from other people’s installations. Amazon reviews were glowing and my wife was excited, but I said I had to research their security model before buying.

After poking around a bit I then read this post by a guy I follow Brian Krebs (he’s the guy that broke the Target breach story) and he seems convinced. But reading what the CEO said in Brian’s interview with him, and people in the comments, confirmed my suspicion: eero uses public key cryptography but *eero* holds the key. That means they would be able to gain full access to our internal LAN (and all devices on our network) or be compelled to hand over the key for access by who-knows-whom.

Guess we’ll pass.

Over 3 Years Later, OVH Attacks Keep Coming

My GOD am I ever weary of the scumbags who invest their time, energy and effort in acting like script-kiddies attacking WordPress sites. It’s exploded in the last few weeks and, once again, the lion’s share of attacks are coming from that haven for black-hat hacker wannabees, OVH in France.

Over three years ago I wrote, “Brute Force Attacks Coming From OVH in France” after I’d reached out to Octave Klaba the “founder, chairman and cto” of OVH. He didn’t care then and I’m certain he won’t care now, but you’ve got to check out this stream of attacks today in less than a minute to see why I’m so agitated:

ovh

Again, Klaba made it very clear to me all those years ago that he could care less about online abuse like this which is why I’ve redirected all the standard URLs for these attempts so they go to Interpol. Maybe some Interpol sysadmin will wonder why they’re now receiving so much traffic from OVH and at least make an inquiry. This shit has to stop.

We’ve Come Far Since Macworld 1989

When it comes to computers and digital devices, it’s often tough to see how things evolved unless you were living through it. This video, on YouTube but also where I originally found it at the Internet Archive of a Computer Chronicles show from Macworld 1989, will give you a sense of how tiny, incremental changes were big news at an event like this one.

The new “030” chip (the processor in a new Mac SE/30) to “accelerator cards” to “color output” was that big news which, watching this video now, seems like a big snooze! It does, however, show how tiny incremental changes led to where we are today.

While I wasn’t at this particular Macworld (I was at several both before and after this one) it was an exciting event and the show was packed with vendors who sold lots of gear to go with the Macintosh.

A review of the annual west coast Macintosh trade show from San Francisco’s Moscone Convention Center.

Guests: Charlie Jackson, Silicon Beach; Roy Endres, Multi-Ad Creator; John Warnock, Adobe Systems; Brian Welter, Altsys

Products/Demos: Claris MacWrite II; Silicon Beach Supercard; Texas Instruments Action!Tektronix Quick Inkjet; Kodak Color Video Printer; Thunderware Lightning Scan; Dove Marathon 030/SETPS Smartcard ADBMicrotech R45 Cartridge Drive; Ricoh Erasable Optical Drive; Activision Manhole; Nexsys Gas Plasma Display; Berkeley Systems Outspoken

Is Congress Really Gearing Up for an Encryption Battle?

bitsAfter the attacks in New York on September 11, 2001, Congress passed the poorly thought-out Patriot Act. Friday’s Paris attacks seem to be (once again) providing Congress with another excuse to try and legislate making United States encryption weak and putting another obstacle in the way of U.S. technology companies selling overseas.

That’s right….weak. Virtually every single cryptography expert on the planet knows that a force-mandated “backdoor” in software or devices will not work and will make the systems vulnerable to attack by black-hat hackers or state-run military cyberattacks.

Today’s Wall Street Journal had this front-page article, “Paris Attacks Fuel Debate Over Spying – Growing belief that terrorists behind assaults used encrypted communications prompts re-examination of U.S. policy on surveillance.” A few things from the article leapt out at me:

“A growing belief among intelligence officials that the terrorists behind Friday’s Paris attacks used encrypted communications is prompting a far-ranging re-examination of U.S. policy on data collection and surveillance.”  

No kidding. Anyone on this planet with intermediate technical skills can encrypt their communications.

Senator Richard Burr

Senator Richard Burr

Sen. Richard Burr (R., N.C.), chairman of the Senate Intelligence Committee, said Tuesday his panel will launch a review of encryption use. “It is likely that end-to-end encryption was used to communicate in Belgium and France and Syria,” Mr. Burr said. He said encryption was likely because no direct communication among the terrorists was detected.”

Really Senator? Maybe they met in person?

But this is the part of the article that made me choke on my breakfast muffin:  Read More

Anyone, Anywhere, Anytime (Unless You Use Apple)

webrtcAs more of us work virtually, it is imperative that we can communicate with each other easily, seamlessly, and that the web browsers we use support standards vendors agree upon.

One such browser-based technology already exists. With it you launch a web browser that supports this technology and “call” anyone, anywhere who has internet access. You could see them on video. Share your screen with them. Get in to a chat or a group chat. Share files with each other. Plus, since web browsers run on virtually every modern mobile device, this ability would extend to your communications anytime.

Unfortunately, the #1 most promising technology, WebRTC, is only minimally supported at this moment. A standards battle is underway and is yet another one amongst giants hoping to dominate the next wave of unified communications…to our detriment IMHO. Seamless, easy, ubiquitous communication capability—with anyone, anywhere and anytime—should be in our hands already. The technology exists and works well.

Read More

One Word Describes the Retina iMac with an SSD: Wow!

retina-imac

Yesterday I picked up a 27″ iMac with Retina display that I’d ordered in December with some end-of-year money. The machine has so stunned me with its display, thin design, and super-fast solid state drive (SSD), that it has almost instantly changed my relationship with my Mac.

huggingYou may ask, “What…are you in love with your Mac, Borsch? Do you hug it?” (That came from a buddy in an email, who thinks I have far too much affection for technology!). 😉

The answer is “yes” since my face is in front of this machine for hours each day. I use it for photo work, video editing, podcasting, writing, finance work, and a bunch of other tasks. I’d played with one in the store, but until I got it home, migrated my previous 27″ iMac’s files and settings to this new one and started to use it, did I realize why and how that relationship has shifted with just a couple of hours of use.

In no particular order, here are a few impressions with only a few hours usage:

Read More