Safari no longer allows third-party cookies!
An open letter to Senator Bob Casey on end-to-end encryption
I’ll probably end up getting whatever the new cheapest iPhone is to replace my aging 7. Still evaluating basic phone options when I’m going somewhere where I definitely don’t need a smart phone.
Signal Is Finally Bringing Its Secure Messaging to the Masses https://www.wired.com/story/signal-encrypted-messaging-features-mainstream/
“It was the intelligence coup of the century,” the CIA report concludes. “Foreign governments were paying good money to the U.S. and West Germany for the privilege of having their most secret communications read by at least two (and possibly as many as five or six) foreign countries.”
Apollo 11 vs USB-C Chargers
Services from Google and Facebook may appear to be "free", but there's a greater cost: your personal data and privacy. Thanks to BBC News for recommending ProtonMail as an Gmail alternative which protects your personal information & respects your privacy. https://www.bbc.com/news/business-50460712
From HN discussion - "This is why I use ad blockers and a pi-hole server" (https://news.ycombinator.com/item?id=22124929)
This is GDPR in action. Wow.
Hey https://www.websteronline.com, two things are wrong in this picture. #1 I'm using Firefox 72, not 68.0, #2 I'm pretty sure 72 > 52
https://www.punkt.ch/en/products/mp02-4g-mobile-phone/ is another one but apparently doesn't work on Verizon
I do like the idea of having a phone that can just make calls and text, but also tether a laptop. I would definitely use that feature during my commute.
I could see myself buying one of these "dumb" phones this year. I want to set a better example for my kids and not be on my phone all the time. My existing iPhone7 could be used as an iPod Touch while on wifi, which I'm sure I'd use just as much at home, or I could get an iPad which I feel is more explicit in its usage to act as a deterrent.
Each has their pros & cons unfortunately with no clear winner.
This is a very thorough analysis of the security principles and usability of various Two Factor Authentication systems: https://firstname.lastname@example.org/Two-Factor+Authentication