I know — it’s inconvenient to configure, but you’ll be glad that you did, when you’re no longer bothered by those awful pop-ups.
Are you confused by the FBI vs Apple dispute regarding Syed Farook’s iPhone? I am.
In an excellent article published today, Cnet neatly summarized the delicate position in which Apple finds itself, following the issuance of a court order that compels Apple to help authorities unlock the iPhone 5c that was used by Islamic terrorist and mass murderer Syed Farook.
The nugget that surprises me is that the FBI appears to be preparing a brute force attack on this iPhone’s 256-bit AES encryption. This is a daunting task. To brute-force attack encrypted data that’s encrypted with AES-256, you need to try each of 2256 or 116,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000, 000,000,000,000,000,000 possibilities. That’s more than the number of atoms in the universe.
If Farook chose a strong passphrase, it could require thousands of years for most computers to decrypt his data. It appears that the FBI has serious horsepower to throw at this task.
It runs on battery power for hours, but you must provide a battery charger with a mini USB connector.
Its only problem is that occasionally it disconnects its Bluetooth connection. This suggests that it needs to be reset, but there is no reset switch. I’m not convinced that turning off its on/off switch actually resets its CPU. Nevertheless, leaving the T3 off for hours does seem to restore its willingness to remain connected.
With that one connection caveat, I recommend this neat little speaker . . . and it costs only about twenty dollars.
I just realized that I’ve not described how I listen to podcasts, recorded audio, and live radio broadcasts on my phone.
My first streaming audio experience was in 2000 with the Windows-based MP3 player program called Winamp. Its Shoutcast network of streaming sites is built upon the traditional broadcast model: content on each channel is delivered in a continuous stream. A listener may not demand or replay any content. There are (or were) thousands of Shoutcast channels. I still occasionally listen to Shoutcast streams on my phone using Winamp for Android (which may no longer be available). I wrote an article or two about Winamp’s latter day rough sledding.
Content on demand
I began listening to both live and pre-recorded audio with an older version of TuneIn. Its creator sold TuneIn to a company that has ruined it with too many ads and unnecessary “features”. I’ve stored an early version for Android. This older version is much better than the new version that’s available in the Android Play Store. If you have an Android device, feel free to download and install my version.
When Tunein began to degrade, I turned to Podcast Addict on my Android phone. It’s very flexible, and its many options can intimidate a first-time user. Have patience. Its power is worth climbing the learning curve. I now use Podcast Addict for most of my phone-based audio listening.
Tip: If one of these programs responds slowly, go to Android Settings, More, Application management. Select the sluggish program. Press the Force stop button. Press the Clear Cache button. Restart the program.
While watching a Youtube video clip about the recovery of a stolen bicycle, I learned about Burner, a smartphone app that allows a smartphone user to temporarily mask his or her phone number with an alias phone number. It’s available for iPhones, but not yet for Android phones. (originally published on 31 December 2012. 9 July 2014: Burner is now available for Android phones, as well as IOS.)
Theft recovery seems like a perfect use for telephone anonymity. The victim, who’s a Portland, Oregon resident, responded to a Seattle Craigslist for sale ad for what seemed to be his stolen bike. He used Burner to make his phone calls appear to originate in Seattle.
Are you ever late for appointments? When traveling to rendezvous with someone, you may now use Glympse.com to keep your friend or business contact apprised of your geographical progress. Portable apps for IOS, Android, and Windows Phone smartphones are available.
Your friend / business contact (and no one else) will be able to track you from any Internet-connected web browser as you approach your rendezvous point. You can also periodically securely share your location via email, SMS text messaging, Facebook, or Twitter.
A serious flaw in Apple’s TLS/SSL (Transport Layer Security/Secure Sockets Layer) was discovered last week. All current Apple hardware and software was found to be vulnerable to bogus security certificates. Apple reportedly pushed out patches to iPhones and iPads using IOS 6.0 and later. This week they released a large OS X update that includes a fixed TLS/SSL module.
Visit https://gotofail.com to learn if your Apple device is vulnerable. If so, get thee to the update.