July 2024: Internet of Things (IoT), and some security tips

On, July 16, 2024, we discussed the Internet of Things (IoT), the constellation of devices that are populating our homes, from Internet-connected wristwatches (Apple Watch) to bathroom scales to refrigerators to security cameras to home speaker systems to TVs to — lots of things. Some of these things are profoundly helpful (Apple Watch), others are somewhat useless (Internet-connected Christmas tree lights), and yet others can either make our homes safer or more vulnerable (Internet-connected door locks, security lights, security cameras, etc.).

We also have a demonstration of a couple of free tools to help you keep your computer safer.

Internet of Things
Internet of Things

Security tools mentioned in presentation:

Apparency – shows you invisible, hidden characteristics of files, free, https://www.mothersruin.com/software/Apparency/

AppCleaner – deletes all parts of an application, including hidden support files and preferences, free, https://freemacsoft.net/appcleaner/

Fing: application for examining characteristics and health of your network. free to try, https://www.fing.com/desktop/

Ghostery: plug-in for Safari that tells you about the privacy and security of websites you visit, free, https://www.ghostery.com/ghostery-ad-blocker/

Go64: tool for older Macs; looks at applications and tells you if they are 64-bit (good) or not (bad), free, https://www.stclairsoft.com/Go64/

iNet: tool for scanning your network, free for most users, https://inetapp.de/en/inetx.html

Little Snitch: network monitoring tool and firewall, free to try, https://obdev.at/products/littlesnitch/index.html

Video recording of the meeting

Click on the YouTube logo for a larger view

Transcript of the meeting

Use your browser’s search function to find specific words or phrases

18:30:10 Did that.
18:30:12 And so far there's nobody.
18:30:17 So I'm recording.
18:30:19 Myself.
18:30:22 I'm not very interesting.
18:30:27 Can read jokes.
18:30:28 I could win.
18:30:29 We can eat cats.
18:30:31 I can read jokes, I'd have to have a list of jokes.
18:31:18 An iphone.
18:31:23 What do you call a fruit that is rough around the edges.
18:31:26 A bad apple.
18:31:50 Lots of memes, but then it seemed to be too many.
18:31:54 Medical jokes.
18:32:00 Which email do you use.
18:32:03 This out from.
18:32:06 The straight, Mac.
18:32:08 Vice President.
18:32:10 And.
18:32:12 Steve is here.
18:32:14 Say.
18:32:16 Me, Steve. It says.
18:32:19 Hello! Me! Steve!
18:32:33 Did you download that.
18:32:36 Emulator for Ios.
18:32:38 I downloaded the emulator. I was trying to download one of the images so I could run it.
18:32:43 But downloading the images on an iphone it takes forever it. The one I picked was like.
18:32:49 4.7 gigs.
18:32:51 And.
18:32:51 Boom.
18:32:53 After an hour it had gone about 12% of the way.
18:32:57 To download it.
18:32:57 Good Lord!
18:32:58 Yeah, well, it's an entire operating system in a container.
18:33:02 That operates within.
18:33:04 The virtualizer.
18:33:06 So you know.
18:33:10 At some patient moment. I probably will, because I am curious about it. It's 1 of those things that if nothing else I could freak people out.
18:33:18 Running Linux on an iphone
18:33:22 Or Ios. 9.
18:33:24 Probably not.
18:33:25 I'm not honest with the Mac OS. 9.
18:33:27 Yeah. Mac, OS 9, maybe. But Ios 9. Now, I'm not interested.
18:33:31 No, I'm at Mac OS.
18:33:33 But and Msdos can emulator. That also appealed to me to to run windows on an iphone.
18:33:41 Yeah.
18:33:42 That would.
18:33:41 Especially since Emma Stars is character based it. It would be hilarious.
18:33:45 Yeah, that would be funny.
18:33:51 Num.
18:33:54 So do you? How do you think the
18:33:58 In the next operating system, for Ios.
18:34:01 It's.
18:34:01 They're supposed to. Apple says they're gonna support.
18:34:05 Whatever that Google standard thing is. So that.
18:34:11 Ipads, and so forth, could connect to android people.
18:34:16 Well, they can connect right now. What they can't do is they can't do the they won't get a blue balloon.
18:34:24 And a lot of the.
18:34:26 Things that work very well on the Mac.
18:34:30 Doing reactions and so on, so forth, won't work on Android.
18:34:35 And.
18:34:37 The by adopting that standard.
18:34:41 There is a standard that Google pushed.
18:34:43 That's a 1st of all the way the way messages works right now. Sms messaging is the standard.
18:34:52 And SMS message. Genie came about back in the days of the.
18:34:58 Flip phone. And it's only 140 characters.
18:35:01 It has a whole bunch of limitations.
18:35:02 And on a Mac, as you probably know, you could.
18:35:06 You could write an entire novel in pages. It doesn't have a particular.
18:35:09 Limit.
18:35:11 And
18:35:13 Getting that to work with Android is is a pain. So Microsoft Google came up with a different standard that has better security.
18:35:23 So it supports things like end to end encryption, and so on.
18:35:27 The.
18:35:28 Problem that you run into is that end to end. Encryption is just one example.
18:35:34 Both.
18:35:35 Devices at both ends have to support the same protocol, otherwise end to end. Encryption doesn't work.
18:35:45 And.
18:35:46 If one of them supports end to end encryption. But the other one doesn't. It falls back to SMS. So.
18:35:53 You could still be running the Google standard thing. But the machine you're talking to for whatever the other machine you're talking to.
18:36:02 Might be.
18:36:03 For whatever reason, running in the SMS standard, in which case it's not gonna make any difference.
18:36:09 Whether they have the new improved software or not, it's gonna fall back on that common denominator.
18:36:14 And a lot of the things that you can do like.
18:36:18 Animated emojis, and so on, so forth.
18:36:21 There's no way for Google to do that on Android, because that A, it requires a whole bunch of horsepower. B, it's patented. There's just a lot of things that you can do on the Mac that you're never gonna be able to do.
18:36:33 On a
18:36:35 On a
18:36:36 Android machine.
18:36:37 So how successful it it is I just don't know.
18:36:42 Well, if I mean I have I run into trying to send out.
18:36:46 Group emails.
18:36:48 And not everybody has got an iphone and not everybody with an iphone.
18:36:54 Turns, on.
18:36:55 I message. Oddly enough.
18:36:57 So.
18:36:59 For me.
18:36:59 It would be a big help if I could send from a Wi-fi. Only.
18:37:03 Ipad.
18:37:05 To phone numbers.
18:37:06 Which I now can't do.
18:37:10 But you should be able to.
18:37:12 Assuming that they.
18:37:12 I can only send. I can only send a phone numbers.
18:37:14 From A.
18:37:16 Wi-fi only ipad.
18:37:18 If they're apples.
18:37:20 Devices.
18:37:21 Oh, that's right.
18:37:21 I don't think that would change with. I don't think that would change with Android, because.
18:37:26 What happens is you. You have the choice.
18:37:30 Of being able to send messages over the telephone system over SMS. Directly.
18:37:37 But that's something that Apple did. That's not part of the of the Google Standard.
18:37:42 So.
18:37:42 Oh!
18:37:43 That may not change anything.
18:37:45 See Apple, the way that apple is doing it when you send it to a known number.
18:37:51 It doesn't actually send it to the phone number. It sends it via data to that machine.
18:37:57 So it's it might look like you're sending it to phone number. But you're really not. You're sending it via the data stream. And the reason Apple did that it, written initially was, be back in the day. You could be charged 15 cents.
18:38:10 For one text, message.
18:38:10 And Apple wanted to get around it. So by having it go over the data stream rather than over the SMS stream, they're avoiding the phone company thousands of dollars for.
18:38:23 Text messages that this one.
18:38:26 A teenager in.
18:38:29 California.
18:38:30 She sent $9,000 worth of text messages in a month.
18:38:34 And.
18:38:36 Apple said.
18:38:38 We can avoid that.
18:38:39 And they avoid that by sending it.
18:38:42 To the data over the data port, to a device.
18:38:45 And via the device is going via IP. It's not V, it's not going via the phone number. You send it to the phone number. It's strictly SMS. Which, again, is that old standard.
18:38:55 And that old standard is designed.
18:38:58 Specifically for these old motorola flip phones and things like that.
18:39:03 Or the Nokia phones. It wasn't designed for it.
18:39:06 Or a smartphone.
18:39:07 Well, good.
18:39:06 And it's unencrypted. It's in plain text. It's easily intercepted.
18:39:11 But it's also 20. Some odd years old.
18:39:15 It's an old standard.
18:39:16 How does Google voice, let me send something.
18:39:19 Via Wi-fi to a phone number.
18:39:22 Well, Google voice is a little bit different. Because again, that's a Google technology. And Google built it. So that.
18:39:29 That Google voice operates purely over the Internet. It's not going over phone system. It's purely over the Internet.
18:39:37 So you have to have an Internet. Google voice doesn't work. And because it's going purely over the Internet.
18:39:44 It can then initiate a phone call from Google servers.
18:39:50 To somebody else. But it goes over the Internet, from you to Google, and then from Google. It may or may not go over the phone system. It depends upon how it is. You can send text messages via Google voice. I don't know if anyone does it. But this.
18:40:03 Friend of mine in California.
18:40:04 That's I do that all the time. Yeah.
18:40:05 Yeah. But the friend of mine, California sends me.
18:40:09 Photographs and movies and everything over Google voice.
18:40:12 And he tells me that he sent them, and then I have to go find them, because.
18:40:15 I don't know.
18:40:17 I don't know where he.
18:40:19 Where, how it's supposed to be getting to me, cause he didn't say.
18:40:22 So.
18:40:24 It's
18:40:27 It's it's it's a complicated thing. And you might even notice in messages that you can send something out to a group, and when it comes back it seems to have been scattered, and that's because if I send it to.
18:40:38 Kathleen and my daughter.
18:40:41 And text message, and it's Kathleen first, st then my daughter. They both get it. If I send it to my daughter. And then, Kathleen, that's a completely different screen. So instead of going with the same stream, it's going now with 2 different streams, and if I send it to my daughter Kathleen and my nephew. Then it's 3 different screens, and you end up with multiple streams.
18:41:04 And people replying and not replying. And with email it just it all goes in that same stream because it's going to an email address.
18:41:12 But over the messages it doesn't really know what it's going to. So it goes literally in the order that it goes, and it goes to just to that clump, and if you change the order, it creates a new.
18:41:24 Thread of messages, and it.
18:41:26 Confuses the heck out of everybody.
18:41:28 But messages wasn't really designed to replace email. I know there are a lot of.
18:41:34 Young people who do that, but it's not really designed for that.
18:41:38 The problem is that lots of people.
18:41:41 Only check their email once a week.
18:41:43 But.
18:41:44 I know.
18:41:45 You know so.
18:41:47 I'm I'm sort of forced to.
18:41:50 Send them text messages because I.
18:41:52 They may not see the email.
18:41:55 That's 1 of the things I want to talk on the.
18:41:59 Yeah. And the QA was email issue that came up.
18:42:03 And, by the way, I am recording this, and if we only have 4 people.
18:42:08 We should have complete agreement that I'm recording it.
18:42:11 I'm recording it so I can stick it up on the website.
18:42:15 The email example that I had is that I'm a.
18:42:19 Secretary for my Homeowners Association, and I sent out an email.
18:42:24 To everybody in the my list, and it's 160 addresses.
18:42:30 And one of them bounced back because the.
18:42:33 User on the other end his mailbox was full.
18:42:37 Well, since it's my own neighborhood. I
18:42:41 Called them up and said, Hey, your mailbox is full.
18:42:43 Well, his wife had died 2 weeks ago.
18:42:46 And she was the computer expert. He wasn't.
18:42:50 And he couldn't get any new messages because his mailbox was full and people were asking about. You know.
18:42:56 Funerals and memorial services, and so on, so forth, and he didn't know what to do about it.
18:43:01 So I volunteered to walk over a couple of blocks and help them out.
18:43:06 And when I got there found out he didn't know the password to his email account.
18:43:10 So there wasn't a heck of a lot I could do. Eventually his daughter eventually told.
18:43:16 Him what the password to his own email account was.
18:43:20 She knows it because she was. She's helping with the estate, but she's not even locally. She's in a different state.
18:43:26 And so now that I had the email.
18:43:29 Password in hand, we logged into his account on Microsoft.
18:43:33 And I saw that the reason why.
18:43:35 It had
18:43:37 His mailbox. It showed up.
18:43:39 Is that the there was a stop payment. The credit card used.
18:43:44 To get the Microsoft outlook account was his spouses.
18:43:49 And when the credit card was cancelled it went back to the.
18:43:54 5 GB limit, and he had 5 GB of mail.
18:43:58 And he had thousands of messages. There went from anything big, but just thousands of messages.
18:44:03 And I told him it's just Nip simply not worth it to try and figure that out.
18:44:07 So we got into his account, gave it a different credit card number, and it went back to I can't remember what the.
18:44:15 What the next bump is. I think it's like 15.
18:44:17 Gigs, at which point he had more than enough.
18:44:22 Maybe it was 100 gigs. Any
18:44:23 He had a more than enough space at that point, and he was back in business.
18:44:28 But.
18:44:30 He's probably in his 80 s. And solving this problem was not something that.
18:44:35 He could do himself.
18:44:36 And I find a lot of people.
18:44:38 In that situation they don't understand, and they don't have to be in their eighties. They can be in there.
18:44:43 Twenties. And they don't understand how email works. They don't understand how SMS works, but because SMS.
18:44:52 Immediately. They try and use SMS for everything. Somebody tried to send me.
18:44:56 A 6 and a half gigabyte.
18:45:00 Movie over SMS.
18:45:03 Hmm.
18:45:03 That didn't work.
18:45:04 But they kept on trying for a couple of weeks before they contact me and say, Why is this not working.
18:45:09 And my response was, You have a desktop computer. Why don't you try email.
18:45:14 Well, I've been in. It's been so long. I used email. I'm not sure I know how to get in. I said, Well, just.
18:45:19 Launch it, and they launched it, and it worked perfectly.
18:45:23 So a lot of people.
18:45:25 For whatever reason, they don't know how the technology they have works. This another strange example.
18:45:33 This one we got a prius.
18:45:35 And she got a Chris because she didn't like her gas bills, and she was getting like 38 miles a gallon, and I thought.
18:45:42 How can she possibly getting 38 miles per gallon in a prius? Because.
18:45:46 Even if you had the emergency break on, you should get better than that.
18:45:49 Well, I found out that she had he. Instead of having an eco sports mode, and when she's driving she would do these Jack rabbit starts and she'd slam on the brakes when she came to a stop sign. So she was doing pretty much anything she could possibly do to waste gas, so I switched it to Eco mode, and I drove around for a bit. And the Prius, can you can get a real time reading of your
18:46:14 Gas, and I was getting.
18:46:15 I've got one.
18:46:16 I'm just getting 72 miles per gallon. And she said, How did you do that? And I said.
18:46:21 You go, approach, stop!
18:46:23 You know, when you're going up to a stop line, you start slowing down before then you just let gravity slow you down. You don't use the brakes when you're go out. When the light changes or you're going through the stop sign. You go gradually you speed up, you use cruise control. You never break the speed limit. You don't take it out of eco mode, and you can make you can go many miles per hour per gallon in it.
18:46:47 Prius, and she was just.
18:46:48 Astonished. She went from 38 to 60, which.
18:46:53 It. It's not what I was doing, but for somebody who's who's learning all this new? That was much better than the.
18:47:00 12 miles per gallon. She was getting with her F. 1 50 pickup truck.
18:47:04 Yeah.
18:47:05 But she she.
18:47:08 She just thought it was just magic, just by having it. She get better gas mileage. And she was. But she wasn't getting what the salesman told she would get.
18:47:14 Because she really didn't understand the technology. And there are a lot of.
18:47:18 Young people that don't understand the technology that built into their.
18:47:22 Camera, or it built into their telephone or their a anything at all. They just don't understand the technology, and they need to have some guidance, and in this particular case.
18:47:32 He didn't understand the technology plus.
18:47:36 When his wife died it cut off his account, and he didn't know that. So he went from 100 gigs.
18:47:41 Down to 5.
18:47:43 And.
18:47:45 He. It's just it. It screwed him up and he did. He didn't know what to do if I hadn't contacted them. He's told me.
18:47:52 He'd still be probably stuck with that 5 gigs that wasn't working.
18:47:54 So it's it's
18:47:56 It's a complicated.
18:48:00 We tried to make the machines.
18:48:01 User friendly. But a lot of people see the ads on TV.
18:48:05 That it's user friendly. And they don't really think about what it takes to make it user friendly. And quite often it requires some effort.
18:48:13 I wanted to say hello to everybody we were kind of. In the middle of a conversation. There.
18:48:20 Because we were talking with ourselves because nobody else was on.
18:48:23 But this is the Q. And a session. And my question right now is, does anyone have a question.
18:48:30 Okay.
18:48:30 Ideal.
18:48:31 Yes.
18:48:32 Can you explain to me? I get notifications on my phone and it says it's got the icloud symbol.
18:48:38 Or icon, and it says, your IP address is hidden and your safari activity is.
18:48:45 Protected.
18:48:46 So I get this when I come.
18:48:48 When I leave home.
18:48:50 And I've been gone for maybe a half an hour.
18:48:53 It. This pops up.
18:48:55 Almost all the time.
18:48:56 Okay.
18:48:57 What kind of leave a Wi-fi area? Something that I was at. Can you tell me why and what it's for?
18:49:03 The answer is, the simple answer is that the Wi-fi in your home is set up in such a way that it's not protected at home.
18:49:11 What Apple has done with safari, and they've done this since.
18:49:15 It's on the iphone, it's on the ipad, and it's on recent versions of.
18:49:19 Safari.
18:49:21 It'll do end to end encryption automatically and it autom it. It anonymizes your address.
18:49:29 When you're using safari. So unless you do something to prevent it, when you go to a website, it can't track you by location. It can still track you with cookies and few other things if you if you let it, but it can't track you by location.
18:49:42 And the reason why this came up is that a lot of people being targeted by location, you go into a shopping mall, and it. They happen to know that there's a Nordstrom store in that shopping mall, and you end up with Nordstrom's ad on your on your phone while you're walking through the shopping mall. Why is that? Because the advertisers know that you're in a shopping mall that has a nordstroms.
18:50:05 Or you went to
18:50:08 Oh, what's the name of that bass.
18:50:09 Shop or someplace sporting good short store. You went there once, and then you go home, and you went there because you were buying a gift for your cousin, and you go home, and you don't do hunting and fishing. But suddenly you bombarded with these.
18:50:23 Hunting and fishing.
18:50:24 Ads from this store that you were at, because it location.
18:50:28 With the current version of Ios and ipad OS and
18:50:34 Safari on the Mac.
18:50:38 Automatically make it it, it.
18:50:41 It hides your location, and it end to end encrypts anytime you use safari.
18:50:46 Doesn't help if you're using Chrome or Firefox, or something else. But if you're using safari.
18:50:51 However, if you're home.
18:50:53 Wi-fi is not set up properly.
18:50:56 It can't do that. So what it's telling you is when you leave the house. Oh, suddenly it can use the apple privacy.
18:51:04 Controls because you're no longer on your home. Wi-fi!
18:51:08 They're like.
18:51:07 So it probably means that your home Wi-fi, needs some work.
18:51:12 So how do I find out what it needs? What kind of work it needs.
18:51:15 That I that's not a I.
18:51:17 That's not an easy question.
18:51:19 But if you if you
18:51:21 I can't remember what the name of the technology that Apple has.
18:51:25 It it
18:51:27 You can probably Google.
18:51:29 You can probably Google questions like.
18:51:32 How do I?
18:51:35 Ensure privacy, and my.
18:51:38 In in safari on my home Wi-fi system, or something.
18:51:42 And there'll be.
18:51:43 Some things on there. I will tell you that for something like that kind of nebulous question. Quite often a lot of the suggestions are stupid.
18:51:52 On mine home. Wi-fi! It doesn't like.
18:51:55 My the firewall system that I have.
18:51:57 But that's 1 of the things I'm gonna talk about today. My firewall, which is, I use to protect myself.
18:52:03 Recently told me that it's that it's obsolete.
18:52:06 And it was really nice of it to tell me that, because that's a nice kind of thing that you'd want to know about your security. But then it told me that there is no replacement, because the company that made the firewall hasn't made a replacement. But it it was very good in telling me that it was obsolete, and I'm thinking.
18:52:21 Hmm, thanks. It's not like your doctor saying there's a there's there's this drug that will cure your cold. Unfortunately, I can't prescribe it to you, cause I I don't have any, and you think.
18:52:33 Thanks, Doc. I I really needed to hear that.
18:52:37 One more.
18:52:37 But
18:52:38 Pardon.
18:52:39 One real quick question, be? Well, there's not many people on, anyway. But I'd like to have an update on how Kathleen is feeling.
18:52:49 Kathleen yesterday started her second series of chemotherapy.
18:52:55 She did her 1st set of chemotherapy starting late last year, and then she had radiation and.
18:53:03 Neither one of them were as successful either they liked. And so now they're on a.
18:53:09 You know.
18:53:11 Regime.
18:53:13 And we were planning on going to Scotland and.
18:53:17 August. And we decided, now we're not gonna do that. We're doing that because our daughter was gonna come up from.
18:53:24 England, and we were gonna go to the World Science Fiction Convention. But
18:53:27 We decided we're not doing that instead.
18:53:31 Daughters coming out here.
18:53:32 So.
18:53:33 No! Well, that would be fun.
18:53:34 Gap.
18:53:37 Also, it might be cooler here than it is in England right now, which, among other things.
18:53:40 So I can guarantee you that.
18:53:43 The
18:53:44 I just.
18:53:45 Everyone there.
18:53:45 England does not believe in air conditioning.
18:53:46 Yeah.
18:53:49 Well, last time Kathleen and I were in Scotland we went to movie theater because it was so hot in the summer.
18:53:53 And we thought, you know they have air conditioning theaters, not in Scotland.
18:53:59 Oh!
18:53:59 Nothing? Is air conditioned.
18:54:00 We're in this very dark box, and it was quite warm.
18:54:05 I can't even remember what the movie was we saw, but.
18:54:08 It was an interesting experience.
18:54:11 I'm going to post.
18:54:14 In the chat.
18:54:15 The link to the sign in sheet.
18:54:19 Because.
18:54:21 Just before I started up.
18:54:24 The Zoom session, I got a message from one of our members saying, Oh, by the way, you should have a sign in sheet. And I thought, Yeah, that'd be nice. Since I've.
18:54:35 Forgotten.
18:54:36 Every month since what March or April.
18:54:40 But it's a sign in sheet.
18:54:44 Any other questions.
18:54:52 No other questions.
18:54:57 Well
18:54:58 It just so happens that I have an answer.
18:55:00 Also talking about the.
18:55:03 The
18:55:04 Question about the privacy thing and.
18:55:07 Safari.
18:55:11 Kathleen was watching.
18:55:14 TV today.
18:55:16 And she wanted. Why?
18:55:19 Why was
18:55:23 Why was apple blowing up? Birds.
18:55:26 And I thought that was a strange question to ask.
18:55:31 And so.
18:55:33 I found.
18:55:35 A.
18:55:37 Aren't they drones that look like birds?
18:55:41 Yes, they are, but
18:55:43 I had never seen the commercial before.
18:55:45 And so I'm going to show that
18:55:49 Commercial, and a second or 2, because this also has something to do with what we're talking about today. But any questions prior to that.
18:55:59 No questions.
18:56:00 Okay. Then.
18:56:02 I'm gonna turn it over to our president and treasurer.
18:56:06 And ask if they have any.
18:56:08 Thing to say.
18:56:13 Your mind gets turned off.
18:56:16 There we go!
18:56:18 Oh, that went away.
18:56:19 I was just signing in.
18:56:21 On the.
18:56:23 Sign in sheet.
18:56:23 Didn't know if you could even see me. But anyway, here I am, welcome, everybody. It's a very small group, and.
18:56:34 I really don't have much to say.
18:56:37 I missed last week last month because I was in Europe and had a fantastic time.
18:56:44 That was oh, great.
18:56:46 Wonderful and.
18:56:52 Okay.
18:56:48 I guess I'll turn it over to the treasurer, because I really have nothing.
18:56:53 I have a little bit to say, but not too much either.
18:56:56 We did get another
18:57:04 Yeah, somebody. Yeah. Somebody paid some dues again. So just one this month, and you check cleared
18:57:16 Parents.
18:57:17 So right now our total is $1,940 and 63 cents.
18:57:25 In our account.
18:57:29 Okay.
18:57:31 Any other.
18:57:32 Oh, I do have a question. Do you know when the
18:57:36 Construction is supposed to be done on the library.
18:57:39 I. They just started it. If you look they are. They tore down most of the outer walls.
18:57:45 And they're putting in the foundation right now. You can see the port.
18:57:49 For the foundation.
18:57:51 So
18:57:54 They're.
18:57:55 They say next year it's gonna be done, and it looks like they're progressing. But I it's at the stage right now that other than drive by and say, Oh, they've done that.
18:58:03 I there's not much to see, because.
18:58:07 The they're about.
18:58:10 Oh, maybe 60 linear feet of wall. So they're missing. Most of the library.
18:58:14 And there's.
18:58:15 Yeah, I just went by this morning, and I thought, it's really taken them a long time to get to this point. I mean, I understand there was.
18:58:21 Parking lot and other stuff that they were doing. But.
18:58:24 It just seems like.
18:58:25 Several months have gone by for that little bit that they've done.
18:58:29 Well, part of the problem with construction is the people. When you when you contract for construction, it's not one contractor. It's multiple contractors.
18:58:37 The people who tear down the building and the are not necessarily the same people.
18:58:43 Who.
18:58:45 Who hold the junk away, and they're not the same people who pour the concrete, and they're not the same people who do the.
18:58:53 Outer frame and all that. So it's a it's multiple con.
18:58:57 I'm
18:58:58 A item.
18:58:59 Multiple contractors. And it just takes a while.
18:59:02 One of the things that I wanted to talk about.
18:59:06 Was.
18:59:08 The new some Zoom Beach features that you may not know.
18:59:11 Have noticed if you're using the latest version of zoom, which is 6, something rather 6 point.
18:59:17 Something.
18:59:20 They have some new things that you can do with it.
18:59:23 If you go down to the bottom, they have reactions, and you can have a reaction where you can.
18:59:28 Push a little button and have balloons.
18:59:31 Or have rockets.
18:59:33 Or.
18:59:35 Have.
18:59:37 I don't know what this thing is. Cornucopia. I don't know what that thing is called.
18:59:41 Or you can even go out and just search through the apple emojis and have.
18:59:47 Whales.
18:59:48 Which is great unless you're in Scotland. Then you think Wales are getting all the credit.
18:59:53 Little.
18:59:55 Littleistic joke. There.
18:59:57 But all kinds of strange things you can do like.
19:00:00 You can scroll down to the bottom and.
19:00:04 They have international flags and all kinds of stuff that you can.
19:00:08 You can stick in there, or you can just be very negative and have floating X's.
19:00:14 But that's something that they've added recently.
19:00:18 Yeah, which is which is kind of cool. And Steve,
19:00:21 Demonstrator that you can.
19:00:23 Turning yourself into another creature. So there are a lot of different things that they've had. They have an AI companion thing that I'm not going to mess with.
19:00:32 Because, several people have played with it, and it's kind of buggy and does stupid things.
19:00:38 So we're going to kind of ignore that.
19:00:42 But I wanted to. I wanted to show you that, because if you want to, you can.
19:00:46 Play with that and generate little things.
19:00:49 I wanted to talk about today. I wanted to talk about the Internet of things.
19:00:55 And the Internet of things is was actually inspired by something that Steve asked. Steve asked if, there were particular security cameras that you.
19:01:05 Should use.
19:01:06 When you're using when you have a Mac environment in your home.
19:01:09 And the answer is.
19:01:12 Yes and no and it's a it's a mixed question, because it's a it's not a simple.
19:01:17 It's not a simple answer.
19:01:19 And.
19:01:20 The easiest way to approach that is, to talk about something that you didn't ask about, which is the Internet of things.
19:01:25 The Internet of things.
19:01:27 Is the
19:01:31 The the ability, since the Internet is out there to add other devices that can be talked to over the Internet. So if it's something other than a computer, even an ipad ipad, an iphone.
19:01:45 Are part of the Internet of things, because they're not.
19:01:47 Even though they're both computers, they're not. We don't use them as computers.
19:01:51 We use them as communications.
19:01:53 So I'm going to share my screen because I want to.
19:01:57 If I can remember how to share my screen.
19:02:00 Where's the button for sharing? Oh, there it is!
19:02:03 I am going to share that screen.
19:02:08 And we're gonna move this out of the way.
19:02:13 On your Mac.
19:02:17 There's something called terminal and terminal.
19:02:20 Is.
19:02:20 A way to talk to the computer directly.
19:02:23 So.
19:02:25 If you say Ls Al, it list everything in the Directory that it's in. It's in my root directory.
19:02:32 It'll list everything that's there. So if I say, CD.
19:02:36 Desktop. It'll move to the desktop. And I say, Ls, I get a different listing because they're.
19:02:41 Not much on my desktop right now. That's what.
19:02:45 There are a whole bunch of commands.
19:02:47 If you.
19:02:50 Give the computer a moment that'll sit there and tell you all the different kinds of unix commands that are out there.
19:02:56 And it's taking longer than I thought. But anyway.
19:02:58 Tell me about all the different units commands that are out there. They do a whole bunch of things, but you have to be able to know how to use terminal before.
19:03:11 It did not do what I usually gives me a list of commands, but it's not doing that.
19:03:16 One of the things that you can have is something called lsof.
19:03:20 LSOF. Is a command that lists all open files. So if I press this button.
19:03:25 You'll see that there are a whole bunch of files open at once.
19:03:30 I'm having a zoom session, and they're just a whole bunch of open files which.
19:03:35 Is not terribly useful, because it's so many stuff, so much stuff there that you.
19:03:39 Don't really understand what it's doing. So I'm going to.
19:03:43 Blow the screen up a bit.
19:03:45 So you can.
19:03:47 See things a little bit clear.
19:03:53 And I'm going to say Ls.
19:03:55 OF.
19:03:56 Hyphen.
19:03:58 I.
19:03:59 This will list all the open files that have an Internet connection.
19:04:03 And right. This second, the only thing that I have open.
19:04:07 I have safari open, but I can chose that. I have.
19:04:13 Message is open, but I'll close that.
19:04:16 So those are not open.
19:04:20 And I'm going to say, Lso fi.
19:04:22 And press enter, and there are lots of things that have Internet connections.
19:04:27 So.
19:04:29 Even though there's not much running on the computer that most people can see. There are a lot of open files.
19:04:36 And it tells me what the what has opened up the files.
19:04:40 Like.
19:04:41 Some of these things are things like
19:04:44 Printer ports and.
19:04:48 Just the right whole variety of things servers that is talking to like it's talking to.
19:04:53 Server that talks to.
19:04:56 To zoom. Zoom itself has several things that are open. Just a whole bunch of things are open.
19:05:01 But one of the things that you will notice is that this is not exactly the easiest thing in the world to.
19:05:11 For mere mortals to have, because lso.
19:05:14 OF.
19:05:16 I, why is it called Lso. FI. Well, Ls is short for.
19:05:21 And so it lists files, and you can sell Al SOF.
19:05:26 LS.
19:05:27 Hyphen a. And it lists all the files.
19:05:29 Including invisible ones, ls.
19:05:33 A.
19:05:34 L.
19:05:35 It lists them, but it lists them in a in a list, and tells you more things about different ways to do that. So.
19:05:41 List to open file, says Ls list, open files. And then I means ones that have an Internet connection. And it gives you all this, and it tells you.
19:05:52 What protocol it's using and what port it's using, and all kinds of things.
19:05:55 But again, you probably don't want to do that.
19:05:57 So is there another way of getting this same kind of information? And the answer to that is.
19:06:04 Yes, there is.
19:06:06 And it's also a useful way of
19:06:16 It's a little it's a useful way of finding out how things work on the Mac.
19:06:21 This is a program called.
19:06:25 It needs to be.
19:06:27 I need to turn on.
19:06:31 Thanks.
19:06:32 Little snitch is a program that that, among other things, tells you what.
19:06:37 Your computer is talking to.
19:06:39 On an on a minute by minute basis. So right now, Running Zoom is talking to some computers in Washington, Iowa, Missouri.
19:06:48 Virginia, New York.
19:06:52 Local network means, my own home.
19:06:53 Ireland.
19:06:55 And Germany. Okay.
19:06:58 What happens if I open up something else. So if I open up.
19:07:02 Messages, for example.
19:07:05 Messages.
19:07:06 It's.
19:07:07 Probably talking to something in California.
19:07:09 If I open up Safar.
19:07:11 It might be talking to.
19:07:14 Some new places.
19:07:18 I don't see anything new, but I'm going to go to.
19:07:22 Japan, Times.
19:07:25 And it's probably gonna give me another. Probably not gonna actually go to Japan. Nope.
19:07:30 It's not going to go to Japan because it's going to an American.
19:07:36 Server that serves that, but.
19:07:38 As you do things little. What little Snitch does is tell you what you're talking to, what your computer is talking to outside of your home tells you that you're talking to things in your home. But you're also talking all these things at once.
19:07:51 And it's kind of a.
19:07:53 Interesting thing to.
19:07:59 And this interesting thing to.
19:08:05 To see.
19:08:06 And I just opened up.
19:08:09 A connection to Amazon, com Uk. And you notice it did not open a line to.
19:08:16 The Uk. Why? Because, Amazoncom, it's actually co.uk.
19:08:23 Amazon.
19:08:25 Uk site is also located in the United States, so.
19:08:29 It tells you a little bit about how things work.
19:08:31 And it tells me the things that are currently or have recently.
19:08:37 Is that open.
19:08:39 No, it's not. It told me that today I had a connection with solitaire, and it talked to the Internet. And Kiwi. Did Microsoft sharepoint all these things within the past.
19:08:51 Couple of hours have been opened and talked.
19:08:55 To something, even though they're not necessarily open.
19:08:58 Together. And the name of this program is.
19:09:00 Little snitch.
19:09:03 And it's little Snitch Mini.
19:09:05 Little snitch. Mini is free.
19:09:07 There's another version of Little Snitch, called.
19:09:11 Little snitch that you're paying money for.
19:09:13 And I don't really recommend, because almost everybody who's ever used the full version of the little snitch.
19:09:18 Have mismanage to disable.
19:09:21 Pretty much everything on their machine.
19:09:23 Because little Si Snitch.
19:09:25 The full little snitch.
19:09:28 Includes a firewall, which means that it can cut you off on the entire planet. And if you don't know what you're doing, that's probably what will happen so.
19:09:35 I don't recommend the.
19:09:37 The full version of Little Snitch. But the little snitch Mini, which is free, is definitely something worth having.
19:09:45 Another thing that's interesting.
19:09:47 Is this program, which is a fairly recent addition to the world.
19:09:52 And you can get it from the apple store.
19:09:57 And actually no, you can't get it from the apple store. This is called
19:10:01 And again, it's free.
19:10:03 And what appears he does is kind of hard to explain, so I will show you.
19:10:10 And going to launch a parency.
19:10:17 And apparently is actually running. But you can't see it. Actually, let me.
19:10:22 Let me stop! Appear!
19:10:27 Because I want to show you something first.st
19:10:30 I'm going to go to my.
19:10:32 Some applications that I have.
19:10:34 And you have an applications folder. So.
19:10:37 It.
19:10:38 It's going to tell you about things, about the applications and.
19:10:41 I'm going to pick something like.
19:10:43 This program's called Vasal.
19:10:46 If I say vassal.
19:10:47 And oh, I had it open earlier. So it remembers what normally, what get info will show you is just this stuff at the top.
19:10:56 Apparently tells you all this stuff down at the bottom.
19:10:59 And among other things, it tells you that vassal.
19:11:02 Is not.
19:11:03 Which means it's not registered with apple.
19:11:08 As being a a a developer, and also none of these things are green. So.
19:11:14 Application. Sandbox not enabled.
19:11:17 Hardly not enabled notarization, not enabled.
19:11:22 data gatekeeper. Not an evaluate. This doesn't use any of the apples security.
19:11:30 Technologies for writing an application, and you can't get it on the apple store. And it's just it's not doing what it's supposed to be doing.
19:11:38 And so now let's go to something like zoom.
19:11:41 If I do the same thing, and I ask Zoom.
19:11:44 Zoom says that.
19:11:47 It is.
19:11:51 Sandbox is not enabled. But all the rest of these things are are green. So it's it's registered with zoom. So you know, the developer really is the developer. They say they are. And all this.
19:12:01 I mentioned this because a lot of people download programs, particularly games.
19:12:06 That.
19:12:07 Are from and from under registered. If it's an unregistered developer, it means they can write a program that doesn't follow Apple's security pro calls, and you can end up leaking information.
19:12:20 Most of the games out there. Most commercial games. Not some, but most commercial games.
19:12:26 Whether they need the information or not, will.
19:12:28 Grab your name. It'll grab your IP address, so they know where you are. It'll grab the time that you use the.
19:12:36 The the game. It'll grab a whole bunch of information.
19:12:39 And.
19:12:40 Apple. If you have it on the app store, you have to reveal all of this. Well, this not on the application store. They're not a registered developer, which means they're not following any of apple security or or
19:12:55 Or privacy guidelines, whereas Zoom is doing most of them. It's got a.
19:13:00 Fairly good.
19:13:03 Record here.
19:13:03 I'm gonna pick one more, because I know it's going to.
19:13:07 Not work, right.
19:13:08 And that is X code X code is actually made by.
19:13:12 Apple.
19:13:13 And if I bring this up.
19:13:15 It's going to give me.
19:13:19 A little red mark down here at the bottom.
19:13:22 Right bob.
19:13:24 It's gonna give me a little red mark down here at the bottom, saying that it cannot.
19:13:30 Tell whether or not it has a.
19:13:32 It's securely signed by apple, because the size of the application is too large.
19:13:37 If you we go up here to the top we'll see that.
19:13:42 X code is.
19:13:43 Is 6.4 2 GB in size. So it's a big program.
19:13:47 And the reason why.
19:13:49 It's that biggest. This code is the.
19:13:53 Suite by which.
19:13:54 Apple developers developed apple programs. So it's a huge programming.
19:14:00 Database.
19:14:02 And so it.
19:14:03 A apparently. Can't.
19:14:06 Test it, using the way that I'm using it.
19:14:09 But there's another way you can use.
19:14:11 And that is just to launch it.
19:14:17 And once a parent is open.
19:14:19 We can say opened.
19:14:21 And.
19:14:23 We point to Xcode, which is way down here at the bottom.
19:14:30 And it'll go through, and they'll look at all of us, and it can actually do a lot more checks than just the ones.
19:14:35 That it shows in the get info with window, and, as you can see.
19:14:41 X code follows all of Apple's guidance, but you.
19:14:45 You have to.
19:14:46 Use a more elaborate way of reading that information. So let's go back and look at.
19:14:54 And open that up.
19:14:57 And oh, it just doesn't follow any.
19:15:00 Kind of.
19:15:03 Any kind of.
19:15:05 Proper.
19:15:06 Guidance for writing programs safely and securely, and.
19:15:10 And.
19:15:12 Taking care of your privacy.
19:15:13 Now, why do I mention this.
19:15:17 On a desk on a desktop, Mac, it's much easier to check.
19:15:21 What things are talking to than it is on your iphone or ipad, which is one reason why apple restricts what you can have on an iphone and ipad right now in the United States.
19:15:33 You want to get something for your iphone or ipad, you have to use the.
19:15:37 Apple store. You can't. You can't just go to.
19:15:40 Joe blows website and download something and have it run on your iphone.
19:15:45 Although the European Union's trying to change that. So what do you do about things like that? Well, one thing you need to be aware of is that almost any device now can have a computer chip in it. And I happen to have a program.
19:16:00 On my machine called thing.
19:16:03 That goes out there. We cannot print her.
19:16:07 I don't know why you can fix that.
19:16:11 Bye.
19:16:14 Lance.
19:16:25 Let's try this again.
19:16:29 Well, heck.
19:16:31 That was a good part of my demo right there.
19:16:33 But I have.
19:16:35 Alternatives.
19:16:36 It. Thing is a nice program. But there's another.
19:16:40 Free program that you can use for doing similar types of things.
19:16:45 And that is called.
19:16:48 Hi Nat!
19:16:54 What inet does.
19:16:55 And that's a program that runs on the Mac, and if you can download it for free. But there are also versions run on the ipad and the iphone.
19:17:03 I can. This thing up here at the top says, that's that's a network icon. And it says, you want to scan that. Well, yeah, I do want to scan that. So I press, scan.
19:17:13 And it goes out here, and it scans my network.
19:17:15 It's gonna take a few.
19:17:17 Seconds to do this.
19:17:18 And what it's looking for is it's looking for things that are on my network that are currently turned on and are talking.
19:17:30 There's that.
19:17:31 Particular.
19:17:32 Way in which computers talk to each other over net, and it's called.
19:17:37 Ip, which stands for Internet packet.
19:17:40 And that's what this is doing. It's looking out across the network in my home and everything that is talking to the network at once.
19:17:48 And it's gonna analyze this for a second.
19:17:51 And then it's gonna show me the results.
19:17:53 And.
19:17:54 If I come at this, looking at it from the top.
19:17:58 This is my router. A router is the thing that I have in my home.
19:18:03 That speds the network across the entire house. I have.
19:18:06 3 routers in my home.
19:18:08 This is one, and this is another one, and somewhere down here is a 3rd one.
19:18:13 They're they're made by Iro, which is a.
19:18:17 A company that makes
19:18:20 Something called mesh rou.
19:18:22 This android that it's talking to is this is actually a it's not an android device. It's just something that's running an android operating system.
19:18:33 This thing by Amazon is a.
19:18:37 Amazon.
19:18:38 Echo. This thing by Google is, I have several devices by Google. I'm not sure which one this is.
19:18:45 Where courts is a computer. It's a Mac computer. You notice, it doesn't have an icon at the Mac computer. And that's because.
19:18:51 Apple is very sensitive about that, so that.
19:18:54 Publish, or couldn't actually.
19:18:56 Tell you that, but it knows that it's made by Apple. It says Apple. Right up here.
19:19:00 Another Google device.
19:19:02 A healer packet. That's a printer doesn't know what this thing is, and I don't happen to know off the top of my head either.
19:19:09 Nest labs.
19:19:10 I have 3 nest labs. One is a thermostat, and 2 are cameras.
19:19:16 Courts is a
19:19:18 Macintosh, Mini.
19:19:20 Heathrow is an apple.
19:19:24 What do they call time? Capsule.
19:19:26 And.
19:19:28 Man. Manchester is another apple time. Capsule.
19:19:31 These are
19:19:34 Home, pod Minis. So they're.
19:19:37 Intelligent speakers.
19:19:38 I can ask Syria all kinds of stupid things.
19:19:40 I robot is a vacuum cleaner.
19:19:45 I don't remember what this thing is. So I'm gonna skip over that.
19:19:50 These are controllers in machinery around here.
19:19:56 This is. I'm not sure what that one is, either, and I don't know what that one is. Here's Maple again. You'll notice that Maple was listed.
19:20:05 It's listed more than once. That's.
19:20:07 I can have a wireless. I can have a Wi-fi connection.
19:20:12 On the computer same time, I have an Ethernet connection. So they're both.
19:20:16 Connections. And so it lists.
19:20:17 Maple here, and it lists maple here. One of these is Wi-fi, and the other one is Ethernet UN.
19:20:24 Emphas, another Mac.
19:20:26 This is another ipod. Mini.
19:20:28 There's a non Nintendo switch.
19:20:32 This is a Dungeness is the
19:20:35 Apple TV device that we have. They actually do look like square hockey pucks.
19:20:41 And I don't know what that is, or that is, and I can find out. I happen to know what enterprises that's Kathleen's ipad.
19:20:48 Great room. These are 2 apple.
19:20:51 Homepad.
19:20:52 Full size on pod.
19:20:54 Murasaki is my.
19:20:56 Ipad that I use.
19:20:57 For reading books.
19:21:00 This is the Google.
19:21:01 There's a Google device in our bedroom.
19:21:06 And again is a Mac. I have it so. One of those.
19:21:10 Listings was for.
19:21:12 Wi-fi, and the other one is for Ethernet.
19:21:15 Another Google device guest room is an apple TV that we have in our guest room.
19:21:21 Epson is Kathleen's printer that she has in her study. Here's another robot vacuum cleaner.
19:21:27 This is Kathleen's old laptop.
19:21:31 Another one of the
19:21:34 Hero, routers.
19:21:36 This starling home hub. I'm gonna talk in a second.
19:21:40 And Tricoter is my phone.
19:21:42 That's sitting in my pocket.
19:21:45 That's an awful lot of things.
19:21:46 Well, these are just the things that it could find.
19:21:49 In the moment. But there are other things in our house that have Internet connections. For example.
19:21:55 My watch.
19:21:57 Has an Internet connection.
19:21:58 And the reason why I didn't see the watch is the watch. Frequently we will just go to sleep, because, you know, unless I'm looking at it doesn't care.
19:22:06 And Kathleen's phone, and I have a another ipad that wasn't listed, probably because it's turned off.
19:22:12 And Kathleen's laptop is powered down and my windows computer is powered down.
19:22:18 So.
19:22:19 I'm showing you this just to show you that the home today can have a whole bunch of devices that connect to the Internet.
19:22:27 Not shown on this, for example.
19:22:29 We have a whipping's bathroom scale.
19:22:32 And you stand on the whipping scale, and it takes your weight, but it also checks your pulse. It checks your
19:22:41 The.
19:22:43 Your total body, mass.
19:22:46 Because you have to tell it how tall you are and how old you are, and a bunch of other things. So it it does a bunch of things. It's also how we get weather reports, because what it does it knows where we're located at. So when we step on it in the morning about the 5th or 6th screen that it flow that flows by. It tells us what the temperature is that day, and whether it's gonna be sunny or rainy.
19:23:07 All this from a bathroom scale. And obviously for it to do this, it needs to talk to the Internet, and it talks to the Internet, because it also sends that information on my weight.
19:23:17 To an app on my phone so I can go into the doctor's office and doctor's office. Have you raised well yourself recently? Yes, I have. Here's my chart of the recent
19:23:30 Rates my weight over time.
19:23:33 My wristwatch does the same things and send information to my phone. So he comes in. He says, what's your resting heart rate? Well, over the last.
19:23:41 Hey!
19:23:42 Weeks it's been an X and Y and Z. And how many steps have you traveled? My watch.
19:23:48 And my phone both keep track of that.
19:23:51 There are a lot of things that you have. Probably that talk to the Internet.
19:23:55 Things that we have, that we do not allow to talk to the Internet.
19:23:59 We have a new washing machine and not washing machine. We have a new dishwasher.
19:24:05 The l. 1 died after.
19:24:08 After the warranty it expired, it decided to die.
19:24:10 So we bought a new one, and the new one has an option to have it connect to the Internet.
19:24:16 I can't think of a single good reason why I'd want my dishwasher to connect to the Internet.
19:24:23 None at all, so did I set it up. No, I did not.
19:24:25 You can get refrigerators. Now that talk to the Internet.
19:24:30 And we don't happen to have one, but you can get one. Why do you do that? Well, some of them.
19:24:35 Well, you put certain things on certain shelves like you put milk here, and you putter here, and you put other things elsewhere, and when the weight disappears it thinks, okay. You've used that, and it adds that to your shopping list.
19:24:49 That sounds great, except that.
19:24:52 3 4 years ago.
19:24:54 The 1st company that did this was Samsung.
19:24:57 There was a denial of service attack against a government agency that was launched from Samsung. Refrigerators.
19:25:04 Hackers broke in and used the refrigerators to send packets.
19:25:09 To this government agency, and it overwhelm the.
19:25:13 Agency with incoming packets. It didn't care whether or not anyone responded to it. It just wanted to swap the network and it swamped the network and knocked them offline for a day.
19:25:22 And that was done with refrigerators. Why? Because Samsung and their infinite wisdom, when they were trying to figure out.
19:25:29 How to get this thing to work. So we tell, add these things to the shopping list.
19:25:33 Didn't think about the fact that somebody else might want to use the refrigerator for some other purpose.
19:25:40 There have been instances of Tesla's being hijacked by neighboring cars.
19:25:45 Somebody comes along and they wait for the Tesla owner to press the button to lock his car, and they use that symbol to break into the car and reprogram the car.
19:25:55 So it it does things like it'll flicker the headlights or change the
19:26:01 A test that makes a mechanical noise. When you start it up they change the mechanical noise to a fart noise.
19:26:08 And other entertaining things. Well, this is dangerous, because if you can make changes car, you could also disable.
19:26:15 Security systems on the car. You can also disable safety systems on the car.
19:26:19 If the cruise control, if you program it so that it's 15 miles.
19:26:25 Off.
19:26:26 You could be going 15 miles over the speed limit. You could trash because the car's going too fast.
19:26:31 Lot of reasons why you don't want to connect things up to the Internet.
19:26:36 And this gets back to Steve's question, which is, he wants.
19:26:42 Can you tell whether or not.
19:26:44 A a given security camera will work with apples.
19:26:49 Technology.
19:26:51 If you have an apple based house.
19:26:52 Well, one way to find out is you go to the Apple store.
19:27:00 And that's not what I wanted to do. Let's try this again.
19:27:14 What it's strange to do is have me download the.
19:27:17 Beta!
19:27:18 Of the next ipad operating system.
19:27:21 Right now you can get betas of the ipad operating system and the.
19:27:27 Iphone operating system.
19:27:28 I do not recommend that you put a beta version of software on your phone.
19:27:33 Because you actually need to use your phone to make phone calls.
19:27:36 But if you have an ipad it's probably safe to put the beta on your ipad.
19:27:42 Just be prepared that you might have to erase it and start over again. If you have a problem.
19:27:46 If we go to the store here.
19:27:49 Here's the Apple Store.
19:27:52 And you can.
19:27:53 And it comes up. You can
19:27:56 Try and get things like accessories and.
19:27:59 Such. So an accessory is something like a security camera. So you say what you want.
19:28:06 Camera.
19:28:07 And it goes out, and it searches and.
19:28:10 Here's a.
19:28:11 Camera bundle to work with an iphone and.
19:28:14 And here's a security camera. It's an Eve camera.
19:28:19 Which
19:28:22 Is one of many different kinds of, and that's the only one I see right happen. Oh, no, logitech.
19:28:30 Camera. These are security cameras.
19:28:32 The one that I have at home there by Google.
19:28:35 And yet, if I go up to my control center up here.
19:28:39 On my
19:28:47 Where is it located?
19:28:50 I don't see it right this second.
19:28:52 Possibly because the other things that I'm doing the control center up here will also allow me to do things like.
19:28:58 See various and sundry cameras.
19:29:00 And apparently I have.
19:29:04 Temporary, and I managed to disable that. But.
19:29:08 It'll allow me to see what my competitors, my cameras in the home.
19:29:12 Are are seeing. So I could.
19:29:13 Have a picture of the back of my head from the security camera.
19:29:17 My cameras are made by Google. They talk to Google's ecosystem. They don't talk to apples.
19:29:23 So how do I talk? How can I, ma? How can my Mac talk to them? And they use it? They talk to it, using this thing down here. It's called a starling home.
19:29:33 And.
19:29:34 I will!
19:29:36 Take you to their website.
19:29:43 And starlene labs is a small little company, and for $99.
19:29:48 They'll send all you this little brick here.
19:29:51 It's got an Ethernet port, so you plug it into your network, and then it talks via Wi-fi.
19:29:58 To, the.
19:29:59 Google devices. You register the Google devices with the starling and the starling acts as a bridge.
19:30:06 To send it into my Mac ecosystem. So I can look at my Google.
19:30:11 Security cameras, using my iphone or my Mac, or anything else I happen to have. And when I get notifications they come to my iphone.
19:30:20 Really nice thing. It's $99 subscription. It just works.
19:30:24 But this is something called a bridge, and it allows you to take an ecosystem of.
19:30:31 Internet devices designed for one system and have it talk to another, and other people make.
19:30:37 The dis similar types of bridges for other types of.
19:30:40 Of of products. So.
19:30:43 You aren't necessarily limited to just ones that are designed to work with. Apple.
19:30:48 But if we go back here.
19:30:51 How do you get these things to talk to something.
19:30:54 Well, all of these security cameras and such.
19:30:58 Need to talk to something.
19:31:00 That's running apple home.
19:31:03 And the 2 most prominent things that run apple home. Kit, are the ipod speakers.
19:31:08 And the apple TV. So the apple TV.
19:31:13 On the apple TV.
19:31:17 I don't really want to look at my apple TV controls on my Mac, because.
19:31:21 Kathleen's using the apple TV to watch the.
19:31:26 The
19:31:27 Meeting.
19:31:28 But the apple TV is a way that you register it. You register it, and you set up things called rooms.
19:31:33 And the rooms allow you to control different devices, so you can have a room for security. Cameras or the rooms can be physical rooms in your house doesn't make any difference how you set it up. You can set them up by.
19:31:45 Types of things, and then you can control them.
19:31:48 So if we really wanted to.
19:31:50 We could use that Internet connection for our dishwasher.
19:31:55 We could.
19:31:57 Go to Seattle someday and say, Oh, we forgot to turn on the dishwasher and turn it on from Seattle.
19:32:02 But just because we could do that doesn't mean that's a great idea. You want to be a little bit careful about what you connect up to the Internet.
19:32:10 Which is another reason why we like the.
19:32:12 Apple's
19:32:15 Home pods and the apple TV.
19:32:18 Because they support apple security model.
19:32:21 When you sit in front of your Mac. The only thing that the Mac is paying attention to is the person sitting right in front of them. Other words, you.
19:32:29 When you're looking at your iphone. The only person it really cares about is the person holding it. Which is you.
19:32:36 And if the security only uses, that is, the secure point means the only thing that can control.
19:32:43 My cameras and my.
19:32:45 Is.
19:32:45 My.
19:32:47 Phone or my computer.
19:32:49 It's it's a very secure type of of way to do it.
19:32:53 By contrast, the way that.
19:32:55 The security system. We had the way that our give you an example.
19:33:00 We bought a nest thermostat nest was purchased by Google.
19:33:04 So we bought it from Nest, but a year later they were purchased by Google.
19:33:09 And Google said, well, we want you to switch your account from Nest.
19:33:14 Over to Google.
19:33:15 I never did that.
19:33:17 Why? Because if somebody got a hold of my Google account, they could control my thermostat.
19:33:22 And I kind of want to control my thermostat.
19:33:25 Myself.
19:33:26 While now I've insulated it because it goes through that starling home.
19:33:31 The only thing to control it is my apple account.
19:33:33 Even though it's a Google device now, because Google bought it.
19:33:36 Google cannot control it. Google has no control over that device.
19:33:41 It only goes through things that I control.
19:33:43 So that's why.
19:33:44 I I mentioned the starling. And that's why I'm I'm mentioning these Internet of things.
19:33:50 Some things that you can get that I've seen advertised recently.
19:33:54 At Christmas time at Costco.
19:33:57 I'm gonna turn off screen sharing because I wanna actually.
19:34:00 See people here for a second.
19:34:02 At Christmastime, at Costco they were selling strings of Christmas lights.
19:34:06 That you could control with your phone.
19:34:08 So with your phone, you could change the light. So they were all red or all blue, or they would alternate or so on, so forth from your phone.
19:34:15 If you could control it from your phone means you're controlling it from your the Internet. So I was curious.
19:34:20 How secure are these.
19:34:22 But we didn't buy one of those, but a neighbor did, and I went over there and did a scan of their site, using that Ipo.
19:34:30 Command that I was showing you earlier.
19:34:33 Their Christmas tree lights. We're talking to a computer in China.
19:34:37 And really, I don't think when they bought those Christmas street lights they wanted to have them talk to a computer in China. So you have to be.
19:34:45 You have to be judicious about what you want.
19:34:48 Your devices, to talk to.
19:34:50 My my wristwatch.
19:34:52 Talks only to my iphone.
19:34:55 It also talks to apple, but what it talks to apple is very.
19:34:59 It's very defined in terms of what it sends to apple.
19:35:03 My Mac only talks to me, or Kathmain.
19:35:06 Kathleen's. Mac only talks to us 2 of us.
19:35:09 It's a very constrained universe when we add devices like our bathroom scale.
19:35:15 We thought about that a great deal, because it's recording.
19:35:19 Our our wait and.
19:35:22 Heartbeat and a couple of other things with the bathroom actually about 8 things with the bathroom scale.
19:35:26 But the way in which it does that it does it in a way that we control that data. It doesn't share that data with anybody else.
19:35:35 And that's the kind of thing that we want. We don't want to leak information to the outside.
19:35:42 You might have heard about the recent breach from at and T.
19:35:46 At, and T. Had a security breach where a 3rd party.
19:35:51 Got a list of 140 million.
19:35:54 At T. Customers.
19:35:56 Okay.
19:35:57 Kathleen, and I do not have an at t account.
19:36:00 Except.
19:36:01 That this data breach.
19:36:03 Also included former customers. Okay, is that bad? Well, we were former at T customers, and all of the at T. The former customers happened to be wireless customers, which means that.
19:36:15 Breach that happened that was only announced last week or the week before affected us, and we don't even have an account with at T.
19:36:23 So you want to be very careful about the kind of technology you bring into your home, and you want to be very careful about who controls the data coming from that.
19:36:32 Because the at t, 1, among other things.
19:36:36 Our phones have a 2, 4 area code because we bought them when we were in Maryland many, many years ago.
19:36:43 We between the 2 of us probably get a hundred text messages a day.
19:36:47 For people running for office in Maryland.
19:36:51 How did they get our phone numbers? They got them from at T.
19:36:56 Do we have a accounts with at and T. No, we don't.
19:37:02 The home for their their phones that we've just purchased in the past year or 2.
19:37:06 We, they, those phones, have never been in.
19:37:09 But because at T leaked that data.
19:37:13 We're now getting things from Maryland, saying, you know, please contribute to my house of representative campaign. I'm running for dog catcher, so on, so forth because they're blasting everybody in the 2, 4.
19:37:26 Area code.
19:37:28 And our phones.
19:37:30 Think we're back in Maryland.
19:37:31 You want to be very careful with your data.
19:37:34 And.
19:37:35 Think about.
19:37:37 What the device.
19:37:39 Could possibly share security can show a lot of things like. For example, you get up in the middle of the night and you wander into the into your kitchen, and you're not wearing any clothes, but you have a security camera that can see you along that path.
19:37:52 They're pictures of you wandering around the altar.
19:37:56 Well, where is that data? If it's on a place that you control, that's fine. If it's stored in Google's.
19:38:03 Or Amazon's account stores all of their stuff on Amazon servers.
19:38:07 Which are located all over the place.
19:38:08 You don't control those servers, you don't control where that data is going to.
19:38:13 When I record these messages for a smug.
19:38:17 They're recorded on my computer.
19:38:19 And I then upload them to our website.
19:38:22 But they're not recorded in Zoom's Cloud, because Zoom doesn't have the world's greatest security.
19:38:27 So I don't send it to zoom.
19:38:30 I recorded on my.
19:38:32 On my computer here at home.
19:38:34 And never uploaded to zoom.
19:38:37 And I've been talking for quite a while. So are there any questions.
19:38:42 Do you have to run your security cameras through that startling deal.
19:38:48 The the security cameras are still.
19:38:52 Tied to their nest account, so, in order for them to operate, they have to be logged into nest.
19:38:57 But the data that they send is not ever sent to to.
19:39:03 Google.
19:39:04 And we are the only recipients of that.
19:39:07 Information because of the starling. The starling intercepts all that tell, and tells.
19:39:12 And allows us to direct where we want that information to go.
19:39:15 It doesn't go to Google.
19:39:17 Because we never register with Google.
19:39:20 Our our thermostat.
19:39:23 Doesn't go through Google.
19:39:25 It's, it's under our control.
19:39:27 So if you bought like, when you were looking at the apple site, there's a logitech doorbell.
19:39:32 Yes.
19:39:33 Like, you know, like Amazon's ring deal, or whatever.
19:39:36 If you bought that.
19:39:36 When you set it up, would you.
19:39:39 Would use.
19:39:40 Connect that through the starlink. Then.
19:39:43 No, because the logitech is designed to work with Apple's home, Kit. So if you have.
19:39:48 A home pod, or you have.
19:39:51 A.
19:39:52 Apple, TV.
19:39:54 You already have a home Kit Base station. It needs a home Kit Base station.
19:39:59 And a homepod or an apple. TV is a base station. So at that point fire up your.
19:40:05 Phone, you register the.
19:40:08 Camera with your.
19:40:09 With your phone to the to the
19:40:12 Home, Kit, and you can do whatever it is you want to do with it.
19:40:16 Because it's under your control, and it's under.
19:40:18 It's within. It's within Apple's security.
19:40:23 So if you logged into your.
19:40:25 Doorbell from Japan, you'd be able to.
19:40:28 See whatever it's recording.
19:40:33 Yeah.
19:40:30 Only from your phone, or a device that you an apple device that you have. Yes.
19:40:34 Right. Steve.
19:40:35 So that cause the way. Tell me if this is wrong, but it.
19:40:41 When somebody rings one of those kinds of doorbells.
19:40:44 It.
19:40:45 It sends that information to the phone.
19:40:48 Is that right?
19:40:50 Somehow or other, because I've had people say.
19:40:53 Talk to me through the doorbell.
19:40:55 But they were not at home.
19:40:57 The.
19:40:58 But they could see me. They're ringing their doorbell.
19:41:01 The answer is that you can set up how you want the alerts to be set up so you can set it up so that if it sees a
19:41:09 A change in light. Our our security camera tells me it's it saw someone all the time.
19:41:16 When the sun comes up on a on a.
19:41:19 Previously rainy day, because it detects a change of light, and it says, Oh, I saw somebody.
19:41:24 And we can get it more refined, so that it could actually tell me if there is, did it see a person.
19:41:30 And then beyond that, did it? See, Kathleen? Did it see me? I didn't bother to train at that to do that, because I don't want to.
19:41:37 But most often when it says that oh, I saw someone. It's just because the light.
19:41:42 And the doorbell camera can be set up with alerts for the detecting things like that detecting motion. And again, motion is is just to a camera, a change in light.
19:41:53 It can detect motion or.
19:41:55 Or it can detect sound.
19:41:58 And if you're on a fairly quiet street, probably they only sound. It's ever gonna hear someone up coming up and talking to the doorbell. If you're on a busy street, it could. It could wake up when the car backfires, because again it's just sound, and that's the only thing you told it to Trigger.
19:42:14 So they're.
19:42:16 There is intelligent, there is intelligence you would want them to be, but they're not that intelligent yet.
19:42:21 And you probably don't want them to be too intelligent. As an example of something I would not get, though I would not get an IP control door lock.
19:42:29 The IP control door, locks.
19:42:32 They say that's nice, because if you get home and you don't have the key, you can you can get back into your house because it'll recognize your face.
19:42:41 Any kind of any kind of device like that. That's too easy to hack.
19:42:44 So. No, I'm I'm not gonna be able to.
19:42:47 I'm not going to send a signal to unlock the door.
19:42:51 It's too easy to intercept those signals and have somebody else unlock the door.
19:42:56 As as an example.
19:42:57 Oh, I don't have my keys with you.
19:43:00 If you have a remote door lock for your car.
19:43:03 People have devices that set, and they wait for somebody to press the button.
19:43:08 And then they intercept that signal, and then they reproduce that signal so they can unlock your door.
19:43:14 The your car door.
19:43:16 It's much easier on Kia's, which is why and Hyundai's are stolen.
19:43:21 Because there's there's a technology called the.
19:43:23 And immobilizer is something that's a.
19:43:25 It's a patented technology to immobilize the union.
19:43:28 If the car is locked.
19:43:30 And here and and kia.
19:43:34 Didn't purchase that technology. So they're one of the few cars that out there. That's there, fairly easy to steal.
19:43:41 But if you have a remote door lock and you have an older car like, say, you have a remote door lock for a Bmw. From 1 97.
19:43:49 That signal is not encrypted for somebody to intercept that signal, and then they can make their own little.
19:43:56 Clicker with about a hundred dollars worth of equipment. And still your 1997 Bmw.
19:44:02 There is a way to defeat it, and that is when you lock your cart.
19:44:06 Press it, twice.
19:44:08 Because it only catches one signal. The reason why it catches one signal. If you're in a big parking lot.
19:44:14 And you want to get that guy's car. You wait for that guy to press the button, and it captures that signal. If you press it twice. It sends a second signal, but you've already filled up the buffer in this guy's device so he can't.
19:44:28 He can't steal the second signal only captures one.
19:44:31 When you press that button it sends a unique code each time. If it's a modern.
19:44:36 Remote lock.
19:44:37 You're 1997 Bmw. I'm afraid, is posed. But.
19:44:41 But for more modern cars point. Every time you press a button it generates a new signal, a a different key.
19:44:46 And so if you press it twice, you've filled up the buffer of the guy trying to steal your car, and he doesn't get the second signal. He can't use it.
19:44:59 Probably one more than you wanted to know about door locks, but.
19:45:01 Getting back to your question about the Ring camera.
19:45:04 You can set up triggers, and as you want motion you want change of light. Do you want it to.
19:45:09 Yeah, facial recognition. So.
19:45:12 You know, if if Judy comes to your house and you went to let Judy in, it'll say, Oh, Judy is home.
19:45:18 And.
19:45:20 You'll know that.
19:45:21 It depends upon what the capabilities of the of the camera and the software that runs the camera.
19:45:28 And I was particularly interested in when somebody pushes the doorbell.
19:45:32 For example.
19:45:33 When they leave a package on the porch.
19:45:36 They're supposed to push the doorbell.
19:45:38 They don't.
19:45:40 But if they did.
19:45:45 Yeah.
19:45:47 Well, that's.
19:45:42 You would be notified right? It might even be able to see them. Cause I I've actually talked to people.
19:45:49 But they weren't home.
19:45:50 However, they, you know they could see me, and they because I rang the doorbell.
19:45:56 Well, it depends upon the trigger. You can set it up so the trigger can be pushing the doorbell. The trigger can be sound. The trigger can be motion whatever you set up as the trigger, or you can have no triggers at all, and you never get an alert.
19:46:09 But it's it's.
19:46:09 Can you have more than one trigger.
19:46:11 You can have more than one trigger.
19:46:13 Okay.
19:46:13 But I will tell you that around here you, if you're if you're waiting for the ups man to push the doorbell or the facts, man, they just don't.
19:46:23 Yeah, we had a package dropped off here today, and I knew about it because I was out doing errands. And I got an email, alert that it had been that Ups had delivered it. But Kathleen was home all day, and now.
19:46:36 The doorbell never rang.
19:46:38 Hmm.
19:46:38 I do find it funny, though, that I'll be sitting at my computer. And I get a message. And I look at the message, and it tells me that somebody left something on my door step. And there's even a photograph of this package sitting.
19:46:52 35 feet for me on the doorstep I I find that hilariously funny.
19:47:00 But yes, you can set up a trigger on the doorbell, so we keep track of that thing. It's just that at this point in time. I would not recommend things like.
19:47:09 Internet connected blocks.
19:47:11 They're just
19:47:12 That's too much of a vulnerability.
19:47:20 We'll see you wanted to use.
19:47:24 You're you wanted to program your dishwasher.
19:47:27 Some way or other, so you wanted to connect it to the.
19:47:30 To your home Internet. Would you do that through the Starlink.
19:47:35 No, it's designed to go through your phone. And because it's going through your phone, your phone can kind of bypass the starlink. The Starlink is the local network in the house.
19:47:45 And.
19:47:46 The Starlink talks to the nest via wi.
19:47:50 And when it talks to them to be a Wi-fi at that point the signal can't go to the outside world.
19:47:58 We unmodify cause. It's on my.
19:48:00 Home Kit, Network.
19:48:02 So, and my home Kit.
19:48:04 Reports to me through the home app on my phone.
19:48:07 Or.
19:48:09 But, by the way, they apparently they're gonna have a home app on the new version of Mac OS. That's coming out.
19:48:14 But it uses that home, Kit.
19:48:17 To tell me what the
19:48:20 What the nest cameras are doing. It's not using.
19:48:24 Nest, network.
19:48:24 So.
19:48:26 Is it going out over? Wi-fi? Yes, but the Wi-fi is only going to the Starlink, and the Starlink is rebroadcasting it through my.
19:48:34 Homepod Network.
19:48:36 Over Wi-fi.
19:48:37 It. I realize that sounds like.
19:48:40 Bait and switch, but to some extent it is.
19:48:43 It's going.
19:48:44 A syn, a secure connection from one device to another device. And then that other device is using my technology to talk to me.
19:48:52 Not Googles, not nests.
19:48:56 I wonder? Because there.
19:48:58 Some controls.
19:48:59 For example, I had to replace my dishwasher also.
19:49:02 I got a Bosch on the recommendation of the repair Guy.
19:49:05 For reasons I don't want to go into.
19:49:07 But.
19:49:09 There are so.
19:49:10 There's some controls that you can only get to.
19:49:13 If you use their app.
19:49:17 Well, we have a Bosch, and I didn't install that app.
19:49:20 Because I don't wanna talking to the Internet. So I don't know what.
19:49:24 Features are.
19:49:24 Well, for example, there's a there's a 60 min wash.
19:49:28 Which really is all I need. But it's not available. If you just were touching buttons.
19:49:34 Well, I have to talk to Kathleen. Maybe she wants a 60 min wash, but.
19:49:41 Yeah.
19:49:38 We're we're happy with what it does, so I don't care.
19:49:45 That is it.
19:49:46 I was interested in.
19:49:47 Was interested in that doorbell, though.
19:49:50 The
19:49:50 I mean, it would be nice, or just have a camera to.
19:49:52 See whether the cats are tearing up any more of my clothing.
19:49:56 Th the security camera that I got.
19:49:59 I got.
19:49:59 After I purchased the house, but before we moved here.
19:50:03 I purchased the house, I signed the paperwork.
19:50:06 So the house was ours.
19:50:08 I made sure that I had Internet coming into the House.
19:50:10 I set up a Wi-fi router, and I set up my security camera so I could see my empty home and swim.
19:50:18 While we were still living on the east coast.
19:50:21 And then, when the movers came, for example, I had a friend in.
19:50:25 In
19:50:27 In
19:50:28 Here in town.
19:50:28 I purchased a new well
19:50:31 I purchased a washer dryer, a refrigerator.
19:50:35 And those were delivered while we were still in Maryland, and our friend here in swim.
19:50:40 Came into the house, unlocked the house, and all this stuff was delivered, and my security camera told me this and says, Oh.
19:50:49 Your friend has arrived, and.
19:50:52 And there are other strange people wandering around the house with these big boxes.
19:50:56 And I could see that from Maryland. So that's an example of of the kind of thing that I wanted.
19:51:02 And then. Now that we're here, we use it for other things, we use it for, among other things.
19:51:07 Tracking deer out in the.
19:51:08 Backyard, but
19:51:11 You know those are.
19:51:13 We probably have more deer visitors than actual human visitors, but.
19:51:17 It's the kind of thing that you can do with a camera.
19:51:20 That.
19:51:22 It's it's just nice to be able.
19:51:27 We were in. We were on the east coast for Kathleen's ordination.
19:51:31 And.
19:51:32 We had a notice that there was a power failure. So I thought, well, if there's a power failure, I shouldn't be able to see security camera. So I brought it up, and no, I couldn't see the security camera. And then I wanted to know. A couple hours later, is the power back on. I bring it up, and I could see the security camera so I could tell.
19:51:50 When the power came back on. And I decided, Okay.
19:51:53 Stuff in the refrigerator is probably not going to spoil. So there are different things that you can use just.
19:51:58 Dependent upon what it is you want to do without doing anything particularly clever.
19:52:03 Jess.
19:52:04 If you have a security camera, you can sit. There is the power on. Well, if you can't see the camera.
19:52:09 Probably not.
19:52:11 So if I have the apple TV box, that's all I need. I don't need a home pod device.
19:52:17 Correct.
19:52:20 Valuable information.
19:52:23 But it's a a with the the. The point I was trying to make through this whole thing is, do you want to be careful about what you.
19:52:31 Hook up in your home to the Internet.
19:52:34 I did not get the Internet controlled.
19:52:39 Christmas tree lights and going over to the neighbor and scanning their network, I found out a good reason not to.
19:52:44 Because.
19:52:46 Why would I ever want the Chinese to know what I was doing with.
19:52:50 Christmas Tree Lines.
19:52:52 The government has
19:52:55 Has recently.
19:52:57 Prohibited the sale of Kaspersky.
19:53:01 Internet security products. Because Kaspersky is a.
19:53:06 Russian.
19:53:07 Internet security firm. And while they say they're independent of the
19:53:13 Of the Russian Government.
19:53:15 The Us. Government has information that the security information that people put into Kaspersky is being shared with the Russian Government.
19:53:24 So Us. Government put it in a band. They put in a band prohibiting the
19:53:30 Federal Government from spending money on.
19:53:33 Products about.
19:53:34 6 or 7 years ago.
19:53:37 And there's a new band that just went into effect. I think. July.
19:53:41 That bans the sale.
19:53:43 Of their products anywhere in the United States. Why, you're using this software to contract control, to to protect your computer.
19:53:51 But the fact is, and with Kaspersky active, it sends information to.
19:53:58 Kaspersky's security system to tell whether or not it's being kept up to date, and such.
19:54:04 Well, that'd be valuable information for.
19:54:07 Foreign country.
19:54:08 To have.
19:54:09 So, Department of Commerce that you're not being very transparent with what you're doing. So.
19:54:15 As of July first.st It's banned.
19:54:20 You want to be.
19:54:20 They want to be paranoid.
19:54:22 You don't want to be as paranoid as a friend of mine. He has on his Mac. He has a virtual machine of windows.
19:54:30 And when he talks to the Internet.
19:54:31 He uses the he launches the virtual
19:54:37 Windows to talk to the Internet when he's done.
19:54:41 He destroys that copy of windows, he literally throws it away. So any information.
19:54:47 It's captured, he throws it away.
19:54:48 And then the next time the Internet, he makes a copy of his.
19:54:53 Virtual machine launches that talks the Internet. When he's done he throws it away.
19:54:58 He's very, very, very paranoid.
19:55:00 And I also found out, never go out to lunch because he doesn't ever carry a credit card. So.
19:55:05 I didn't want to get stuck paying his bills so.
19:55:09 We didn't have lunch together too often.
19:55:11 Does he? Does he have his phone, whatever that.
19:55:15 Ultra secure settings on his phone.
19:55:18 Now he used a he used a government phone, all of the.
19:55:22 All of the phones that know where iphones, because they have much better protection. And that was the that was his phone. He didn't have a private one. He just uses government phone.
19:55:32 And it was just. It was set up using a secure that we developed.
19:55:36 Like, for example.
19:55:38 And the government phones. We've prohibited 3rd party applications. You got the applications that came with the iphone. You didn't get any others.
19:55:46 And some of the applications that the iphone came with. You weren't allowed to use, and we could. We could remotely disable them.
19:55:53 So we were. We were very paranoid.
19:55:57 Do you see that Microsoft has.
19:55:59 Made its people in China use iphones instead of android phones.
19:56:05 The good news. Bad news about that is the apple. The version of Icloud that they use in China.
19:56:11 Is.
19:56:12 Run by the Chinese governments, run by a 3rd party.
19:56:16 But that 3rd party is located in a building operated by the Chinese.
19:56:21 Revolutionary Army.
19:56:24 And that's why Apple, when they go to China and government agencies when they go to China.
19:56:29 You have a sanitized laptop or a sanitized iphone.
19:56:35 And you go to China with your phone, and when you come back they race it.
19:56:39 And start over again.
19:56:41 And same thing with your laptop, your phone, anything you take there.
19:56:44 And poster child, for this was about.
19:56:47 1520 years ago.
19:56:49 The Department of Commerce, the Secretary of the of the Department of Commerce.
19:56:54 Went to China on a trade.
19:56:56 He was giving a presentation.
19:56:58 And.
19:56:59 There was a something that happened, and for 90 seconds he was away from his laptop.
19:57:05 The Chinese came in and stuck a USB. Drive in the side of his laptop.
19:57:10 Infected it with spyware, and that spyware was active in the Department of Commerce for a month before it was discovered.
19:57:16 And by that time it spread throughout the entire Department of Commerce.
19:57:20 And the Department of Commerce.
19:57:22 As a result of that, was cut off from the interf for over a year, while they sanitize every single piece.
19:57:28 Of electronic equipment in the Department of Commerce.
19:57:31 So that's the you have. You have a reason to be paranoid about these things.
19:57:36 And you're not. You're a lot of people think. Well, I I live in swim. Nobody's gonna bother me. Yeah, they do.
19:57:42 Hmm.
19:57:48 Any other questions.
19:57:55 One other thing I wanted to show people.
19:58:01 Was I? It's something I went to.
19:58:03 Just
19:58:04 It's important that everybody know how to use this utility. So I want to show you there's a manual for disk utility.
19:58:12 That's online at Apple. And I gotta.
19:58:14 Show that to you for a second.
19:58:17 Let's.
19:58:18 You.
19:58:24 But Apple has an online disk. Utility guide.
19:58:29 Gonna close that.
19:58:31 And it's got a whole bunch of
19:58:35 Things that.
19:58:36 You can do with it, and you click on this, and it gives you more information. But.
19:58:40 Disk utilities inside your utilities folder, and you can use it to check the health of your hard drive.
19:58:46 And I mentioned this because about half a dozen questions I've received.
19:58:50 Over the past month.
19:58:52 From people not just in a smoke, but elsewhere.
19:58:55 Have been when they're hard.
19:58:58 Was having problems and.
19:58:59 They didn't know how to check it. Well, this.
19:59:02 Utilities and your utilities folder. You launch it. There's a i'll I'll launch it.
19:59:07 Easiest way. Just tell you this.
19:59:11 This is disk utility. I have a lot of hard drives connected to my machine.
19:59:14 And what you do is you just pick a hard drive like this one.
19:59:18 And you press this 1st 8, and it'll run disc first, st and I don't want to do that because running disk 1st aid will slow down my machine.
19:59:28 Which is not good when you're doing the teleconference. But Apple has this online guide, and I'll.
19:59:33 Send out the link to this.
19:59:35 But
19:59:37 Disk utilities is probably one of the best.
19:59:41 Utilities you have on your Mac.
19:59:43 For maintaining the health of your Mac.
19:59:45 Especially for older Macs.
19:59:47 Older, Max. The discs.
19:59:50 We're out.
19:59:50 In the past 4 months I've replaced 4 drives.
19:59:54 On my machines, and I looked at them.
19:59:56 Each one of them had been in use for over 50,000 h.
20:00:01 Which is several years, and.
20:00:03 The average hard drive has a warranty of only a year.
20:00:08 And 50,000 is well over.
20:00:10 It's 5, 6 years. I don't remember.
20:00:13 I figured it out, but it's a it's much way beyond the warranty.
20:00:17 And when people say that they had their their old machines not working.
20:00:22 Quite often. It's because the drive is just.
20:00:24 Worn out.
20:00:28 Somebody gave us, gave the club.
20:00:30 A 17 inch. Imac.
20:00:33 And it would. They said it wasn't working. The reason why it wasn't working, because the drive.
20:00:38 What was.
20:00:39 Replacing a drive in a 17 inch.
20:00:43 Imac that was produced.
20:00:45 In 2,016.
20:00:47 Would cost more than it would to go out and just buy a new Imac.
20:00:51 So.
20:00:52 You should be aware of the fact that you really can check this stuff.
20:00:56 And
20:00:57 See how healthy things are.
20:01:02 Any questions about anything I said.
20:01:06 The little snitch, and the other one was appearance.
20:01:12 Appearance.
20:01:11 Apparently. I'll I'll put.
20:01:13 I'll put that in my notes.
20:01:15 Apparently.
20:01:15 Okay.
20:01:16 And.
20:01:16 And that's not available from the app store. Is that right?
20:01:20 No, it's not.
20:01:21 And the reason is that in order to do some of the things that it does.
20:01:28 It doesn't follow some of the apple Security guidelines.
20:01:32 This looks into things in a way that.
20:01:35 Won't permit things to do.
20:01:37 It's not doing anything.
20:01:39 Damaging. It's just that
20:01:41 Apple doesn't allow applications to do the kind of things that it's looking at doesn't damage anything. It's just looking.
20:01:48 But.
20:01:50 It's it's something that Apple doesn't do like. For example, that network scanner I have.
20:01:54 I'm another network scanner that wasn't working.
20:01:57 That gives me a lot more information.
20:01:59 But the the net is available on Apple's
20:02:05 Mac store for free.
20:02:07 And apple puts limitations on what.
20:02:10 Kind of information it can pick up on your machine.
20:02:12 So you can't.
20:02:14 You can't get the other one from Apple's. I
20:02:17 Store, but you can get inet and Inet is free.
20:02:23 It. It's I. I recommend it almost anybody. If you have a desktop, Mac download from.
20:02:29 From Apple's store and just run it. You'd be surprised at what's on your network.
20:02:34 Cause. You probably have things on your network that you don't know about.
20:02:38 When I was in
20:02:40 Columbia. I couldn't figure out what this one device was showing up all the time, and it turned out it was the.
20:02:45 It was, the electric company had stuck a remote monitor.
20:02:50 On our
20:02:52 Electrical system, so they could monitor our electrical uses.
20:02:56 Remotely what I didn't realize. It was using our network to send them that information.
20:03:01 So I got torqued off. Once I found out what it was, and I blocked it from sending it on my network. So at that point. They had to send a guy out to read the meaner all the time, and.
20:03:10 Oh, I was just.
20:03:12 But that was so sad, but.
20:03:14 No. Why should he use my network to send them information? So I blocked it.
20:03:20 I'm evil.
20:03:24 Any questions.
20:03:29 My daughter's gonna be here in August and other people probably gonna be on vacation. You'll notice not too many people came today. So I'm suggesting that we probably skip August and work on something for Decem. September.
20:03:42 He'd send me ideas that you might want on topics to talk about in September. I'm also going to look into.
20:03:49 Having an in person one.
20:03:51 If we do an in person one, it'd probably be on a Saturday afternoon.
20:03:55 And it would probably be at the.
20:03:57 Trinity, United Methodist Church in swim.
20:04:01 There are some things that I just want to.
20:04:05 Physical demonstration.
20:04:06 That involves some of the things rebooting which is not really a good thing for zoom session.
20:04:12 You can't see some of the things that.
20:04:15 I went to show.
20:04:17 I have a quick question. Do you know how much it is to go to Trinity?
20:04:22 How much it is.
20:04:24 Because I'm a member of Trinity. It won't cost you anything.
20:04:29 It won't cost us anything.
20:04:30 They used.
20:04:30 But we wouldn't be able.
20:04:31 They used to have like a.
20:04:33 $50 fee or something like that, but it doesn't apply.
20:04:39 So could we start having in-person meetings there instead of the library.
20:04:44 Asking too much.
20:04:44 We could the one meeting we had there. People didn't like the fact that the screen was up so high, and they said it hurt their neck. Having to look up at the screen.
20:04:53 Th. That's on my list of things to change at Trinity, but it requires many.
20:04:58 And so I told him. I want to move the screens down, but.
20:05:02 Building modifications are not under my control, so.
20:05:07 I can't swear that's gonna happen anytime soon.
20:05:10 And they might not like to do that.
20:05:12 At all, so I just don't know but
20:05:17 Yes, we could have regular meetings there, provided it didn't interfere with anything else like.
20:05:22 Things that have more priority, the blood which.
20:05:26 The file. I'm counting blood. They hold them there at Trinity all the time.
20:05:30 They have concerts.
20:05:32 The Olympic grand chorus and the.
20:05:35 Squam orchestra and Port Angeles, orchestra.
20:05:38 A lot of groups use the church, and we're gonna be fairly down on the on the totem pole.
20:05:45 But yeah, we can. We can ask.
20:05:50 And we get it on the calendar.
20:05:53 We can use it.
20:05:55 Sounds good.
20:05:57 And I doubt so many people would even want to go.
20:05:59 Come wintertime, because a lot of people don't like to drive at night when it's dark.
20:06:05 Oh, I wouldn't.
20:06:05 I learned from the last time when we had a live meeting.
20:06:09 People. Saturday.
20:06:11 In the afternoon, even in the wintertime it's light out.
20:06:15 Perfect.
20:06:15 And that was acceptable for people, because unless they're doing something on the.
20:06:20 A Saturday. They feel very comfortable wandering around and.
20:06:24 On the afternoon. I wouldn't recommend us doing it this next Saturday, because.
20:06:28 Swim is going to be packed with people. But on a normal Saturday it's.
20:06:33 Too sweet.
20:06:34 I was making fun of. I I drove into swim today, and at this one stoplight there were 8 cars in front of me.
20:06:43 Just imagine, this is terrible traffic. 8 cars.
20:06:49 We're having our.
20:06:52 Sun, bonnets.
20:06:54 Quilt Club Show at Trinity. This weekend.
20:06:58 Oh, good!
20:06:58 So stop by.
20:07:02 Friday and Saturday.
20:07:03 I was not interested in the quilt show until I saw it a couple years ago, when it was in.
20:07:08 Pioneer Park.
20:07:09 And I was just blown away. I had.
20:07:14 My my grandmother won a.
20:07:16 A prize at the Eastern Washington State Fair.
20:07:19 In 1,900 for this bicentennial quilt that she made. It was this huge quilt that had.
20:07:25 Images of all the birds of all 50 states.
20:07:28 And.
20:07:28 Oh, nice!
20:07:29 That was very nice, but that's what I thought. The state of the art was for quilts.
20:07:33 And some of the quotes that I saw at the Quilt show. I was just.
20:07:37 They're breathtaking that just.
20:07:39 Genuine works of art.
20:07:42 So.
20:07:43 Work.
20:07:42 Yeah, that is on my list of things to do.
20:07:45 We're pleased to have it there, because the quotes will be.
20:07:49 Put over the fuse.
20:07:52 And.
20:07:54 It. It should be a good show. We're hoping so.
20:07:57 Well, I when I was in Pioneer Park. One of the things I noticed is that when the wind came up it was rather challenging. You have this.
20:08:05 Yeah, they had to take them off the scaffolding pretty fast.
20:08:08 Yeah, they, the quilts are heavy, and when you hit with one that's being blown by a breeze, it.
20:08:14 It can sting a bit.
20:08:18 Anyway, I will.
20:08:21 I will plan on something for September, and please send in suggestions as to what you would like as topics.
20:08:28 Alright. Thank you.
20:08:30 Sounds good.
20:08:32 Thank you.
20:08:32 Thank you very much.