Yet more about email

SMUG Meeting, October 19, 2021

Meeting notes by Kathleen Charters

Q&A

Which new computer to purchase? Apple released new MacBook Air, low end MacBook Pro – very similar; Mac mini, iMac all use M1 chip fast low power; Lawrence bought Mac mini and uses it for SMUG demonstrations; M1 chip MacBook Air replaced older version and solved problems, iMacs set up at Costco, colored, fast, screen bright and crisp; a step up from what came before, screen is 24 inch all the way to the edge and brighter and machine has a lot of power; yesterday 14 inch MacBook 2 screen sizes; M1 Pro (twice as fast as MacBook Air, most users do not need to compile programs), and M1 Max; if OK with size of MacBook Air lighter and fast; Mac mini customizable screen and keyboard; see iMac at Costco; new laptops – SD card port for photos, HDMI port, 4 USB-C ports; MacBook Pro Max demo of multiple screens running off of a laptop but not a common need;

Laptop vs desktop – iMac and Mac mini do not take up much space and cheaper than a laptop; if do not need portability get more power from desktop; Mac mini needs added items; iMac comes with everything built in; laptop is more expensive since has to shrink everything; if need amazing amounts of power the new MacBooks will do rendering movies and compiling massive databases (numerically intensive); Chrome is memory and CPU hog and is the most demanding thing most people do; not necessary to have a fast machine for word processing; consider expense and what capability you need

Lawrence bought a new MacBook for Kathleen with 16 GB; the video of his granddaughter is crisper

Low end MacBook Pro with M1, loves it after 11-year-old white MacBook taking minutes to boot up; new machine boots up in 10 seconds, very happy with it but would like new machine for working with iMovie; waiting for iMac with bigger screen that does not take up much desktop space; get more RAM because cannot change mind later

What makes it fast and energy conserving is all on one chip, so you cannot add to it; if you want more memory, you must buy a new machine

New machines can go up to 64 GB, but very expensive: rare to need this

Go play with the iMac at Costco

What is the oldest MacBook Pro running on Monterey released next Monday? There are different kinds of machines; anything from 2015 is supported, and so things from 2013 are supported. It depends on the T1 or T2 security chip and the video card as to what is supported

Search for “macOS Monterey” to see what is supported

The size is 8-10 GB and may time out if you try to download it on Monday; see what is patched to see what hackers will take advantage of for those who do not upgrade to the current OS. Use this to break into other machines; take security seriously

Safari message on compromised password – is this legitimate? Quit out of the browser. It comes from JavaScript injection; not legitimate since not built into Safari. Go into Safari and clear the cache to get rid of it, so do not answer the prompt and download something malicious; Safari has the capability to show compromised passwords, but it does not give a notification message

Exception iPads will give a list of what is compromised

Bought iPad Pro 12.9 inch

Sign-in sheet sent in the meeting message and in the chat window

Zoom option to blur background; called “Blur”

Zoom – please get up to date to version 5.8.1 since major changes are coming soon; can have breakout rooms; may create discussion groups

Zoom has a history of poor security, so it has been making updates to improve security

Think about what you want to have for next month’s meeting topic

Topic: E-mail part 2 on M1 Mac mini

Notes from Apple’s presentation

Monterey release October 25

HomePod Mini’s now come in colors – can play music in every room and acts as an intercom; anything you ask Siri, you can ask HomePod

AirPods new version – not quite Air Pod Pros, have spatial audio

MacBook Pro 14 and 16-inch announced

Image of Apple M1 chip with memory (RAM) on either side; M1 Pro; uses Apple ProRes – movie standard for compression

Image of Apple M1 Max chip 4 chips 64 GB RAM

Comparison of the federal government’s total computing power in 1971 is equal to a single iPhone’s computing power today

CPU performance vs. power, M1 15 watts = less than half of 8-core; 70% less power used by new machines; pay for the extra power

14-inch and 16-inch look the same, small bezel, small part taken up by camera, menu bar design does not encroach on screen space; example of 5 screens and a camera connected by the multiple ports

Brought back MagSafe power connectors. If the power cord is pulled out does not pull the machine off the desk

Touch Bar replaced by mechanical scissor keys, more traditional, and a solid feel

New ports: SD card slots, USB-C, HDMI

More about email

Is this real or fake?

This message was sent to an email account that Lawrence uses to administer a website. The website is not a person, and does not have a bank account, and for a variety of reasons, never had a Wells Fargo account. This message is not trying to "confirm" your email address, but simply panic you into responding so that you can be defrauded. It did not come from Wells Fargo.
This message was sent to an email account that Lawrence uses to administer a website. The website is not a person, and does not have a bank account, and for a variety of reasons, never had a Wells Fargo account. This message is not trying to “confirm” your email address, but simply panic you into responding so that you can be defrauded. It did not come from Wells Fargo.

What looks real is the email address, but spear phishing for confirmation of the email address

Gmail tells you things are dangerous and puts them in Spam Folder; attempt to con you out of money – put in money to be made rich

Usually Gmail simply puts things in the Junk folder if it thinks the message is junk. But every now and then, it also adds an editorial comment, striving to tell you, explicitly, that the message is dangerous.
Usually Gmail simply puts things in the Junk folder if it thinks the message is junk. But every now and then, it also adds an editorial comment, striving to tell you, explicitly, that the message is dangerous.

Classic – your mailbox password will expire in 2 days; personal email does not have an expiration – corporations and government agencies have a password change policy

Apple, Google, Microsoft, etc., never send messages telling you your email password expires. Some companies and government agencies expire passwords, but they don't do it this way. Whatever you do, don't click on the Click Here link.
Apple, Google, Microsoft, etc., never send messages telling you your email password expires. Some companies and government agencies expire passwords, but they don’t do it this way. Whatever you do, don’t click on the Click Here link.

Google connecting to a new device sign-in from Moscow, St. Petersburg (cannot be both places); mistake in punctuation; some things are correct, and other things are not real

This message really, really wants you to click on something because it is trying to panic you into thinking that someone in Moscow or St. Petersburg is logging in on an new device.  (Moscow and St. Petersburg are over 700 kilometers apart, which is not close, and St. Petersburg is misspelled), Flag this as spam, and do not accept the offer to make "impeccable changes" to your account.
This message really, really wants you to click on something because it is trying to panic you into thinking that someone in Moscow or St. Petersburg is logging in on a new device. (Moscow and St. Petersburg are over 700 kilometers apart, which is not close, and St. Petersburg is misspelled), Flag this as spam, and do not accept the offer to make “impeccable changes” to your account.

NewsBreak application for iPhone for personalized news

Headline misleading – people may be inept, not malicious

Text message from Wells Fargo saying the account is locked, but the address is suspicious

Fraudulent e-mail with a bill for a web VPN protection plan to get to open .PDF to insert malware when opening the .PDF

Be suspicious of the content of e-mail; spammers go through the address book and try to leverage the name of someone you know to get people to do things

What is legitimate?

Hold the mouse over the link in Apple Mail, and Apple Mail will list the URL – look at where it goes if you click on it

May be confusing – Apple Mail -> View Menu -> Message Menu -> All Headers

How the message got to you, reply to, various machines it went to, at the bottom tells you where it came from via …; may be a bulk mail service for the business; can unsubscribe from the mailing list

View Menu -> Message -> raw source = all text (even a picture); good to use if suspicious about an e-mail

New message => forward it and will see the headers at the top, some things can be faked, but spammers are lazy and most do not bother to fake the header information

Have at least 2 email accounts, use one for subscriptions and vendors; use another for family and friends; if something appears in the wrong account, be suspicious; if you have 2 accounts and something in one is suspicious, send it to the other account and see what the header looks like

Can sort Spam by from and see foreign language at the beginning and end of the header; emoji in the subject line is often used by spammers; can set up a filter to put these messages in Spam folder; if says composed in far past or future it is most likely from a spammer passing through a machine with a dead battery

Chrome Gmail – designed to work with a browser rather than an email client

Apple Mail – accounts, new account, add a Google Mail account so you can see both in one mailbox

Gmail does not sort by date, shows up in sequence; can see by having Google do it; from Apple.com, use Google search engine to search through messages

Google does not use folders, and can show all messages

Google is great about killing off Spam

Inbox

Other categories, e.g., catalogs, forums subscribed to, ads, promotions; see if go through a vendor name and will see everything sent and can remove from InBox into a folder; can flag with a specific color

Settings -> filters

Adorama subscription can be unsubscribed

Several options are available in Google at the top; if you call it spam, Google will move it; if it threatens, it is a crime; three dots show choices to report spam, report blatantly illegal phishing will go to Google security team; Apple Mail does not have this

All Google mail is a page on a web server – select Show Heading; copy to clipboard, send to someone who will investigate (Security officer, police if a crime); Google creates a new tab to show the original as a security measure, so the sender never knows you did something with it

Q&A

Received 100 newsletters from different people, unsubscribe lists all newsletters, then 3 weeks later same thing happened: EU will prosecute for this due to privacy laws; there are no privacy laws in Britain and the U.S.; used by scammers to subscribe you to things since they know this is a valid email address; several former presidential staff sent out messages to raise money and kept it = fraud, FBI can investigate

If from a vendor you know and unsubscribe they should unsubscribe; if you do not know the vendor mark as spam and over time will increase spam score based on collective knowledge; if spam score high enough will put in spam folder; spammers send mass messages as blind cc; suspicious: $, emoji, etc. increase the spam score; do not open them. Periodically delete the contents of the junk mail folder

If consistent, can set up an Apple Mail rule to send to the junk folder

Be careful with unsubscribe, so do not receive more spam from people who do not follow the rules

iMessage spam – Apple takes effort to keep spam out of instant messaging; no hard and fast rule

Must educate others about how this works

AT&T messages – how to know if fake?

Apple iMessages are sanitized; green = SMS and may be suspect, blue is iPhone to iPhone and goes through Apple data system with good security controls; can send to trash without opening it by swiping to the left

Never open a .PDF on an iMac or iPad since this can compromise a device; Adobe is lax on security; Apple is good about security

SMS (green) comes through the phone system with no vetting; be suspicious of green messages

Use e-mail for international messages to avoid phone charges

If you leave the machine open or the phone on and hooked up to power will get the latest version as a silent update; do this 1-2 times a week; Safari will not let you go to a blacklist site; it has a blanket Apple blacklist of any North Korea site due to problems

It is your machine/device, and you have to protect it

Security measures and a better experience to have mail sorted into folders

Do not print out every message – there are better ways of managing email

Next month topic

macOS Monterey

Discussion: iOS 15.1 coming out – integration between Monterey and iPad as extension of Mac screen; new uses of e-mail; custom e-mail address for specific vendor, and can delete Alia to get rid of subscription/traffic based on alias for a special purpose; this is available in Apple Mail now, but hard to figure out

new FaceTime feature for invitation via email, but may have to be on a specific version of iOS; and may go to a Webpage for FaceTime expansion; bandwidth requirements unknown

Google Hangouts is less bandwidth-intensive

The new version of Zoom works better, and security is improving

Clarification:

Mark something as spam rather than Unsubscribe if not familiar with the company, since the risk of telling spammers your email address is real, and then you get more spam

We talk about email

SMUG meeting, September 21, 2021

Meeting notes by Kathleen Charters

Q&A

Calendar in the dock has a 1 on it, why? If I go there, I may see 4 calendar events: OS update last week; set to do automatic updates, but not always successful due to a variety of reasons, including slow connection timing out; open system preferences and open software update, see what version, and if I need to do an update

Homework – “Social Dilemma,” https://thesocialdilemma.com, an enlightening movie; the number 1 way to compromise computers is to put out malware in e-mail; Facebook and Twitter have your e-mail, so contact makes you vulnerable because social media proves you exist

Lawrence briefly discussed his experience at NOAA, under the Department of Commerce Task Force to look at social media as an outreach platform for science education

Apple e-mail, send URLs with BCC and if one address does not work will not sent message; e-mail protocol and anti-spam efforts, example of Yahoo e-mail addresses spam efforts; if have bad e-mail protocol is to not send any out; Lawrence had to test e-mails in groups of 100 and eliminate addresses that are not valid, SUMG has over 100 valid e-mail addresses; similar problem with Wave Cable mail handling and OlyPen mail handling rejection because thinks SMUG mailing is spam; may have to send one at a time; get bounce message without indication of what is being objected to, Apple has anti-spam mechanism, before sends checks validity of mail providers; check for typos in mail provider domain, look at what is after the @ sign, if take invalid address out then rest of addresses will go out; check for spaces as well; example of mistyped semicolon and compressed 4TB to 0 bytes after 3 hours; we are all human

Annoying – e-mail capitalizes each line after select Return, Mac knows start of the line should be capitalized; if sent a long line that did not wrap, and the window for reply is smaller than the document when sent, you will see that the line goes off the screen

Example of use of Terminal Window, and the entire message is in the subject line, a challenge to read

Apple – have storage in iCloud, so do you need external storage? Depends on how much storage for iCloud account, free default may not be adequate; e.g., 5GB on free account is not adequate; may need external drive or pay for more; example of Apple family 4TB iCloud, our Raid of 32 TB will not fit; upload speed on Peninsula is 10 MBS and too slow to backup; iCloud good for phone; may need more space; local backup hard drive is more cost-effective; iCloud Plus for Monterey or new iPhone does things iCloud does not do like hide IP address; iCloud Plus only available if have paid account even if only 99 cents a month; upload 1.5 MB movie to YouTube takes 45 minutes

Terminal icon on dock – terminal is a program to talk to UNIX OS (1968) under Mac OS (since X released); free BSD (Berkeley Systems Distribution by University of California Berkeley); does not need to be on dock; useful to reboot machine from a command line

Business Meeting

President – welcome to anyone new and welcome back to returnees

IOS 15 changes – chimes a way to defeat this

When opening an email to view, Safari can see how long and has been viewed

Sign-up sheet available – link in Chat, will use e-mail to stay in contact

Send dues to Treasurer for the year January – December

Treasurer – no change in accounts, balance $1,478.46

Questions can be entered in chat

Email overview

Email is one of those subjects you can talk about all day, every day, and not cover everything. Starting with how to write it: is it e-mail, email, E-mail (patterned after V-mail of World War II fame), or electronic mail? The Associated Press Style Manual says “email,” which is lazy, but lazy often wins over formal.

Most of what we will discuss is: safety. How do you handle email in a safe, private fashion, with high confidence that the person or entity you are engaged with is the person or entity you think they are? Much of this comes down to a few simple elements:

  • Limit your email volume. Don’t sign up for mailing lists, donation lists, sales lists, etc., unless you have a definite need. Most of us get way, way more email than we take the trouble to read.
  • Verify your correspondents. Take the trouble to find out if Harold’s Rocket Parts is sent by your favorite supplier of rocket engines and fuselages, and not someone pretending to be Harold. This is easier to do if you limit your total email volume.
  • Mark junk mail as junk. Don’t just delete it, mark it. The process of marking it as junk mail “teaches” your mail client and host to look for certain characteristics and filter them out of your inbox.
  • Delete old mail. Once you no longer need it, delete it. If you want to keep something as a reference, don’t do it by leaving it in an email.
  • Delete your trash. If you are throwing it away, periodically empty the trash.
  • Similarly, delete junk mail. If it is junk mail, don’t let it consume your hard disk space and mail server space.
  • Keep your address book up to date. Your mail client assumes that messages from entities in your address book are not sources of spam. Delete old email addresses and contacts that are no longer relevant.
  • Don’t open suspect messages. If you have doubts, don’t even open the message. Among other things, opening a message can verify that you are a valid target for spamming.
  • Don’t open any attachment unless you are sure it is legitimate.

Security and privacy – reduce the amount of e-mail to scan

Apple Mail and Google Mail; they work anywhere

Cannot use OlyPen off the Peninsula if there is a power outage

10, 811 unread messages – privacy and security issue, Obama list of nominees in non-government positions contacted by postal system or telephone and asked to e-mail contacts and address information to Gmail address; person stopped using Gmail account private company administrative assistant manipulated to give password to hacker for all on national security council members – social engineering used to break in; all email was old and now discovered by hacker

Rule: delete what you are not using

How to handle large volumes: change sort to view by size and kill off the largest messages, e.g., many images vs all text, which makes more space available

To get rid of sort by From; can sort for spam since non-Roman alphabets at top or bottom and delete them; emoji’s at top or bottom; quick way to get rid of them; sender has @ sign can use to decide who sends and if mailing list check mail preferences and create a rule for AppleScript if From contains AppleScript users list, Set color to red, Apply, will see as red in the list

Adorama rule – Add new rule, if From contains adorama.com, set color to blue, apply, then can target these messages (Adorama is a photography store)

Use to have messages from family with a color, so do not miss them

If you do not want to pay attention to B&H Photo messages, Mail Preferences if From B&H, set color to yellow, apply; can create a new mailbox from + or from Menus New Mailbox, on iCloud, label mailbox B&H. Edit rule: move message to mail box: B&H, apply; takes time if there are a lot of messages to move

Can sort into bins automatically; reduces inbox mail; needs to check the folders

Do not use it for things you need to see right away

To delete Adorama, find the first and the last in the list, select them, and it will ask if you want to get rid of 246 messages. If you say Yes, then the computer will place them in the trash

Mailbox in sidebar – Mail, export Mailbox, asks where to export to, select desktop, Choose, will export from Mail folder to Desktop MBox folder; if you want to restore, double click and Mail will open; no longer online, so cannot be hacked from mail; after save, delete on Mail system

Limit to what can be visually scanned in 3 screens, which is approximately 30-40 messages; people do not look any further. This means you should try to limit the messages in your inbox to no more than 30-40 messages.

Delete or Store all else

Tax returns – take off computer, store externally

People can break into email from anywhere

How to find out things about who sent a message: go to the top of the message; View Menu, Message, Raw Source – will see the text, e.g., code for a picture in BinHex; View all headers, instructions for how the e-mail gets to you; read raw headers to show where it came from

View, Messages, raw headers show how the messages get to you (but can be hard to follow)

Button on desktop, mouse hovers over to show code, if from India or Romania will see this; use caution when asked to spend money, terms may be true, but the part where you enter personal information sends it to a hacker; cannot do on iPhone or iPad because cannot hover over anything; check on your desktop

The message shows where the URL takes you if you hover over the link on your desktop; many browsers do this

iPhones and iPads will not send you to an unencrypted site or a site on Apple’s list of bad sites; you cannot hover over them since they do not have a mouse

A laptop or desktop is fine to hover over, have a mouse

If you have an iPhone and a Mac and read mail on the phone first, then will not sort on desktop or laptop

New Mailbox with a rule to move does not duplicate the message; there is only one copy

iOS 15 feature to hide IP if you have an iCloud Plus account, turn this on, which prevents tracking of messages by sender based on IP address, which gives away location

IOS iPhone, and IOS iPad, and Mac with iCloud Plus using Apple Mail can hide IP

Programming code – when open message will request graphic from spammer’s machine, Apple will not honor a request for a 0-size file to help with privacy

Spammers send 1 billion messages daily, and if 1% respond, they sell you as a product

Facebook feels threatened by Apple with this feature; Facebook wants to sue Apple over blocking this

iMessage only sends text, so see the entire URL unless a Facebook page

A PDF file builds a page using a programming language. This can be used to compromise a computer, used to open with Preview, and could infect a machine. Apple now stops this from happening; for example, of invoice with a broken icon that would download malware; Apple blacklists sites, puts in malware definitions automatically if select automatic updates

iMessage – receiving bad things – someone you know is compromised, spam sent to all addresses on their machine; message coming in – either responded to something, or has an Apple iCloud address or messages linked to an address or phone number

Messages Preferences, list who is allowed as From, delete sources you do not want from this list; messages can be seen on Mac, iPad, or iPhone; send a screenshot to the Strait Mac VP account so Lawrence can look at it

Questions

Gmail account downloaded into Mail, Apple delete may not remove from Google server; empty Google trash can and Apple Mail trash can; Empty Trash in All Accounts; Google holds trash for 30 days before really deleting it

Mail can be anywhere; the Inbox is easiest to reduce vulnerability; if not used anymore, delete; keep 3 years of replies and delete originals; export sent messages and then delete out of mail; keep a limited number so readily see what is suspicious; old e-mail can cause grief in unexpected ways

Wave Cable is slow, pay for 100 Mbps, YouTube videos stall when 8-12 Mbps, pay more for 200 Mbps, and same thing; new modem and router, and still the same problem, how to complain about this? Paying for a service that is not delivered

Same complaints by Lawrence

911 went down in WA OR MT under Wave Cable contract; wrong security on server – messages not encrypted since no valid certificate; legislation to improve infrastructure pending; there is no real choice here yet; Elon Musk low earth satellite trying to address this but solar flare a risk of disruption; program to monitor this not practical, a ping gives latency not download speed; Wave Cable government approval for franchise so complain to Clallam County Commissioners and state will not overrule; paper letter is hard to make disappear; FCC net neutrality favorable response were fake letters by telecom companies

Search Gmail by subject? Any Google search trick works for Gmail; the same search engine, same techniques work in Gmail; it does not work like Apple Mail. For example, you can tell it to search by date range

AOL Mail will allow you to auto-forward to another address, forward to Gmail, and reply from Gmail; AOL has had over 20 owners, now owned by Verizon, so it can sell your information to someone else; webmail only since stopped support for Macs 4 years ago

Cookies – should have choices, companies may not allow in unless accept cookies; impression of control, European law violation; Los Angeles Times example – cannot survive without ads

Next Month

Apple’s September announcement of new products Apple Watch, iPads, iPhones, next month Monterey OS – 5 most important things in iOS; new Safari features for limiting tracking

More e-mail questions – Gmail

Documentary: “The Social Dilemma” on YouTube and Netflix – how to limit tracking; SMUG members are the prime demographic to be compromised; older, more money, more ways to hook emotionally

California Streaming, September 14

Apple will have a live, virtual event on September 14 at 10 a.m. Pacific Time. You can read about it on Apple’s site, which says nothing at all:

https://www.apple.com/apple-events/?cid=CDM-USA-DM-P0021399-484205

Slightly more was released on Apple’s Twitter account,

It isn’t a very useful or informative tweet, but it is pretty.

What people think Apple will talk about are new iPhones and possibly Apple Watch models, plus new versions of iOS, iPadOS, WatchOS, and probably tvOS (for the Apple TV). Some commentators are speculating the event may also announce more Macs, but traditionally that has followed at a separate event in late September or early October.

Whatever they announce, we will probably talk about it at the SMUG meeting on September 21.

Summer Questions and Answers

SMUG meeting, July 20, 2021

Meeting notes by Kathleen Charters

Q&A

Topics based on questions

There are some parameters:

  • The question should be something that can be answered in five minutes or less, and it should be relevant to Macs or iPhones or iPads, Apple TV, or something of that order. It should also be of general interest to the average Mac or iPhone, or iPad user.
    • Bad: “Which is the best Star Wars film?” (Wars have been fought over that question)Good: “What Mac-based image rendering technology was used in Star Wars for special effects?” (Answer: RenderMan)
    • Bad: “How long does it take for light from the Sun to reach Pluto?” (About 5 1/2 hours, but not Mac relevant)
  • The question should not require the meeting host to vanish:
    • Bad: “Can you demonstrate how to put a Mac in Target Disk Mode?” (Zoom crashes as host reboots computer)
    • Bad: “Can you demonstrate CarPlay?” (Host leaves computer running but drives off somewhere)

Some suggestions offered so far:

  • What are the Mac’s built-in networking tools? And what can you do with them?
  • Are some of these networking tools available for iPads or iPhones?
  • How can you see who sent an email message? (Essential for tracking down spammers)
  • How do you tag files on the Mac? (And what are “tags?”)
  • What third-party (i.e., non-Apple) diagnostic tools do you recommend?

Government spyware a problem? Government spyware is not focused on ordinary individuals

To monitor for risks – Fingbot, MESH network for the home, software to spy on own network to know what people using the network are at risk for; poor bandwidth so cut down on spam to increase what is available to use; invest in the investigation – learn to understand the inferences; you find things if you look and you do not find them if you do not look

Zoom preferences to set screen name, done in Zoom profile on desktop, iPad is different, when joining Zoom will let you change name to a screen name you want to use rather than the default of the device name

Example of people hacking the network could invite a vulnerability if using the default of first name for device name, or the name of the router, which tells hackers how to break into your network; do not use location equipment or name for a device that is identified for you

iPads, Macs, iPhones under attack from foreign governments, e.g., a person killed in Turkey, 50K devices infected with spyware, but they target high-profile people tracked by foreign governments; shared accounts are most vulnerable

IOS updates remove software like this; if you have a virus, ask for professional help before updating to avoid corrupting your device

Big Sur – see Apple menu, about this Mac; if on a very old Operating System, in danger of many risks, need to keep up with current software

iPhone 1-year-old SE has a battery health warning, maximum capacity 97%, not as robust as it once was; can get through the day on a single charge; iPhones use a smart battery, tries to maintain a profile based on how the lithium battery discharges, if the iPhone battery is confused can power down. Leave off for 5 seconds. Start up again; alternative is to “Reset” but goes back to where iPhone came out of the box and set it back up again; go to settings and shut down completely; things that screw up battery life: being away from a cell tower; can conserve batters if set to airport mode; use of GPS where there is no cell tower iPone may get hot from trying to do navigation without a cell tower in range; uses cell towers to triangulate location; inertial navigation not used by iPhone

How old is too old for a computer? If you can no longer do updates, it is too old; if you cannot run the current OS will not get security updates on the current Operating System minus 1; macOS 11 is current. Anything before MacOS 10.14 is too old

**Future topic – Monterey as a virtual machine on Parallels to demonstrate it; using lots of computer horsepower to do something

****Future topic – how to deal with spam in e-mail and malware****

**Future topic – things you can do with Siri; how to trigger video or take a photo using iPad without moving it – can use Apple Watch to do this; can turn on Apple TV but not change channels, can search for things

**Future topic – How to demonstrate Apple TV device, subscription? Need to do this in-person and not on Zoom

SMUG FaceBook page – need a volunteer to post things on it; consider Senior Center in Port Angeles – free space; Shipley Center in Sequim is used by former SMUG officers; 2-story building on east side of town for rent for meetings; St Lukes was expensive; do not have projection system; no current officer was involved in equipment give away; previous treasurer gave all SMUG money to Shipley Center; consider the old school house as a place to meet – check on Internet access, handicap accessible in downstairs, have a chair lift for upstairs access

People in Port Angeles want to host a meeting there; bandwidth is a limitation to broadcasting while holding a live meeting; Clallam County is back in the high zone for COVID-19, so the library will be cautious; county commissioners cite a high increase in tourism, which also brings in COVID-19

Treasury report: 1 dues paid, $1,478.46 balance in account, no expenses

Presentation

Removing incorrect e-mail addresses: demo: compose a message in a new window, 2 e-mail addresses come up, selects one and sends it, selects the other and sends a second message; in Apple Mail there is a window for previous recipients, can get rid of address select it and choose remove from the list; it will no longer auto-fill; Google Mail uses a browser, compose a message and get auto fill; go to contacts and can delete from there; hacks of email are on old email and old recipients; clean them up periodically

Search on Wireless Lavilear microphone iPhone; look for connector (e.g., lightning); read the ratings and find out what people looked at; be careful that reviews match the product being looked at; be wary of brand names and knockoffs

Effects of radiation on the body from the use of a cell phone? Lawyers’ example: static electricity. Ionizing radiation from the sun, not the same as radioactive, no evidence that it causes cancer, lithium battery poisoning is possible, and can get burned if the lithium battery gets hot; in general, not dangerous

First Internet access with Web TV; app sent to HQ; no privacy if you use one of those Apps on TV; security risk of Bitly – do not know where the other end

Mac Repairs – good resource not known for the local Sequim area since MacTraders left; not Best Buy; go to Apple store if machine under warranty; Port Townsend Computer – took care of malware issue 3 years ago, will do Mac repairs but not warranty work

Decentralized VPN – plugs into power and computer, VPN creates an encrypted tunnel from you to somewhere else, this device does not; WIFI extenders do not help; produced in China, used to collect data on users

MacWorld article on how to add more connectors – example of a hub with different ports for Mac mini, which is useful

M1 model Macs, Windows, a service (in Beta, may be a service)

Why is my computer so slow – pinwheel when overtax machine, old computer not enough memory or disk space outdated apps old OS; system preferences, see network MB vs. GB slows down computer; talks to Apple for e-mail, time to boot up dependent on speed of internet and cannot control; slow or unstable Internet connection; consider what you want connect

Alternative: When low on disk space, Daisy Disk produces a graph of space and how utilized

10 GB of space is the minimum – need to clean this up

Alternative: Disk Cartographer provides more technical detail

Grand Perspective – different-sized blocks show how space is used. Pruning is a way to speed up the machine

If you take up CPU time also increases

Window shop application, download a demo, and try it out

If you leave the desktop on all the time, reboot occasionally to give the operating system a fresh start

Mac mini with M1 is a speedster and doesn’t take up much space

A slow or unstable network slows the machine

Deleting a cache may help

A machine may have a failing hard drive; not worth repairing, so get a new machine

Safe boot option: hold down the shift key when rebooting. If faster after that may be software that makes it slower, rather than the machine

Costco in Sequim has a new M1 iMac on display

Costco machines are one size and cannot be customized after you buy the machine, so if not what you want, then go elsewhere; 16 GB recommended rather than 8 GB minimum due to future software demands – allows for longer life of the machine

M1 iPad is awesome

Western Digital software suite on the drive compromised by hackers; MyBook with Internet connection not secured, so vulnerable and hacked; if software comes with a drive, erase the drive and reformat it, then it will be safe; if you replace the drive, copy the data to a new drive; Time Machine – start a new backup

Clean up software for the machine gets rid of its cache, not cache you create; DNS cache is a list of all addresses you looked at over some time, which will age out quickly; a script to clean up what the computer uses for housekeeping to user-generated URLs

Google Drive, Docs, Sheets, Etc.

SMUG meeting, June 15, 2021

Notes by Kathleen Charters

Q&A

iMovie Clip trimmer resolution 1/10th of a second and use of track pad (designed for brushing and stroking, so sensitivity is less) vs. a mouse for resolution, track pad is convenient but not precise, video editors use trackballs or mice; magic mouse works with any modern device with a new version of Bluetooth (greater bandwidth)

Themes – blank video screens; not able to preview form, fill out the form, and save the clip before seeing what it is doing. This has been true for a couple of years

Themes and trailers are built on templates; you can use photos to test the theme; it does not have to be a video to test it

Upgrade on iCloud space and add devices as family members to the account to take advantage of greater space; separate Apple IDs must be added to the family plan; go online for directions on how to do this: “Set Up Family Sharing”

Apple Family – do not have to live in the same home, can be in different cities, just adding Apple IDs to the plan

The next iteration of OS can use iCloud backup when buying a new machine

Sizing the plan – if you have 1 GB to back up and part of this is music (purchased albums), it will not copy this, will not copy mail, will copy what is unique to the device

When downloading, it does not do it all at once; it may take a week to get everything. Must have a reliable Internet connection, plug into power, and will back up, takes time

Apple Photo will not send in message because sending to a device not an account; can copy to clipboard and paste into message; designed to share a photo with another e-mail account; messages shares from device to device and knows nothing about accounts so have to copy paste into message; Apple Photo is paranoid; works if share something with person in contacts who has iCloud account; will not allow to send to a phone number; Gmail with a sharing relationship will work; Messages is flexible and lazy; example of social phishing

Spoofed address made it look like she was hacked, found address and send out messages from the person; hackers harvest email address and send out spam/malware; now attack corporations to get massive numbers of e-mail addresses; e.g., sent .PDF to compromise machine when clicked on; separate position from person in e-mail address; protect personal e-mail address, keep track of

Apple World Wide Developer Conference 2021 (WWDC21), https://strait-mac.org/2021/06/06/apple-world-wide-developer-conference-2021/

Meeting business

Treasurer Report

Annual Zoom subscription $163.09

1 dues received

After pending items are processed, Account Balance: $1406.46

Proposed clinic workshop – will need a projector, show things that cannot be shown on Zoom; need a projector that will take an HDMI input; preparing for the future

A hybrid event is not feasible due to bandwidth limitations of being on the Olympic peninsula; Sequim Community Church is open for meetings and has good support; KSQM sites; Sequim Valley 4 Square church; speed needs to be 1 MBS

Demo of Google Office Suite

Free office automation tools; must have a Google account

Google Drive (Google Workspace) is the basis of office automation services

Log-in, new, create doc, sheet, form, drawing tools, map tools, website tools

Word processing document on a Website as a Webpage, so can share by inviting people by copying URL or entering their e-mail address; can change font, size, formatting; can export the document in Microsoft Word format; create Microsoft Word files in Google Docs; Word processing document has no size to count against total

Google Sheets is a spreadsheet with content and formulas; it can be shared using the share button, or you can download and save it as a Microsoft Excel file. Disappointing if a heavy hitter in Excel, but for simple things works seamlessly; the charting function can be customized

Use of slides to create title frames for movies; recognize slides as a PowerPoint

Google drawings – export as a copy of the URL or by sending an email

Example of a custom map made by dropping pins, can edit pins

Change from map view to satellite view

Google Sites – create and publish a website – limited to 15 GB (Apple limits to 5GB for free)

Google Photos

Drag from iCloud to Google

Browsers and Google Suite

Chrome by Google

Firefox

Safari does fine unless doing something complicated

Google Drive works with iPad, iPhone, and desktop/laptop machines

Can set phones to upload photos to iCloud; Google has access to the phone’s photos

Google Lens – iPhone trick; uses power of phone to search for images on iPhone Google Photos Library; select a photo, see icon at the bottom, if selected will analyze photo and state what it is; 1 B photos uploaded today with metadata; Google can look though library of shapes to find a match; there can be errors; looks at shape and makes a guess; can read things e.g., photo of a menu in another language Google Lens will try to translate into English; look for name of a person “Lawrence I Charters” and select images associated with the name; does not work to select a face to get a name because looking at a string on the page; can upload an image to Google of a famous person and it may find a name based on database of things lots of people have uploaded and identified; may find an exact match in the database; referred learning

Authy is a tool for identification, claiming to be 2-factor authentication, but not exactly this; it does help to have 2-step identification; it works with other services, free is limited, and more extensive use takes a monthly rental; a small company

Caution: Instead of being more secure may be less secure if small company is bought out by a hostile government for access to accounts

Google Authenticator – after name and password are entered, have one more step, a random number tied to the Google account that changes every 15 minutes, then get the passcode from the phone to type in to complete the authentication process

Apple has its own 2 step authentication

Google authentication works best with Google products

Apple authentication works best with Apple products

Safari and Chrome work differently with Google Drive; for example, they handle the print command differently

Can share a Google doc with others and work on it together, and track who edits what when; this is powerful

WWDC

Paid iCloud account (even if the minimum fee) + new OS powerful feature = protect Apple Mail client; will scan for malware; e.g., flag when return address does not match what is claimed

Safari’s double proxy system cannot track what you are doing, cannot track the identity of the machine based on the footprint, and scrambles linkages to identity

Facebook can track, but cannot share with Amazon anything useful

Protect from malignant e-mail, tracking Web browser; does not set up a Virtual Private Network (VPN) since you have to know what the other end of the tunnel is before it can be secure; e.g., Avast in Hungary, where the government can look at anything

If you use mail and Safari ISP cannot track you

Firefox cannot use this Apple proxy system

A 90% solution can still compromise its security

Not a VPN – the mechanics of this for 3B users is complicated

Well worth taking a look at this – the way rolled out user can be much better protected without doing anything

Apple’s ability to home in on a detail across screens across devices

What kinds of projectors are available – what to look for: lumens and resolution, 1500 – 2000 lumens or better; need 1920 by 1280 pixels better resolution; larger room needs more lumens; more detail needs higher resolution

Things for SMUG to think about

Consider purchasing a used projector

Consider a computer fair to increase the level of knowledge

Consider alternating in-person with Zoom meetings

Next month, possible topics:

Summer activities applications – iHealth, Strava, Parks

Photography

Printers – what to take into consideration, true cost, all-in-one, laser vs inkjet