GPGTools for OS X

If you’re running OS X and use the native mail app, you know that it can be hard to integrate the GPG encryption suite. Fortunately, there’s a custom solution for the Mac called GPGTools that integrates GPG with OS X and the mail app. I’ve been using it for several years and have been very happy with it. It’s actively maintained and high quality software.

It’s not hard to install and I doubt any Irreal reader would have the slightest problem. But, of course, we all have an Aunt Millie who needs a bit of extra help. Happily, Jeff Reifman over at Tuts+ has an excellent how to on installing and configuring the PGPTools suite. The process is easy and if we can get a substantial number of people to install and use it, we’ll be on our way to ubiquitous encryption and a safer Internet.

Posted in General | Tagged | Leave a comment

What’s Up With the Cat?

Posted in General | Tagged | Leave a comment

Daring Fireball Demolishes a Particularly Silly Article

Irreal readers know I like and use Apple products but I’m not a paid up member of the cult so I seldom write about the subject. The most fascinating thing about Apple, I think, is the derangement syndrome that it induces in many journalists. Some of the most entertaining articles I read are the Macalope’s merciless mocking of those journalists.

Over at Tech Crunch Jon Evans has a particularly silly article warning us that we shouldn’t use Apple’s products. Why? Well, because Apple makes it hard to jailbreak iOS devices and sometime in the future they might decide—despite their history of protecting their customers’ privacy—to get in bed with the NSA and other snoopers and then where would we be?

I couldn’t begin to adequately mock this nonsense but fortunately I don’t have to. John Gruber over at Daring Fireball does an excellent and entertaining job of debunking it for me. The Macalope hasn’t yet turned his antlers on Evans but I’m sure he will and I’m sure the result will also be amusing.

There are probably good arguments for why someone might prefer to use Android devices over iOS devices but Evans sure hasn’t given us one. If you want to make the argument, at least be serious.

Update before publication: That didn’t take long. Here’s the Macalope with a righteous takedown of Evans’ silliness.

Posted in General | Tagged | Leave a comment

Artur Malabarba Tells it Like it is

Who can argue?

Posted in General | Tagged | Leave a comment

Converting from Word to Org

In a comment to one of my recent posts (1, 2) on converting from Org mode to Word doc format, Grant Rettke pointed me to an interesting Org Mode mailing list thread on how academics leverage Org mode for writing their research articles. It’s a great thread and if you have a need to convert your Org documents to doc format, it’s definitely worth reading.

One problem that arises when collaborating with a Word-using colleague is that they will want to turn on tracking and make their changes and comments directly in the document. You can, of course, simply copy the changes back into your Org document but that’s a hassle. Happily, in one of the posts, Ken Mankoff outlines a method for getting those changes back into your Org document. Rettke captures the method in a recent post on his blog.

Once you have the Org document with the changes, you can do an ediff with the original to chose the changes you want to keep. For more on that idea, see Mickey Petersen’s post on writing a book with Emacs. He didn’t use Org mode but he did deal with integrating editorial changes back into his master file.

Posted in General | Tagged , | 1 Comment

Safe at Last

Posted in General | Tagged , | Leave a comment

Karl Voit Lightning Talk

PIM export Karl Voit gave a lightning talk on Org Mode at the recent Chaos Computer Club Camp2015. Being a lightning talk is was pretty short. That’s too bad, I would have liked it to be a bit longer.

The talk was designed to be an introduction to Org mode so if you’re already a user you may be familiar with most of what Voit has to say. On the other hand, he explains how to use blockers and triggers in your TODO lists, which is something I didn’t know. Even if you’re an expert, you’ll enjoy Voit’s enthusiasm for Org mode. As he says, there’s nothing better for personal information management.

The talk starts at 1 hour 14 minutes so just advance to that time if you aren’t interested in the other talks.

Posted in General | Tagged , | Leave a comment

Schneier on Going Dark

There’s been an alarming increase in Law Enforcement’s campaigning for mandatory backdoors in communication software. They are increasingly taking their case “to the people” with dishonest Op Eds intended to induce fear of terrorism and the other four horsemen.

Bruce Schneier, an actual expert on these matters, explains why even if Law Enforcement got their backdoors it would only make the terrorism problem worse. His article has links to some of the nonsense that the FBI and others are pushing so you can see what they’re saying. Sadly, you may read Schneier’s piece but most of the people being subjected to the onslaught won’t so they’ll be getting only the lies and distortions.

You may want to read the article following the one above as well. It talks further about the war of words raging between Law Enforcement and the tech community. Both are from Schneier’s Crypto-Gram, a monthly newsletter on security matters. If you’re interested in the area you should definitely subscribe. It’s free and always has lots of good material.

Posted in General | Tagged | Leave a comment

Super- and Sub-Word

I’ve blogged about this before but here’s a handy chart to server as a reminder:

Posted in General | Tagged | Leave a comment

The Network is Hostile

Matthew Green over at Cryptography Engineering has a depressing piece on the security status of the network. He says that the network is hostile and that that hostility is baked in by its design. Our packets travel through routers and intermediate machines that we have no control over and, indeed, we usually don’t even know what machines or routers those packets pass through.

The situation is now known to be even worse than we thought. On August 15th, ProPublica published an article revealing AT&T’s almost complete capitulation to the whims of the NSA. That includes allowing them to tie into and monitor major fiber-optic cables. The NSA, in internal documents, praised AT&T’s extreme willingness to help them. Matt Blaze sums up the situation nicely in this tweet

This hostility means that ubiquitous encryption is an absolute necessity but even that, Green says, isn’t enough because current protocols leak a lot of metadata that can be revealing to those who wish to mind our business. The NSA, Green reminds us, isn’t the only state-operated entity that’s interested in and has the capability to monitor our communications. Some are even worse than the NSA.

Posted in General | Tagged | Leave a comment