30 September 2018

Until data is misused, Facebook’s breach will be forgotten


We cared about Cambridge Analytica because it could have helped elect Trump. We ignored LocationSmart because even the though the company was selling and exposing the real-time GPS coordinates of our phones, it was never clear exactly if or how that data was misused.

This idea, that privacy issues are abstract concepts for most people until they become security or ideological problems, is important to understanding Facebook’s massive breach revealed this week. 

The social network’s engineering was sloppy, allowing three bugs to be combined to steal the access tokens of 50 million people. In pursuit of rapid growth at affordable efficiency, Facebook failed to protect its users. This assessment doesn’t discount that. Facebook screwed up big time.

But despite the potential that those access tokens could have let the attackers take over user accounts, act as them, and scrape their personal info, it’s unclear how much users really care. That’s because for now, Facebook and it’s watchdogs aren’t sure exactly what data was stolen or how it was wrongly used.

The Hack That Broke The Camel’s Back?

This could all change tomorrow. If Facebook discovers the hack was perpetrated by a foreign government to interfere with elections, by criminals to bypass identity theft security checkpoints and steal people’s bank accounts or social media profiles, or to target individuals for physical harm, out will come the pitchforks and torches. 

Given a sufficiently scary application for the data, the breach could finish the job of destroying Facebook’s brand. If users start clearing their profile data, reducing their feed browsing, and ceasing to share, the breach could have significant financial and network effect consequences for Facebook. After years of scandals, this could be the hack that’s broke the camel’s back.

Yet in the absence of that evil utilization of the hacked data, the breach could fade into the background for users. Similar to the tension-filled departures of the founders of Facebook’s acquisitions Instagram and WhatsApp, the brunt of the backlash may not come from the public.

The hack could hasten regulation of social media. Senator Warner called on Congress to “step up” following the hack. He’s previously advocated for privacy laws similar to Europe’s GDPR. That includes data portability and interoperability rules that could make it easier to switch social networks. That threat of people moving to competing apps could succeed in compelling Facebook to treat user privacy and security better.

One of the biggest questions about the attack is whether the tokens were used to access other services like Airbnb or Spotify that rely on Facebook Login. The breach could steer potential partners away from building atop Facebook’s identity platform. But at least you don’t have to worry about changing all your passwords. Unlike hacks that steal usernames and passwords, the lasting danger of the Facebook breach is limited. The access tokens have already been invalidated, whereas password reuse can lead people to have their other apps hacked long after the initial breach.

Desensitized

If government investigators, journalists, or anti-Facebook activists want to make the company pay for its negligence, they’ll need to connect it to some concrete threat to how we live or what we believe.

For now, without a nefarious application of the breached data, this scandal could blend into the rest of Facebook’s troubles. Every week, sometimes multiple times a week, Facebook has some headline grabbing problem. Over time, those are adding up to deter usage of Facebook and spur more users to delete it. But without an independent general purpose social network they can easily switch to, many users have endured Facebook’s stumbles in exchange for the connective utility it provides. 

As breaches become more common, the public may be desensitized. Between Equifax, Yahoo, and the cell phone companies, we’re growing accustomed to letting out a deep sigh with maybe some expletives, and moving on with our lives. The ones we’ll remember will be those where the danger metastasized from the digital world into our offline lives.


Read Full Article

Relike lets you turn a Facebook page into a newsletter


French startup Ownpage has recently released a new product called Relike. Relike is one of the easiest ways to get started with email newsletters. You enter the web address of your Facebook page and that’s about it.

The company automatically pulls your most recent posts from your Facebook page and lets you set up an emailing campaign in a few clicks. You can either automatically pick your most popular Facebook posts or manually select a few posts.

Just like any emailing service, you can choose between multiple templates, decide the day of the week and time of the day, import a database of email addresses and more. If you’ve used Mailchimp in the past, you’ll feel right at home.

But the idea isn’t to compete directly with newsletter services. Many social media managers, media organizations, small companies, nonprofits and sports teams already have a Facebook page but aren’t doing anything on the email front.

Relike is free if you send less than 2,000 emails per month and don’t need advanced features. If you want to get open rates, click-through rates and other features, you’ll need to pay €5 per month and €0.50 every time you send 1,000 emails.

The company’s other product Ownpage is a bit different. Ownpage has been working with media organizations to optimize their email newsletters. The company is tracking reading habits on a news site and sending personalized email newsletters.

This way, readers will get tailored news and will more likely come back to your site. Many big French news sites use Ownpage for their newsletters, such as Les Echos, L’Express, 20 Minutes, BFM TV, Le Parisien, etc.

Ownpage founder and CEO Stéphane Cambon told me that Relike was the obvious second act. Using browsing data for customized newsletters is one thing, but many talented social media managers know how to contextualize stories and maximize clicks (even if it means clickbait, sure).

The startup was looking at a way to get this data, and ended up creating Relike, which could appeal to customers beyond news organizations. For now, both products will stick around. In the future, the company plans to add Twitter and Instagram integrations as well as better signup flows for newsletter subscribers.


Read Full Article

Best Buy stocked an unannounced Chromecast ahead of Google’s hardware event


Google’s big hardware event, scheduled for October 9, is expected to feature the new Pixel 3 and Pixel 3 XL phones. But now we know that Google will probably reveal a third-generation model of Chromecast, thanks to one recent Best Buy customer who discovered the device on store shelves.

Whoops.

“GroveStreetHomie” detailed his experience on a Reddit post entitled “I think I bought the 3rd gen Chromecast too early.”

According to the Reddit post, the customer went to Best Buy earlier to pick up a Chromecast for a new TV. That’s when “GroveStreetHomie” noticed the packaging and design was different from an earlier version.

The cashier wasn’t able to scan the item because it wasn’t in the system yet. The release date was labeled October 9 — the same day as the 2018 Google hardware event.

“But since I already had it in my hand and was the same price as the 2nd generation Chromecast, they let me have it under the old SKU,” the post read.

This new unannounced Chromecast is apparently thicker than the second-generation model. The Chrome logo has been replaced with Google one. The new device still has a micro-USB. The HDMI connector on the tip and base has been removed, according to the user.


Read Full Article

The 7 Best Risk-Free Cryptocurrency Trading Simulators


Bitcoin Trading Simulators

Did you ride the peaks of the bitcoin wave, or did you wait for the trough to hit the shore? When bitcoin was touching $20,000 per coin, everyone was an expert or potential investor. Prices are now more unpredictable, making it harder for would-be investors to make a profit.

Given cryptocurrencies straddle the median between currency and commodity, there is money to be made—but only if you know what you are doing. Check out these risk-free cryptocurrency market simulators before splashing your cash on the real deal.

1. Bitcoin Mining Profit Calculator

bitcoin mining profit calculator practice trading crypto

The Bitcoin Mining Profit Calculator (BMPC) is a great starting point if you are completely new to bitcoin and cryptocurrency. It’s a lot more than a simple trading simulator since it includes a full introduction to bitcoin too.

The website works like an interactive fiction-come-idle clicker game. BMPC updates with new tabs and explanations as you click different prompts on the screen, thus making different choices. Don’t worry, you won’t miss out on any pertinent information, but it will make you aware of the kind of news that affects bitcoin’s prices as well as the inner workings of the bitcoin community.

BMPC is nothing great to look at and plays like a text adventure, but there’s nothing wrong with that. This is meant to be an educational game rather than an entertaining one.

2. Bitcoin Hero

bitcoin cryptocurrency trading simulators

For those who don’t need a tutorial in what cryptocurrency is and want to jump right in, Bitcoin Hero is excellent. The web app works fine on mobile screens as well, so you can enjoy the game without ever installing it, but there is an Android app.

While it isn’t necessary to install Bitcoin Hero, you’ll want to create an account to track your progress over multiple sessions. You start with $10,000 in your wallet, and you can buy and sell four cryptocurrencies: Bitcoin, Ethereum, Litecoin, and Dash. The cryptocurrency prices come straight from the real world, so its akin to the real thing.

3. Altcoin Fantasy

altcoin fantasy dashboard crypto trading practice

Altcoin Fantasy (ACF) steps up where Bitcoin Hero ends. Unlike Bitcoin Hero, Altcoin Fantasy lets you trade against other people, in competition, for a range of real-life prizes. For instance, a prize in a recent ACF contest was $100 worth of Bitcoin!

Competing also earns in-game currency, ACF Points, which you can trade in for real-life prizes, like a CryptoKitty or a 12-month subscription to TradingView. There’s also a daily sign-in bonus and a free spin-wheel for more points!

ACF ramps up the realism by using real-world market from a range of exchanges, differing between competitions. There’s usually a healthy amount of competition too, so you will need to sharpen your crypto market analysis skills to hit the head of the pack. Starting out with $10,000, you have a decent bank account to make a profit from.

Another thing I like about Altcoin Fantasy is its Private Contest mode. You can set up a 14-day contest for you and your buddies to see who has the best crypto-trading chops—and then brag about it when you win, of course. You can even set an entry fee.

4. eToro

eToro crypto trading list

eToro is a social trading app that has captured the imagination of regular investors and professionals alike. You find profitable investors that match your level of risk, and then copy their trades as they execute them. There are thousands of profitable traders and decent money to be made.

However, if you don’t want to risk your money and want to learn before opening your wallet, sign up for an eToro practice account here. Your free account comes with up to $100,000 for trading so you can really go to town with your practice trades.

5. CoinMarketGame

bitcoin cryptocurrency trading simulators

For a full-fledged simulator consisting of all major cryptocurrencies, you can’t do much better than CoinMarketGame. It does all the basics right to deliver an accurate experience of what it’s like to be a trader in this market.

Sign up for an account to receive a $20,000 starting pot. Spend it wisely by building a diverse portfolio, investing in both popular and less-known altcoins with high growth potential. You can check the leaderboard out and see what your competitors are trading, then head back to the markets to see how they maximize their crypto trading profits.

6. Spark Profit

bitcoin cryptocurrency trading simulators

Spark Profit is a crypto prediction game for Android, iOS, and your browser. You use historical crypto data to predict the position of Bitcoin, Ethereum, and Litecoin, as well as several international stock markets.  Spark Profit is basically about taking a long or short position on the future of the market. Your goal is to win points with accurate predictions. If the market touches your profit price, you win points. If it hits your loss point, you lose them. Simple, right?

Your goal is to win points. Estimate and set a profit price that you think the market will hit. Also, set a loss price while you’re at it. If the market touches the profit price, you will win points, but touching the loss price will make you lose points. Simple, right?

Spark Profit is a lot tougher than it sounds, and the much-needed reality check that early investors need. Before you invest a single dollar in cryptocurrencies, play this game and see how well you do. If you end up bankrupt, you’re better off putting your money back in your wallet.

7. Bitmex

bitmex testnet crypto leverage site free account

Think you’re getting the hang of Spark Profit? Why not step up to the next level with a Bitmex Testnet account? Bitmex is one of the most popular crypto exchanges. Here, you take a long or short position on where one of the listed cryptocurrencies will be in a certain time frame. Then, you apply leverage. Leverage can boost your potential profits (or losses) by up to 100 percent.

You will need to grab some Testnet Bitcoin from a faucet (follow the Bitmex tutorial to find out how), but then you can begin trading using the Bitmex Testnet. It’s valuable education before attempting to trade crypto futures!

What’s the Best Bitcoin Beginner’s Tip?

Education. All the way. If you don’t educate yourself before opening your wallet, you’re best off heading to the nearest bathroom and flushing your dollars straight away. Save yourself the time.

Trying out cryptocurrency trading in a mock market is a great first step. Reading articles, blog posts, and more helps, too. But at some point, you’re going to have to take the first step. Start small, and most of all, move slowly.

Read the full article: The 7 Best Risk-Free Cryptocurrency Trading Simulators


Read Full Article

29 September 2018

The 6 Best Android Gallery Apps Better Than Google Photos

Two weeks with a $16,000 Hasselblad kit


For hobbyist photographers like myself, Hasselblad has always been the untouchable luxury brand reserved for high-end professionals.

To fill the gap between casual and intended photography, they released the X1D — a compact, mirrorless medium format. Last summer when Stefan Etienne reviewed the newly released camera, I asked to take a picture.

After importing the raw file into Lightroom and flipping through a dozen presets, I joked that I would eat Ramen packets for the next year so I could buy this camera. It was that impressive.

XCD 3.5/30mm lens

Last month Hasselblad sent us the XCD 4/21mm (their latest ultra wide-angle lens) for a two-week review, along with the X1D body and XCD 3,2/90mm portrait lens for comparison. I wanted to see what I could do with the kit and had planned the following:

  • Swipe right on everyone with an unflattering Tinder profile picture and offer to retake it for them
  • Travel somewhere with spectacular landscapes

My schedule didn’t offer much time for either, so a weekend trip to the cabin would have to suffice.

[gallery type="slideshow" link="none" columns="1" size="full" ids="1722181,1722182,1722183,1722184,1722185,1722186,1722187,1722188,1722201"]

As an everyday camera

The weekend upstate was rather quiet and uneventful, but it served to be the perfect setting to test out the camera kit because the X1D is slow A. F.

It takes approximately 8 seconds to turn on, with an additional 2-3 seconds of processing time after each shutter click — top that off with a slow autofocus, slow shutter release and short battery life (I went through a battery within a day, approximately 90 shots fired). Rather than reiterating Stefan’s review, I would recommend reading it here for full specifications.

Coming from a Canon 5D Mark IV, I’m used to immediacy and a decent hit rate. The first day with the Hasselblad was filled with constant frustration from missed moments, missed opportunities. It felt impractical as an everyday camera until I shifted toward a more deliberate approach — reverting back to high school SLR days when a roll of film held a limited 24 exposures.

When I took pause, I began to appreciate the camera’s details: a quiet shutter, a compact but sturdy body and an intuitive interface, including a touchscreen LCD display/viewfinder.

[gallery type="slideshow" link="none" columns="1" size="full" ids="1722796,1722784,1722775"]

Nothing looks or feels cheap about the Swiss-designed, aluminum construction of both the body and lenses. It’s heavy for a mirrorless camera, but it feels damn good to hold.

XCD 4/21mm lens

[gallery type="slideshow" link="none" columns="1" size="full" ids="1722190,1722191,1722489,1722490"]

Dramatic landscapes and cityscapes without an overly exaggerated perspective — this is where the XCD 4/21mm outperforms other super wide-angle lenses.

With a 105° angle of view and 17mm field of view equivalent on a full-framed DSLR, I was expecting a lot more distortion and vignetting, but the image automatically corrected itself and flattened out when imported into Lightroom. The latest deployment of Creative Cloud has the Hasselblad (camera and lens) profile integrated into Lightroom, so there’s no need for downloading and importing profiles. 

Oily NYC real estate brokers should really consider using this lens to shoot their dinky 250 sq. ft. studio apartments to feel grand without looking comically fish-eyed.

XCD 3,2/90mm lens

The gallery below was shot using only the mirror’s vanity lights as practicals. It was also shot underexposed to see how much detail I could pull in post. Here are the downsized, unedited versions, so you don’t have to wait for each 110mb file to load.

[gallery type="slideshow" link="none" columns="1" size="full" ids="1722193,1722194,1722195,1722196"]

I’d like to think that if I had time and was feeling philanthropic, I could fix a lot of love lives on Tinder with this lens.

Where it shines

Normally, images posted in reviews are unedited, but I believe the true test of raw images lies in post-production. This is where the X1D’s slow processing time and quick battery drainage pays off. With the camera’s giant 50 MP 44 x 33mm CMOS sensor, each raw file was approximately 110mb (compared to my Mark IV’s 20-30mb) — that’s a substantial amount of information packed into 8272 x 6200 pixels.

Resized to 2000 x 1500 pixels and cropped to 2000 x 1500 pixels

While other camera manufacturers tend to favor certain colors and skin tones, Dan Wang, a Hasselblad rep, told me, “We believe in seeing a very natural or even palette with very little influence. We’re not here to gatekeep what color should be. We’re here to give you as much data as possible, providing as much raw detail, raw color information that allows you to interpret it to your extent.”

As someone who enjoys countless hours tweaking colors, shifting pixels and making things pretty, I’m appreciative of this. It allows for less fixing, more creative freedom.

Who is this camera for?

My friend Peter, a fashion photographer (he’s done editorial features for Harper’s Bazaar, Cosmopolitan and the likes), is the only person I know who shoots on Hasselblad, so it felt appropriate to ask his opinion. “It’s for pretentious rich assholes with money to burn,” he snarked. I disagree. The X1D is a solid step for Hasselblad to get off heavy-duty tripods and out of the studio.

At this price point though, one might expect the camera to do everything, but it’s aimed at a narrow demographic: a photographer who is willing to overlook speediness for quality and compactibility.

With smartphone companies like Apple and Samsung stepping up their camera game over the past few years, the photography world feels inundated with inconsequential, throw-away images (self-indulgent selfies, “look what I had for lunch,” OOTD…).

My two weeks with the Hasselblad was a kind reminder of photography as a methodical art form, rather than a spray and pray hobby.

Reviewed kit runs $15,940, pre-taxed:


Read Full Article

How to Password Protect a Folder in Windows


password-protect-folders

Take a second to consider how much sensitive information you have stored on your computer at this moment. Bank information? Family photos? Financial documents?

As secure as your files feel on your PC, they’re also prime targets for malicious intent. Password protecting your sensitive folders is a basic security step. Think of it as a virtual vault, which encrypts whatever files or additional folders you’d need kept safe.

Read on to learn how to create a password-protected folder to keep your precious files protected, and sneaky onlookers at bay.

Method 1: Text-Based Folder Lock

While Windows 10 doesn’t allow users to password protect folders by default, you can use a batch script to lock folders using a password of your choice. If you aren’t familiar with batch scripts, here’s a primer.

Start by navigating to the folder you’d like to lock. I’ll create a new folder to use as a virtual safe named Safe.

Double-click the folder. You’ll be creating your batch file within the directory that’ll store your locked folder. Create an empty text document within your folder by right-clicking an empty space and selecting New > Text Document.

Within this document, copy and paste the following code:

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==your_password goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

To set your password, change the your_password bit in the line if NOT “%pass%==your_password” goto FAIL to a password of your choice:

Once you’ve added your password, head to File > Save As within your Notepad program. Name it anything you’d like, Locker in my case, but ensure you add a .bat extension to your file. In my case, I will name my file Locker.bat (ensuring I’ve included the extension).

Double-click the BAT file to create your Locker folder. This is the folder that will be locked with your password. You should now have a folder and a file named Locker.

Place all your sensitive documents within this Locker folder. Once you’ve placed your files, double-click your Locker.bat file again. A command prompt will open asking if you want to lock your folder. Input Y and press Enter.

Poof! Your folder should disappear. This is a natural byproduct of your BAT file.

To access your files again, double-click on your Locker.bat file. You will be prompted to enter the password you added when creating the file.

Voila! If you enter your password correctly, your Locker folder will reappear again.

Note: This BAT file can be changed via your PC. That means others who are familiar with this trick may be able to change your password. For the most part, however, this nifty little trick will add a much needed buffer to your most sensitive local documents!

If you’d like to learn more about what BAT files can do, we’ve got you covered.

Method 2: ZIP Folder Lock

While the above trick uses the default Notepad program, you can also both lock and condense your sensitive documents using a popular desktop program named 7-Zip.

Typically used to unzip folders and extract files, 7-Zip also allows users to password protect their folders. To follow this method, first download 7-Zip.

Once 7-Zip is downloaded and installed, click the start menu and type 7zip. Select the 7-Zip File Manager option. Then, locate the file or folder you want to protect, click on it, and click the Add option at the top of the window.

Next, enter your new password in the Encryption section. When you’re done, click OK. Check your folder location and you’ll find a ZIP file named the same as your original folder.

Now that you have your zipped file, delete your original folder (as keeping it would defeat the purpose of password protecting your new ZIP file).

It’s a good idea to create another containing folder for your zipped file, as unzipping it may scatter your files in a directory. In the example below, the Sensitive Documents folder will hold my zipped Safe file.

Right-click your zip file and select 7-Zip > Extract Here. You’ll be prompted to enter your password.

Enter your password and your files will appear in your directory.

That’s it! While this method isn’t exactly timely, since you have to undergo the whole process every time you need to add or view your files, it works perfectly and only uses this trusted software.

Method 3: Hide Files and Folders

Now that you’ve locked your folder, you can also take the additional step of hiding your folder from view.

Right-click a file or folder or your choice and select Properties. Check the Hidden option beside Attributes. Click Apply and then OK.

Your file or folder should now disappear. To view your folder again, click on the View tab of your Windows 10 file manager. Then, select Options > Change folder and search options.

In the following File Options window, click on the View tab. Finally, click on the option labeled Show hidden files, folders, and drives under Hidden files and folders. Click Apply and then OK.

You should now be able to view your file or folder. To revert your file or folder back to hidden, head to your File Options window again and select Don’t show hidden files, folders, or drives. That’s it!

Lock Your Windows Folders to Keep Your Data Safe

With the simple methods above, you can choose to implement either one or all three. No matter which you pick, you can rest assured that your previous sensitive documents are safe under an additional layer of protection not enabled by default on your PC.

Sometimes, all it takes is a password lock to prevent theft. That applies to the virtual world as much it does to the real world. And it’s up to you to bulletproof your PC with the best security tools for your computer.

Read the full article: How to Password Protect a Folder in Windows


Read Full Article

7 Ways to Download Videos From Instagram


download-insta-video

Ah, Instagram video. A yardstick by which we can all measure our online popularity—or not.

We’ve already shown you everything you need to know about Instagram video, but what if you want to download them, share them, and view them at your leisure?

Whether it’s your own amazing creations or quality content from your friends, downloading videos from Instagram is as easy as pie. Just choose one of the methods below and get cracking.

1. Video Downloader for Instagram

Available on: Android

Android users can find an abundance of specialist apps for downloading Instagram videos in the Google Play Store (tips for using the Google Play Store).

One of the most popular is Video Downloader for Instagram. It lets you download or repost videos from Instagram with a single tap. The app can even download the tags that accompany the videos.

The downloaded content is automatically added to your phone’s gallery app.

Download: Video Downloader for Instagram (Free)

2. IFTTT

Available on: Android, iOS, Web

Do you want to download all of your Instagram videos? Or maybe save Instagram videos you like? You can set up an IFTTT applet. To get the applet working, you will need an IFTTT account, an Instagram account, and a Dropbox account (how to get more done with Dropbox).

The result is an automatic process in which any Instagram video you add or like is automatically downloaded and added to your chosen Dropbox folder. What could be simpler than that?

3. PostGraber

postgraber home page

Available on: Web

PostGraber differs from a lot of the other web-based Instagram download tools. Whereas most of them can only grab one piece of content per post, PostGraber can download all of the photos and videos that are associated with a single post.

All you need is the URL of the Instagram post you want to download. You can get it on the mobile app by going to Copy Link, or from the browser’s address bar on the web app.

Paste the URL into the box on the PostGraber website and click Go. The web app will take care of the rest.

Note: This app only works with public Instagram posts.

4. Dredown

Available on: Web

Dredown—which is still sometimes referred to by its previous name, Instadown—is one of the original Instagram video download tools, and it’s still going strong.

Like PostGraber, all Dredown needs to work is a URL. Paste the URL into the box and click Dredown. Within a few seconds, your browser will start downloading the MP4 file.

Dredown works with more services than just Instagram. You can also use it to download content from YouTube, Facebook, Keek, Twitter, Twitch, Vine, Vimeo, Metacafe, Vevo, Kohtakte, and Tumblr. For all the services it supports, you just need to URL of the post, video, or photo you want to save.

5. Regrammer

Available on: iOS

Okay, so we’ve covered Android and web apps. But how do you download Instagram videos on iOS?

Well, there are several apps in the App Store that profess the ability to download videos—but they’re often packed with ads and in-app purchases, and are difficult to use.

One exception is Regrammer. The app is entirely free, and although it’s ad-supported, the ads aren’t so obnoxious you’ll want to steer clear.

Once again, you’ll need the URL of the Instagram video you want to download to make the app work. When you have it, open the Regrammer app, paste in the URL, and click Preview.

On the final page, you can choose to either download the video onto your device or repost it under your own name.

Download: Regrammer (Free)

6. OG Instagram

Available on: Android

OG Instagram is not in the Google Play Store. To get your hands on it you’ll need to sideload the app on your Android device.

The app is not just a way to download and save Instagram videos on Android—it’s also a full-featured Instagram client that lets you follow hashtags, use two accounts on the same device, view the profile picture of users (by long-pressing), and share URLs to external apps.

Download: OG Instagram (Free)

7. Gramblast

Available on: Web

We will leave you with one more web app. It’s always sensible to keep a few web apps for downloading Instagram videos in your arsenal, as they will often go down for a couple of days at a time.

By now, you’ll be familiar with the process for using the service. Grab the URL of the video or picture you want, then paste it into the Gramblast web app and click Download.

Depending on the size of the file, you should have a new MP4 on your computer within a matter of seconds. You can use the video to re-upload to a different social network, or just keep it on your hard drive so you can refer back to it later.

Remember Instagram Video Copyrights

As easy as it is to download videos off Instagram, don’t forget that you have no rights over videos you did not create.

Yes, you can download them. Yes, you can enjoy them. But don’t go uploading them as your own, or distributing them in any other way, especially without giving due credit. You wouldn’t want the same thing done to you.

Other Ways to Download Instagram Videos

If these seven apps don’t give the results you want to download videos from Instagram, there are some additional methods you can use.

For example, you can one of the generic apps that let you download streaming videos from websites. VideoGrabby, Video DownloadHelper, and Freemake Video Downloader are all solid options in this department.

Read the full article: 7 Ways to Download Videos From Instagram


Read Full Article

10 LEGO Star Wars Toys Actually Worth Buying Right Now

When Is the Safest Time to Invest in Cryptocurrency?


invest-bitcoin-ethereum

Never.

There will always be a measure of risk when “investing” in Bitcoin, Ethereum, or any other cryptocurrency. However, that risk can be managed.

In this article, we’ll cover the fundamental points you need to know to make a risk-managed investment in cryptocurrency. But a word of warning: do NOT mistake “risk-managed” for “safe” because they are NOT the same thing. Keep reading to find out why.

How Cryptocurrency Investments Work

As with all things traded, digital coins are subject to supply and demand. At any given moment, there are people who have coins and want to sell them (supply) and there are people who want coins and are willing to buy them (demand). Combined, they comprise the coin market.

But not everyone agrees on the value of a coin. Every seller has a minimum price at which they’re willing to sell, and every buyer has a maximum price at which they’re willing to buy.

Crypto market order books

Sellers put their coins on the market at their willing prices, and prospective buyers buy them if the prices are low enough. As lower-priced coins are bought up, only the higher-priced coins remain on the market. As the price goes up, the number of willing buyers diminishes—and if buyers run out, sellers may need to start selling at lower prices. Thus, the price of a coin goes up and down as buyers and sellers enter and leave the market.

The current market price of a specific cryptocurrency is the price of the most recently sold coin.

So how do people make money with cryptocurrency? They buy in at a certain price, wait for the market price to rise, then sell for a profit. However, if the market price never rises above their buy-in price, then selling at a loss is the only option.

In this way, coin investing is similar to stock trading: each coin of a cryptocurrency is like a share in a publicly-traded company, and both coin prices and stock prices are determined by what buyers are willing to spend.

Why Cryptocurrency Investments Are Risky

A coin’s value is tied to how much faith people have in it.

If people really believe that a given crypto project is the future, then they’ll jump aboard the wagon: former non-buyers become buyers, and current buyers become willing to spend more to acquire coins. Sellers become emboldened to hold for the future and become less willing to sell at lower prices. The coin’s price shoots up.

Conversely, if people lose faith and stop believing in the longevity of a coin, then buyers back out and disappear. Sellers lose hope that their coins will be worth anything in the future, so they decide to dump—but they aren’t the only ones. Everyone ends up undercutting each other to offload their coins as fast as possible. The coin’s price plummets.

The problem is, increasing faith in a cryptocurrency is extremely difficult, and even hard-earned faith can evaporate overnight.

BTC all time chart

ETH all time chart

You’ve probably heard that you “need” to invest in cryptocurrencies “while you still can.” Buy now while the price is low so that you can sell when the price shoots back up! And based on the above price-over-time charts, you might be tempted to sink your savings into them. After all, look at those spikes!

If you had invested $1,000 into Bitcoin in January 2017, it would’ve been worth $18,000 in January 2018. If you had invested that same $1,000 into Ethereum in January 2017, it would’ve been worth a whopping $100,000. In just one year! You won’t find that kind of annual return anywhere else.

But high returns come with high risks.

January 2018 saw a huge price rally for nearly every cryptocurrency. If you bought in at these highs, you would have had a very worrying 2018, as the prices subsequently plummeted.

Spikes like this are common in the cryptocurrency world. As of this writing, CoinMarketCap shows over 1,900 different actively-traded cryptocurrencies, many of which experienced their own big spikes similar to what Bitcoin and Ethereum have gone through.

How did these cryptocurrencies fare?

PPC all time chart

Peercoin became big around the end of 2013, skyrocketing in price through the first quarter of 2014 before users lost faith. The price dwindled down and down, with a few hopeful spikes along the way. The price spiked again in January 2018, when the whole market rocketed, but Peercoin failed to sustain this momentum and dwindled once again.

STEEM all time chart

Steem is a younger cryptocurrency, just over two years old as of this writing, that exhibits much of the same patterns as older cryptocurrencies: the price sits stagnant for a quite, a spike comes along, users jump on the wagon, realize the hype wave is over, then sell out before the price plummets. Spikes happened in 2017 and 2018, but none have had a lasting impact on the price.

DOGE all time chart

The same thing happened with Dogecoin, which was once the third-largest cryptocurrency in 2014 but is now barely hanging on in the Top 20. Dogecoin is one of the rare examples of a cryptocurrency that spiked to a higher price later in its life, but note how quickly that spike dissipates: it plummets, spikes again, then loses most of its gains within two months.

And that’s the big risk with cryptocurrency investments: you can get rich overnight, but you can also lose it all overnight. Don’t think of it as an investment—it’s a gamble.

Cryptocurrency investment is a game of spikes. You need to already be in the game by the time a spike arrives in order to ride it up for profits. At the same time, you need to get off that ride before everyone else does, otherwise they’ll run away with the profits and leave you empty-handed.

How is crypto investment different from the stock market?

The main issue is a lack of historical data. Cryptocurrencies debuted with Bitcoin in 2009, which means the crypto market hasn’t even been around for a decade. Enthusiasts look at the 2017 spike in crypto interest as a sign of a healthy future, but there’s just no way to know for sure.

FTSE all time chart

When you look at the US stock market’s history (as shown above), you see all kinds of peaks and valleys, but you also see an upward trend over the long term. We can’t say the same for cryptocurrencies.

Could the US stock market crash and never recover? Sure. It happened to Japan in 1990. But the historical data shows that it’s unlikely. When there’s a crash, you can reasonably hope for a recovery.

There’s no basis for such a hope in cryptocurrency. Could Bitcoin, Ethereum, or any other cryptocurrency soar to higher heights over the next five years? Of course. But could the whole industry collapse and disappear? Absolutely. We simply don’t have enough historical data to do more than guess. It’s still too young and there’s too much uncertainty.

My rule of thumb: if you see a spike in cryptocurrencies, you’ve already missed the hype train. Wait for it to drop, buy in, and hold for another spike—but with the understanding that another spike may never come.

Managing Risk When Investing in Crypto

I’m not saying you shouldn’t invest in cryptocurrencies, but it’s clear that the market is alive and people can still walk away with a killing if they play their cards right.

That being said, here are a few tips to lessen your risk of a total loss:

Don’t put all your eggs in one basket. Don’t stick your entire life savings in cryptocurrency. Unless you’re willing to gamble, crypto shouldn’t be more than 5 percent of your total investment portfolio. And when you do invest in crypto, don’t dump it all into one coin. Diversify between coins that have different missions and different underlying technologies.

Only “invest” money you can afford to lose. Again, cryptocurrencies aren’t really investments—they’re speculations. It’s literally a gamble right now. Expect to lose everything and consider it a bonus if you don’t.

Sell your profits. If you make gains, don’t get greedy. Sell a portion of it to realize profit immediately, then see how the remainder performs. If it goes up again, sell another portion. Don’t “wait for the peak” before you sell—a plunge to zero could wipe you out overnight.

Never store your coins on an exchange. Another Mt. Gox controversy could be right around the corner. Have money on an exchange? Spend it or pull it out. Have coins on an exchange? Transfer them to a cold wallet for secure storage.

Read the full article: When Is the Safest Time to Invest in Cryptocurrency?


Read Full Article

Microsoft Is Ending Support for Skype Classic


Microsoft is preparing to pull support for Skype Classic, officially known as Skype 7.0. Support for the older version of Skype, which has a more classic look and feel to it than the current versions, will end in November on both desktop and mobile.

Microsoft Messes With a Winning Formula

In 2017, Microsoft launched a new version of Skype designed to appeal to a younger demographic. This proved to be rather controversial, as the majority of Skype users are older and not particularly interested in stickers and emojis.

Rather predictably, this led some users to stick with Skype 7.0. In July 2018, Microsoft launched Skype 8.0 and stated that all previous versions would stop working within weeks. Users duly complained, and Microsoft relented. But not for long.

The End Is Nigh for Skype Classic

Microsoft has now announced it will be pulling support for Skype Classic in November. It also added that, “although you may be able to use older versions for a little while, we encourage you to update today to avoid any interruption.”

An update to the original post reads, “As we continue to focus on and improve Skype version 8, support for Skype versions 7, and below will end on November 1, 2018 on desktop devices and November 15, 2018 on mobile and tablet devices.”

To be fair to Microsoft, the company has spent the last year trying to find a happy medium by blending the old and new together. Which meant reintroducing some of the classic features existing users felt were missing from Skype 8.0.

The danger with this approach is ending up with a half-cocked product that no one is particularly happy with. However, Microsoft has now committed to forcing everyone into using the same version of Skype going forward, so we’ll see how that turns out.

There Are Alternatives to Skype…

If you like the way Microsoft has changed Skype recently then upgrade to Skype 8.0 ASAP. But if you’re one of those longterm Skype users who hate the recent changes you might want to consider switching to one of these free Skype alternatives instead.

Read the full article: Microsoft Is Ending Support for Skype Classic


Read Full Article

4 Reasons Why Your Wi-Fi Is So Slow (And How to Fix Them)

5 WhatsApp Apps and Extensions You Didn’t Know You Need

What Instagram users need to know about Facebook’s security breach


Even if you never log into Facebook itself these days, the other apps and services you use might be impacted by Facebook’s latest big, bad news.

In a follow-up call on Friday’s revelation that Facebook has suffered a security breach affecting at least 50 million accounts, the company clarified that Instagram users were not out of the woods — nor were any other third-party services that utilized Facebook Login. Facebook Login is the tool that allows users to sign in with a Facebook account instead of traditional login credentials and many users choose it as a convenient way to sign into a variety of apps and services.

Third-party apps and sites affected too

Due to the nature of the hack, Facebook cannot rule out the fact that attackers may have also accessed any Instagram account linked to an affected Facebook account through Facebook Login. Still, it’s worth remembering that while Facebook can’t rule it out, the company has no evidence (yet) of this kind of activity.

“So the vulnerability was on Facebook, but these access tokens enable someone to use [a connected account] as if they were the account holder themselves — this does mean they could have access other third party apps that were using Facebook login,” Facebook Vice President of Product Management Guy Rosen explained on the call.

“Now that we have reset all of those access tokens as part of protecting the security of people’s accounts, developers who use Facebook login will be able to detect that those access tokens has been reset, identify those users and as a user, you will simply have to log in again into those third party apps.”

Rosen reiterated that there is plenty Facebook does not know about the hack, including the extent to which attackers manipulated the three security bugs in question to obtain access to external accounts through Facebook Login.

“The vulnerability was on Facebook itself and we’ve yet to determine, given the investigation is really early, [what was] the exact nature of misuse and whether there was any access to Instagram accounts, for example,” Rosen said.

Anyone with a Facebook account affected by the breach — you should have been automatically logged out and will receive a notification — will need to unlink and relink their Instagram account to Facebook in order to continue cross-posting content to Facebook.

How to relink your Facebook account and do a security check

To do relink your Instagram account to Facebook, if you choose to, open Instagram Settings > Linked Accounts and select the checkbox next to Facebook. Click Unlink and confirm your selection. If you’d like to reconnect Instagram with Facebook, you’ll need to select Facebook in the Linked Accounts menu and login with your credentials like normal.

If you know your Facebook account was affected by the breach, it’s wise to check for suspicious activity on your account. You can do this on Facebook through the Security and Login menu.

There, you’ll want to browse the activity listed to make sure you don’t see anything that doesn’t look like you — logins from other countries, for example. If you’re concerned or just want to play it safe, you can always find the link to “Log Out Of All Sessions” by scrolling toward the bottom of the page.

While we know a little bit more now about Facebook’s biggest security breach to date, there’s still a lot that we don’t. Expect plenty of additional information in the coming days and weeks as Facebook surveys the damage and passes that information along to its users. We’ll do the same.


Read Full Article

Facebook is blocking users from posting some stories about its security breach


Some users are reporting that they are unable to post today’s big story about a security breach affecting 50 million Facebook users. The issue appears to only affect particular stories from certain outlets, at this time one story from The Guardian and one from the Associated Press, both reputable press outlets.

When going to share the story to their news feed, some users, including members of the staff here at TechCrunch who were able to replicate the bug, were met with the following error message which prevented them from sharing the story.

According to the message, Facebook is flagging the stories as spam due to how widely they are being shared or as the message puts it, the system’s observation that “a lot of people are posting the same content.”

To be clear, this isn’t one Facebook content moderator sitting behind a screen rejecting the link somewhere or the company conspiring against users spreading damning news. The situation is another example of Facebook’s automated content flagging tools marking legitimate content as illegitimate, in this case calling it spam. Still, it’s strange and difficult to understand why such a bug wouldn’t affect many other stories that regularly go viral on the social platform.

This instance is by no means a first for Facebook. The platform’s automated tools — which operate at unprecedented scale for a social network — are well known for at times censoring legitimate posts and flagging benign content while failing to detect harassment and hate speech. We’ve reached out to Facebook for details about how this kind of thing happens but the company appears to have its hands full with the bigger news of the day.

While the incident is nothing particularly new, it’s an odd quirk — and in this instance quite a bad look given that the bad news affects Facebook itself.


Read Full Article

MacBook Trackpad Not Working? 4 Troubleshooting Tips to Try

5 takeaways on the state of AI from Disrupt SF


The promise of artificial intelligence is immense, but the roadmap to achieving those goals still remains unclear. Onstage at TechCrunch Disrupt SF, some of AI’s leading minds shared their thoughts on current competition in the market, how to ensure algorithms don’t perpetuate racism and the future of human-machine interaction.

Here are five takeaways on the state of AI from Disrupt SF 2018:

1. U.S. companies will face many obstacles if they look to China for AI expansion

Sinnovation CEO Kai-Fu Lee (Photo: TechCrunch/Devin Coldewey)

The meteoric rise in China’s focus on AI has been well-documented and has become impossible to ignore these days. With mega companies like Alibaba and Tencent pouring hundreds of millions of dollars into home-grown businesses, American companies are finding less and less room to navigate and expand in China. AI investor and Sinnovation CEO Kai-Fu Lee described China as living in a “parallel universe” to the U.S. when it comes to AI development.

“We should think of it as electricity,” explained Lee, who led Google’s entrance into China. “Thomas Edison and the AI deep learning inventors – who were American – they invented this stuff and then they generously shared it. Now, China, as the largest marketplace with the largest amount of data, is really using AI to find every way to add value to traditional businesses, to internet, to all kinds of spaces.”

“The Chinese entrepreneurial ecosystem is huge so today the most valuable AI companies in computer vision, speech recognition, drones are all Chinese companies.”

2. Bias in AI is a new face on an old problem

SAN FRANCISCO, CA – SEPTEMBER 07: (L-R) UC Berkeley Professor Ken Goldberg, Google AI Research Scientist Timnit Gebru, UCOT Founder and CEO Chris Ategeka, and moderator Devin Coldewey speak onstage during Day 3 of TechCrunch Disrupt SF 2018 at Moscone Center on September 7, 2018 in San Francisco, California. (Photo by Kimberly White/Getty Images for TechCrunch)

AI promises to increase human productivity and efficiency by taking the grunt work out of many processes. But the data used to train many AI systems often falls victim to the same biases of humans and, if unchecked, can further marginalize communities caught up in systemic issues like income disparity and racism.

“People in lower socio-economic statuses are under more surveillance and go through algorithms more,” said Google AI’s Timnit Gebru. “So if they apply for a job that’s lower status they are likely to go through automated tools. We’re right now in a stage where these algorithms are being used in different places and we’re not event checking if they’re breaking existing laws like the Equal Opportunity Act.”

A potential solution to prevent the spread of toxic algorithms was outlined by UC Berkeley’s Ken Goldberg who cited the concept of ensemble theory, which involves multiple algorithms with various classifiers working together to produce a single result.

We’re right now in a stage where these algorithms are being used in different places and we’re not even checking if they’re breaking existing laws.

But how do we know if the solution to inadequate tech is more tech? Goldberg says this is where having individuals from multiple backgrounds, both in and outside the world of AI, is vital to developing just algorithms. “It’s very relevant to think about both machine intelligence and human intelligence,” explained Goldberg. “Having people with different viewpoints is extremely valuable and I think that’s starting to be recognized by people in business… it’s not because of PR, it’s actually because it will give you better decisions if you get people with different cognitive, diverse viewpoints.”

3. The future of autonomous travel will rely on humans and machines working together

Uber CEO Dara Khosrowshahi (Photo: TechCrunch/Devin Coldewey)

Transportation companies often paint a flowery picture of the near future where mobility will become so automated that human intervention will be detrimental to the process.

That’s not the case, according to Uber CEO Dara Khosrowshahi. In an era that’s racing to put humans on the sidelines, Khosrowshahi says humans and machines working hand-in-hand is the real thing.

“People and computers actually work better than each of them work on a stand-alone basis and we are having the capability of bringing in autonomous technology, third-party technology, Lime, our own product all together to create a hybrid,” said Khosrowshahi.

Khosrowshahi ultimately envisions the future of Uber being made up of engineers monitoring routes that present the least amount of danger for riders and selecting optimal autonomous routes for passengers. The combination of these two systems will be vital in the maturation of autonomous travel, while also keeping passengers safe in the process.

4. There’s no agreed definition of what makes an algorithm “fair”

SAN FRANCISCO, CA – SEPTEMBER 07: Human Rights Data Analysis Group Lead Statistician Kristian Lum speaks onstage during Day 3 of TechCrunch Disrupt SF 2018 at Moscone Center on September 7, 2018 in San Francisco, California. (Photo by Kimberly White/Getty Images for TechCrunch)

Last July ProPublica released a report highlighting how machine learning can falsely develop its own biases. The investigation examined an AI system used in Fort Lauderdale, Fla., that falsely flagged black defendants as future criminals at a rate twice that of white defendants. These landmark findings set off a wave of conversation on the ingredients needed to build a fair algorithms.

One year later AI experts still don’t have the recipe fully developed, but many agree a contextual approach that combines mathematics and an understanding of human subjects in an algorithm is the best path forward.

“Unfortunately there is not a universally agreed upon definition of what fairness looks like,” said Kristian Lum, lead statistician at the Human Rights Data Analysis Group. “How you slice and dice the data can determine whether you ultimately decide the algorithm is unfair.”

Lum goes on to explain that research in the past few years has revolved around exploring the mathematical definition of fairness, but this approach is often incompatible to the moral outlook on AI.

“What makes an algorithm fair is highly contextually dependent, and it’s going to depend so much on the training data that’s going into it,” said Lum. “You’re going to have to understand a lot about the problem, you’re going to have to understand a lot about the data, and even when that happens there will still be disagreements on the mathematical definitions of fairness.”

5. AI and Zero Trust are a “marriage made in heaven” and will be key in the evolution of cybersecurity

SAN FRANCISCO, CA – SEPTEMBER 06: (l-R) Duo VP of Security Mike Hanley, Okta Executive Director of Cybersecurity Marc Rogers, and moderator Mike Butcher speak onstage during Day 2 of TechCrunch Disrupt SF 2018 at Moscone Center on September 6, 2018 in San Francisco, California. (Photo by Kimberly White/Getty Images for TechCrunch)

If previous elections have taught us anything it’s that security systems are in dire need of improvement to protect personal data, financial assets and the foundation of democracy itself. Facebook’s ex-chief security officer Alex Stamos shared a grim outlook on the current state of politics and cybersecurity at Disrupt SF, stating the security infrastructure for the upcoming Midterm elections isn’t much better than it was in 2016.

So how effective will AI be in improving these systems? Marc Rodgers of Okta and Mike Hanley of Duo Security believe the combination of AI and a security model called Zero Trust, which cuts off all users from accessing a system until they can prove themselves, are the key to developing security systems that actively fight off breaches without the assistance of humans.

“AI and Zero Trust are a marriage made in heaven because the whole idea behind Zero Trust is you design policies that sit inside your network,” said Rodgers. “AI is great at doing human decisions much faster than a human ever can and I have great hope that as Zero Trust evolves, we’re going to see AI baked into the new Zero Trust platforms.”

By handing much of the heavy lifting to machines, cybersecurity professionals will also have the opportunity to solve another pressing issue: being able to staff qualified security experts to manage these systems.

“There’s also a substantial labor shortage of qualified security professionals that can actually do the work needed to be done,” said Hanley. “That creates a tremendous opportunity for security vendors to figure out what are those jobs that need to be done, and there are many unsolved challenges in that space. Policy engines are one of the more interesting ones.”


Read Full Article