OpenAI

Just received this article from a friend, read it, and it sure is an eye opener. Good or bad, artificial intelligence (AI) seems to be growing by leaps and bounds:

https://www.inc.com/jason-aten/the-chatgpt-iphone-app-from-openai-has-a-glaring-privacy-problem-company-is-reading-your-conversations.html

Here's the opening paragraphs, which will get your attention.

Jim Hamm

"OpenAI's privacy policy says that when you "use our Services, we may collect Personal Information that is included in the input, file uploads, or feedback that you provide." Specifically, that means that if you ask ChatGPT questions that contain personal information, that information will be sent to OpenAI. That's a big deal when you realize your chat may be read by a human reviewer.

The company says it anonymizes conversations before they are seen by a human, but that just means that it removes identifying information from the metadata of the file--not the content of your prompt. If you include personal information, that information will still be included.

The company isn't clear on whether it reviews the audio files to determine the effectiveness of its speech-to-text transcription, but the privacy policy certainly gives it the right to do so. That means that humans at OpenAI could listen to what you say, not just read what you type. It also means that they would have access to whatever other sound is going on in the background while you're using the feature."

Ransomware

According to the following article, it seems we may have to live with ransomware attacks forever. And the following statement from the article is a bit disconcerting, to say the least: "Many ransomware operators are based in Russia, where the Kremlin tends to turn a blind eye to cyber criminals targeting Western countries." And what if, say, countries like Russia, China, Iran, et al, decide to 'attack' a country using ransomware? Not good! 

One solution to prevent a ransomware attack on you becoming a complete disaster is to do a full backup of your data and photos, whether to the 'cloud' or an external hard drive. 

Here's the article..

Jim Hamm

Ransomware — a novelty just a few years ago — is now endemic, like COVID.

We'll have to learn to live with the malicious file-encrypting code, even as we struggle to limit it.
Why it matters: Ransomware attacks, which take an organization's data hostage and shut down its systems until the hackers receive payment, have exacted an escalating price on law enforcement, policymaking and financial resources around the world.

It remains the top threat on the minds of cyber defenders at this week's RSA Conference in San Francisco, the cybersecurity industry's highest-profile annual gathering.
What's happening: Rob Joyce, the NSA's director of cybersecurity, told reporters during a briefing at RSA that Russian hackers are now weaponizing ransomware in attempted attacks against Ukrainian logistics supply chain companies, as well as organizations in Western-allied countries.

Cybersecurity firm Sophos said in a report released Tuesday that 68% of cyberattacks last year involved ransomware.
A panel on the last day of RSA acted out what the federal response to a hypothetical, Iran-backed ransomware attack on U.S. banks in 2025 might look like.
How it works: A ransomware attack typically starts with malicious hackers installing file-encrypting malware onto an organization's networks and then displaying a ransom note on every screen.

To unlock the networks and prevent a leak of any stolen data, ransomware gangs demand payment, often in the form of cryptocurrency.
In recent years, ransomware has infected schools, hospitals, small businesses and more.
Between the lines: Conversations about ransomware at RSA have shifted from viewing it as an easily squashed nuisance to seeing it as a persistent threat.

Following the ransomware attack on Colonial Pipeline in May 2021, U.S. officials were quick to make ransomware a national priority. President Biden even started engaging with Vladimir Putin to try to get him to crack down.
Ransomware now is treated like any other crime that's not expected to be easily solved or to vanish after a couple of key arrests, experts told Axios.
Zoom out: Many ransomware operators are based in Russia, where the Kremlin tends to turn a blind eye to cyber criminals targeting Western countries.

Ransomware gangs are well-organized, making them adept at rebranding and reshuffling in the face of law enforcement heat, John Dwyer, head of research at IBM's X-Force, told Axios.
Organizations still struggle with basic cyber hygiene to protect themselves.
🥊 Reality check: Government sanctions, internet server takedowns and criminal arrests have slowly but steadily reduced businesses' willingness to pay ransomware gangs, Tom Hofmann, chief intelligence officer at Flashpoint, told Axios.

The number of ransomware attacks dropped 15% between 2021 and 2022, according to recent data from Google-owned threat intelligence firm Mandiant. But that came after they skyrocketed the year before.

Using an iPad With a Keyboard

If you want to use an external keyboard with an iPad, there are two Accessibility settings to be aware of.

I suggest that you disable “Accessibility -> Keyboards -> Full Keyboard Access” and enable “Accessibility -> Keyboards -> Key Repeat”.

If “Full Keyboard Access” is enabled, some pretty strange stuff will happen when you are trying to use the keyboard arrow keys to move the text cursor around.

If “Key Repeat” is disabled, you have to manually repress a key to repeat it, and this is undesirable when using the arrow keys to move the text cursor around.

John Carter Sr

Is Your iPad Not Charging?

A 2018 11” iPad Pro was left on a charger overnight. The next morning the charge had not increased from the 4% it started at. The iPad would not even connect to a Mac. Tried a different charger to no avail. By then, the charge had reduced to 3%. Argosy West in Prescott said that the iPad was a sealed unit and only Apple could do any repairs, which might come to $350.

Thinking that the best thing to do was destroy it, the iPad was erased and was ready to toss in the trash. On a hunch, it was connected to power again. After less than an hour it was charged to 15%. An hour later, it had charged to over 90%. The iPad was successfully restored from an iPhone backup via iCloud (which took a few hours).

By erasing the iPad, it is guessed that the system settings were cleared enabling the iPad to again take a charge.


John R. Carter, Sr.


Delete Cookies

When on a website one is frequently asked if it's OK to accept their 'cookies'. Opinions may vary on an answer, but if you do accept them, should they periodically be cleared from your device? Here's a couple of articles with opinions on this.

Jim Hamm

Should you delete cookies? 6 reasons you probably should clear cookies (norton.com)

How the cookie crumbles

Cache and tracking cookies? Get ‘em out of here. They’re (admittedly helpful) little files that store info in your browser so you don’t have to log in every single time, and the stuff you add to your cart on shopping sites stays there for next time.

But they also weigh down your browser and should be cleared periodically as part of your tech privacy maintenance. Since many of you use Chrome, I’ve included steps for that browser below. 

🍪 Use Safari, Edge or Firefox? Get the steps here — scroll to No. 5.

  • On your computer, open Chrome. At the top right, click the three stacked dots

  • Click More Tools > Clear Browsing Data …

  • At the top, choose a time range. To delete everything, select All Time.

  • Best sure to check the boxes next to “Cookies and other site data” and “Cached images and files.”

  • Click Clear data. Voila!

By the way, your phone is full of cookies, too — here’s how to clear those out.