Revelations continue to mount with regard to the capabilities of the U.S. National Security Agency, which, newly revealed documents show, has long been working to crack widely used Internet encryption technologies and “covertly influence and/or overtly leverage” technology firms’ products to make them exploitable. In this joint article by ProPublica and the New York Times, the damning details are piled ever higher, suggesting that the NSA can decrypt Internet traffic protected by SSL and VPNs, as well as encryption used in 4G-based smartphones. follow link
Add Notes to Pre-existing Recordings in Pear Note
While most people think of Pear Note as a tool for recording notes live, it can be used to take notes on pre-existing recordings as well. If you have an audio or video recording that you'd like to take notes on in Pear Note, simply:
- Drag the audio/video file to Pear Note and import it into a new document.
- Hit play.
- Click the lock to unlock the text of the note.
Now you can take notes that will be synced to the recording, just as if you'd recorded them live.
Visit Useful Fruit Software
- ExtraBITS for 9 September 2013 (09 Sep 13)
The NSA’s Campaign to Undermine Internet Security