Losing the Occasional Important Message? Set up a Ham Filter

Although spam remains as much of a scourge as ever, spam filters have improved enough that most people see relatively little spam and lose relatively few legitimate messages (known as “ham”) to spam filters. However, good email messages are still sometimes caught by spam filters. To reduce the chance of missing an important message, consider making a “ham filter.” A ham filter looks for certain words—usually proper nouns—that are likely to appear only in legitimate messages and then marks such messages as Not Spam or moves them out of a Spam folder. (This capability is available in Gmail and can be emulated with multiple rules that you create in Apple’s Mail preferences, and likely in other systems as well; ask us about yours if you’re not sure.) Useful ham words include the name of your city, local high school or college names, club names or abbreviations, industry-specific terms, and any other words that are specific to your community or profession. Always test a possible ham word by first searching for it in your Spam folder to make sure it appears only in legitimate messages.

(Featured image by iStock.com/Fotosmurf03)

About That Worrying Message Saying Your Password Has Been Breached…

In iOS 14, Apple added a feature that warns you when one of your website passwords stored in iCloud Keychain has appeared in a data breach. We’ve fielded some questions of late from people worrying if the message is legitimate, and if so, what they should do. What has happened is that online criminals have stolen username and password data from a company, and your credentials were included in that data breach. You should indeed change your password immediately, and it’s fine to let the iPhone suggest a strong password for you. Or, if it makes you feel more comfortable, you can usually change the password in Safari on your Mac instead. Either way, make sure it’s unique—never reuse passwords across multiple sites!

(Featured image by iStock.com/LumineImages)

The Plug Is Mightier Than the Puck: Wireless Charging Is Wildly Inefficient

In 2017, Apple added support for Qi wireless charging to the iPhone 8 and iPhone X, and with the iPhone 12 lineup, it introduced its own MagSafe wireless charging technology. There’s no denying the convenience of wireless charging, but keep in mind that it’s extremely inefficient compared to wired charging. Individually, that may not matter much when you’re charging overnight from a wall-connected charger. But across billions of phones, it’s more problematic. One estimate suggests that wireless charging requires nearly 50% more power than cable. And if you’re charging from a wireless battery pack, wasting that juice means less of a top-up before exhausting the battery pack. Charging speed suffers too. In short, to charge your iPhone quickly and efficiently, whether from a wall-connected charger or a battery pack, stick with the traditional Lightning cable.

(Featured image by iStock.com/grinvalds)

Frequently Asked Questions Surrounding Apple’s Expanded Protections for Children

Apple’s recent announcement that it would soon be releasing two new technologies aimed at protecting children has generated a firestorm of media coverage and questions from customers. Unfortunately, much of the media coverage has been based on misconceptions about how the technology works, abetted by uncharacteristically bungled communications from Apple. It’s not inconceivable that Apple will modify or even drop these technologies in the official release of iOS 15, iPadOS 15, and macOS 12 Monterey, but in the meantime, we can provide answers to the common questions we’ve been hearing.

What exactly did Apple announce?

Two unrelated technologies:

  • Messages will gain features that warn children and their parents when sexually explicit photos are received or sent. Such content will be blurred, the child will be warned and given the option to avoid viewing the image, and parents may be alerted (depending on the age of the child and settings).
  • Photos uploaded by US users to iCloud Photos will be matched—using a complex, privacy-protecting method that Apple has developed—against known illegal photos considered Child Sexual Abuse Material, or CSAM. If a sufficient number of images match, they’re verified by a human reviewer at Apple to be CSAM and then reported to the National Center for Missing and Exploited Children (NCMEC), which works with law enforcement in the US.

Does this mean Apple is scanning all my iPhone photos?

Yes and no. Messages will use machine learning to identify sexually explicit content in received and sent images. That scanning takes place entirely on the iPhone—Apple knows nothing about it, and no data is ever transmitted to or from Apple as a result. It’s much like the kind of scanning that Photos does to identify images that contain cats so you can find them with a search. So scanning is taking place with this Messages feature, but Apple isn’t doing it.

The CSAM detection feature operates only on images uploaded to iCloud Photos. (People who don’t use iCloud Photos aren’t affected by the system at all.) On the device, an algorithm called NeuralHash creates a hash and matches it against an on-device database of hashes for known illegal CSAM. (A hash is a one-way numeric representation that identifies an image—it’s much like how a person’s fingerprint identifies them but can’t be used to re-create that person.) NeuralHash knows nothing about the content of any image—it’s just trying to match one hash against another. In this case, it’s matching against existing image hashes, not scanning for a type of content, and Apple is notified only after enough image hashes match.

It’s also important to note that this is different from how companies like Facebook, Google, and Microsoft scan your photos now. They use machine learning to scan all uploaded photos for CSAM, and if they detect it, they’re legally required to report it to the NCMEC’s CyberTipline, which received 21.7 million CSAM reports from tech companies in 2020, over 20 million from Facebook alone. Because Apple does not scan iCloud Photos in the US like other companies scan their photo services, it made only 265 reports in 2020.

What happens if the CSAM detection feature makes a mistake?

This is called a false positive, and while vanishingly improbable, it’s not mathematically impossible. Apple tested 100,000,000 images against NeuralHash and its CSAM hash database and found 3 false positives. In another test using 500,000 adult pornography images, NeuralHash found no false positives.

Even if NeuralHash does match an image hash with one in the known CSAM hash database, nothing happens. And nothing continues to happen until NeuralHash has matched 30 images. Apple says that the chances of there being 30 false positives for the same account are 1 in 1 trillion.

I have terrible luck. What if that happens with my account?

Once at least 30 images have matched, the system enables Apple to decrypt the low-resolution previews of those images so a human can review them to see if they are CSAM. Assuming they are all false positives—remember that possession of CSAM is illegal in the US—the reviewer sends them to Apple engineers to improve the NeuralHash algorithm.

Could non-CSAM images end up in Apple’s CSAM hash database?

It’s extremely unlikely. Apple is constructing its database with NCMEC and other child-safety organizations in other countries. Apple’s database contains image hashes (not the actual images; it’s illegal for Apple to possess them) for known illegal CSAM images that exist both in the NCMEC database and at least one other similar database. So multiple international organizations would have to be subverted for such image hashes to end up in Apple’s database. Each source database will have its own hash, and Apple said it would provide ways for users and independent auditors to verify that Apple’s database wasn’t tampered with after creation.

Plus, even if a non-CSAM image hash were somehow added to Apple’s database and matched by NeuralHash, nothing would happen until there were 30 such images from the same account. And if those images weren’t CSAM, Apple’s human reviewers would do nothing other than pass the images to engineering for evaluation, which would likely enable Apple to determine how the database was tampered with.

Couldn’t a government require Apple to modify the system to spy on users?

This is where much of the criticism of Apple’s CSAM detection system originates, even though Apple says the system will be active only in the US. On the one hand, Apple has said it would resist any such requests from governments, as it did when the FBI asked Apple to create a version of iOS that would enable it to break into the San Bernardino shooter’s iPhone. On the other hand, Apple has to obey local laws wherever it does business. In China, that already means that iCloud is run by a Chinese company that presumably has the right to scan iCloud Photos uploaded by Chinese users.

It’s conceivable that some country could legally require Apple to add non-CSAM images to a database, instruct its human reviewers to look for images the country finds objectionable, and report them to law enforcement in that country. But if a country could successfully require that of Apple, it could presumably force Apple to do much more, which hasn’t happened so far. Plus, the CSAM detection system identifies only known images—it’s not useful for identifying unknown images.

Is Apple heading down a slippery slope?

There’s no way to know. Apple believes this CSAM detection system protects the privacy of its users more than scanning iCloud Photos in the cloud would, as other companies do. But it’s highly unusual for a technology that runs on consumer-level devices to have the capacity to detect criminal activity.

(Featured image by iStock.com/metamorworks)


Social Media: Apple’s recently announced expanded protections for child safety have generated a firestorm of criticism and confusion. We attempt to answer some of the most common questions we’ve received.

Archiving Best Practices

 

Does this sound familiar? “I have photos on a bunch of old CDs, thumb drives, external hard drives, in albums and then there is my Dropbox, Google Photos, and maybe I’ve backed up to iCloud…help, I am overwhelmed!” Before you can start to organize your photos, you have to get them ALL into one place. During week one we will focus on gathering your photos.
Even if you aren’t ready to physically gather them, making a list is a useful first step, and you’ll be more prepared when the time is right to embark on the organizing.
Locate all your photos, slides + videos.
Let’s start with a list of all the places you are storing your printed photos and slides. Include photo albums, framed photos, photos in drawers or boxes or closets, or even storage units. A written list of locations will serve as a checklist when you gather them.
Make a list of all the places you have digital photos. Include old phones, computers, memory cards, and CDs/DVDs. Add usernames and passwords to photo websites where you’ve uploaded pictures.
Home movies should be part of what you’re saving! Make a list of the types you have (Super 8, VHS tapes, camcorder tapes, etc.) so you can make a plan for converting them to digital.
Ask family members!
Get the family involved in tracking down your photos. Ask relatives where their photos are and make a plan to include them in your photo organizing project.
Estimate.
How many photos do you have: 10,000 or 100,000? Knowing the number helps you plan the scope of the project. A shoebox = 600 – 800 photos; 1 GB = about 560 JPGS; the average photo album = 200 photos.
Be selective. Keep only the best of the best!
Are you finding lots of duplicates as you go through your photos? Toss or delete doubles, blurry shots, and most scenery-only photos. Edit your collection down to a manageable size! You may end up getting rid of 50% or more.

Plan for the digitizing process.
You’ve found your photos, but now what? You need a plan. This week, we’ll explore creating a photo legacy by understanding what’s most important to you. What are your photo goals and what would success look like? Then strategize a plan to digitize and back up your photos.
Even if you’re not ready to do the actual organizing, thinking through these decisions about your photo legacy means you’ll be prepared whenever the time is right to start.
Digitize + Back up
The best backup for your printed photos is to scan them by sending them to a trusted local archiving expert. Don’t risk loss, damage or theft of your precious memories by sending them away to a big box online service.

Next Steps
You’ve found your photos, have a plan, and know the stories. Now it’s time to share. The options for printing photos are endless, from framed prints and photo gifts to photo books. Online galleries make it easy to share digitally. Look for ideas to bring your photos back to life by getting them into your everyday life.
Even without starting to organize your whole collection, it’s easy to bring photos back into your life…choose recent favorites from your phone and get creative!
Plan ahead for holiday giving
Get a head start on your gift planning. Digitized family moments is an excellent gift idea for anyone in your family. Surprise family members with a digitized collection of memorabilia!

Concierge Archiving Services

If you love a good project and tackling that cluttered photo closet (or desktop computer) doesn’t scare you – go ahead and dive right in! After all, you have a personal connection to all those memories and you know exactly what you want to keep or toss. Here are a few Pro Tips for those of you who are managing a photo organizing project on your own:

 

 

 

 

 

 

Begin by sorting based on subject, event, or date. Choose a categorizing method that makes the most sense for you. Think ahead to how you and your family will want to access these memories in the future. If you’re working with printed photos – make piles or use small bins. If you’re organizing digital files – create folders and name them based on your preferred sorting method.

Toss or delete multiple or redundant images from the same event. After all, do you really need to keep 26 images from little Chloe’s birthday party? Also, eliminate duplicates or poor quality shots where the lighting or subject matter isn’t up to par. The goal here, is to refine your photo collection to only the “best of the best” images/photos.

Decide what you want to do with the physical photos and memorabilia long term. Do you simply want your photo closet more organized? Do you want to digitize all of your printed photographs? Do you want to make photo books for family members? Knowing your end goal, will help you make decisions on how to complete your project.

 

 

 

 

 

 

Let the local expert do the heavy lifting

Sure, you could scan your family photographs one by one on a home scanner, but do you really want to give up your weekends for the next 6 months?

Trusted local photo experts (like us), have the equipment, training, and professional experience to manage this portion of the project for you. We’ll carefully digitize, color correct and save your printed memories as digital files. Once your memories are in a digital format – you have countless ways to share them with family members and make fun photo creations with them.

PRO TIP: Determine which family members would like a copy of your digital files – not only today but also in the future. It’s easiest and most affordable to order multiple copies of your files at the time of digitizing. Think about your children, your siblings, your parents, etc.

 

 

 

 

 

Hiring a Professional

If a project like this just isn’t for you or if you’re managing an extreme amount of memorabilia – then you may want to consider hiring a professional to help sort, name, and organize the items. Our archiving team can help you get started and advise you on the best way to approach your project. We also have relationships with local professional organizers and archivists who can assist as well.

Creatively Cute Wedding Gifts + Keepsakes

Creatively Cute Wedding Gifts + Keepsakes

Make your day unique and personal!

Photos can make your wedding day more personal and after the event, they can live on for years after! Here are some creative ways to bring photography to your celebration and beyond!

 

 

 

 

 

 

 

 

Please, please, please – don’t let those gorgeous professional photographs sit on your computer gathering dust. Select a few favorites and get them up on the walls of your home as canvas prints, framed decor or even a gallery wall with multiple shots.

 

 

 

 

 

 

 

Of course, the bride and groom will want a wedding album filled with images and snapshots from the celebration, but professional photo books are also a great gift for parents, grandparents and the wedding party!

 

 

 

 

 

 

 

Trendy personalized gifts are always a favorite at any wedding! Bring us your ideas and we will help you design a special gift for your guests or wedding party.

 

 

 

 

 

 

 

 

 

Gift this adorably cute heart collage to the newly engaged couple. Gather images from their social media and surprise them with the perfect engagement gift.

 

Need help on a project like this?

Join us in the design process while we create the perfect solutions for your day. Choose from hundreds of ideas for gift giving and personal storytelling. Here are just a few…

– Save the Date Cards + Magnets

– Announcements + Thank You Notes

– Guest Book

– Personalized Bridal Party Gifts

– Custom Keepsakes

– Imagery + Reception Décor

– Video Productions + Slideshows

– Prints + Memorabilia (from your wedding day photos)

– Photo Books (for yourself, the bridal party + your parents)

– Home Decor (showcasing your professional photographs)

– Passport Photos (for the honeymoon)

Ever Have Trouble Printing? Try a Different Printer Driver

Some clients have reported problems with HP laser printers failing to print. Sometimes there’s an error. Other times, the print job just disappears into the ether. It’s unclear why this is happening or how widespread it is, but here’s a workaround that can help. Create a new printer configuration by clicking the + button in System Preferences > Printers & Scanners and selecting your printer in the list. Then, from the Use pop-up menu, choose something other than the default Secure AirPrint driver. We’ve had the most luck with Generic PostScript Printer. Both the old and new configurations will be available when printing, so if one doesn’t work, try again with the other one.

(Featured image by Mahrous Houses on Unsplash)

Nightstand Mode Makes Your Apple Watch a Helpful Bedroom Companion

Most Apple Watch users charge their watch every night, putting it on a charger as part of a bedtime routine. If that’s you, make sure you’re not missing one of the Apple Watch’s best features: nightstand mode. When you enable it in the iPhone’s Watch app, in General > Nightstand Mode, a charging Apple Watch displays the charging status, current time and date (in a large, easily readable font), and the time of any alarm you’ve set. It uses a green color that won’t shock your eyes in the middle of the night, and after a minute, the screen goes completely dark. To see it again, tap the watch or—even better!—the surface it’s on. The screen lights up for 10 seconds before going dark again. (And yes, we love the little classic Mac stand.)

(Featured image by Adam Engst)

The Mac’s Magic Shortcut to Trashing Files and Photos Quickly

Sure, you could select a file in the Finder and choose File > Move to Trash or drag it to the Trash in the Dock. Similarly, you can trash selected photos in Apple’s Photos app by choosing Image > Delete X Photos, or by pressing the Delete key, but both of those methods result in a dialog asking if you’re sure. The easiest way of trashing a file in the Finder or a picture in Photos is to select it and press Command-Delete. Poof, it’s in the Trash (Finder) or Recently Deleted album (Photos), with no extra effort or prompts! And if you accidentally trash the wrong thing, just press Command-Z to restore it. Keep this key combination in mind for other apps too, since they may also support it as a shortcut for “delete without prompting.”

(Featured image by iStock.com/YurolaitsAlbert)