Categories
Mobile Syrup

Amazon Echo Show 5 and Echo Show 8 are 30 percent off today

Amazon is continuing its flash sale. First it was the Fire TV Sticks, and now it’s the Alexa-enabled Echo Show 5 and Echo Show 8.

These savings knock 30 percent off the price:

The Echo Show 5 and Echo Show 8 are smart displays that provide voice-activated controls and video capabilities.

The Echo Show 5, being the smaller and more affordable option, features a 5.5-inch touchscreen display that can show weather updates, stream music, TV shows, and YouTube videos. It has a built-in camera for video calls and access to Alexa’s Drop In feature. You can also use voice commands to control other smart home devices, such as lights or thermostats.

On the other hand, the Echo Show 8 is the larger and pricier option, with an 8-inch HD display that’s perfect for watching videos or following recipes in the kitchen. It also has a built-in camera and can be used for video calls and Drop In. In addition, it can function as a smart home hub to control a range of devices, including lights, cameras, and thermostats, with a good quality speaker system.

Both devices have Alexa built-in, enabling you to control smart home devices, set reminders, and get answers to queries using voice commands.

MobileSyrup utilizes affiliate partnerships. These partnerships do not influence our editorial content, though we may earn a commission on purchases made via these links that helps fund the journalism provided free on our website.

Source: Amazon Canada

Categories
Mobile Syrup

Amazon Prime Gaming offering 15 free titles in April 2023

Amazon has announced all 15 games that will be free of charge to members of its Prime Gaming program this April.

The games will begin to be released throughout the month, starting April 6th. Kicking off the lineup will be the cult classic Wolfenstein: The New Order, a game from Bethesda Softworks.

Here is the full list of titles coming on Prime Gaming:

  • April 6 – Wolfenstein: The New Order
  • April 6 – Ninja Commando
  • April 6 – Art of Fighting 3
  • April 13 – The Beast Inside
  • April 13 – Icewind Dale: Enhanced Edition
  • April 13 – Crossed Swords
  • April 13 – Ghost Pilots
  • April 20 – Beholder 2
  • April 2o – Terraformers
  • April 20 – Metal Slug 4
  • April 20 – Ninja Masters
  • April 27 – Looking for Aliens
  • April 27 – Grime
  • April 27 – Sengoku
  • April 27 – Magician Lord

These video games come at no extra cost to Amazon Prime Gaming members.

Source: Prime Gaming Via: GamesBeat

Categories
Mobile Syrup

How to know if a VPN is right for you

Watch or listen to just about any VPN ad, and it will make huge claims. VPN companies love to promise that by using their service, you’ll be protected from malware, identity theft, and prying eyes. As a result, many people think a VPN is a must-have to ensure that they’re protected while browsing the internet.

VPNs have their uses, but they’re not the ultimate security or privacy tool that these ads would have you believe. No matter how good the price, there are a few important things you should keep in mind when choosing a VPN provider.

Let’s bust some common VPN myths and dive in on how you can determine if a VPN is right for you.

What is a VPN?

Let’s begin by defining two terms: VPN and encryption. VPN stands for Virtual Private Network. VPNs are secure digital tunnels your web traffic can travel through when flying across the internet. People use VPNs to prevent untrusted third parties from seeing their web traffic and to bypass geo-restrictions. More on that in the use case section. A VPN is similar to an actual tunnel in that no one on the outside can see your car while driving through it. All they see is the tunnel.

The secure part of “secure digital tunnels” is done by leveraging a technology called encryption. Encryption is a process which scrambles data into an unreadable format to unauthorized third parties. In the case of our actual tunnel analogy, encryption is like gates on either side of the tunnel. Unless you have a key to unlock the gates (authorized party), you can’t view who’s driving inside (your data). 

Use case: Business Infrastructure

Secure remote access to corporate resources is the original use for a VPN. VPNs were created by a team at Microsoft who developed the Point-to-Point Tunnelling Protocol (PPTP) to remotely connect to corporate resources in a secure way. Many organizations have critical confidential resources secured behind firewalls. Consider a healthcare provider with medical records, banks with financial data, or a corporate executive with trade secrets. Traditionally, the only way to access the resources behind a firewall was to be physically present in the local office and be connected to the network hosting these resources.  

However, even before remote and hybrid work became popular, there was a growing need to securely access corporate resources outside the office, often by travelling executives or sales team members. The need to remotely access secured resources ballooned during the COVID-19 pandemic, where offices globally had to shut down, and nearly every white-collar job had to be done from home. 

Corporate VPNs like Cisco AnyConnect are downloaded to an employee’s computer. After authenticating with a username and password, they can securely access corporate resources anywhere in the world. Corporate VPNs are one of the most common and practical uses for VPNs. However, with the rise of Software-as-a-Service (SaaS) and Zero-Trust Network Access (ZTNA), corporate VPNs are slowly finding themselves replaced with more modern solutions. 

Use case: Security

With the growing threat of malware like ransomware and compromised accounts caused by phishing attacks, VPN providers love to suggest that their products protect against such threats. However, it’s a myth. Most VPNs do not protect against malware, phishing attacks, or unsafe websites. After all, VPNs are just fancy digital tunnels, not content filters or malware scanners.

Nevertheless, VPNs can help to protect against one specific type of cyber threat: Man-in-the-middle (MITM) attacks. MITM attacks are most often conducted on public Wi-Fi networks. They are where an attacker can intercept another’s internet traffic. Most of the time, MITM attackers monitor this traffic for potentially sensitive data. However, in some situations, attackers can alter transmitted data before it’s sent to the receiver.  

MITM attacks aren’t as common as they used to be, though. Most websites are protected by HTTPS or Hypertext Transfer Protocol Secure. You know a website is encrypted by HTTPS when you see a little lock icon in your browser. HTTPS dramatically changed what data was being sent openly over the internet. VPN ads often suggest that your passwords and credit card data are sent insecurely across the internet, which is true if a website isn’t leveraging HTTPS. But you’d have difficulty finding a legitimate website accepting passwords and credit cards that don’t use HTTPS. 

It’s important to remember that VPNs are not a one-all security tool. Suppose you are concerned about malware or phishing attacks. In that case, you’re better off investing in good anti-malware software and some phishing awareness training. However, if you’re on a public Wi-Fi network, like at a hotel while travelling or working remotely at Starbucks, it doesn’t hurt to use one even though you likely don’t need it. Personally, I do use a VPN on public networks, mainly for peace of mind or my mobile data for better speed. 

Use Case: Privacy

Privacy is a big one regarding the appeal of using a VPN, but the answer might be a little more mixed than you first thought. Before HTTPS, most of what you did on a website was openly viewable on the internet. However, since the widespread implementation of HTTPS, very little data is actually transmitted unencrypted: your IP address, the website you’re visiting (the domain name), and metadata such as date, time and duration of the website visit. 

At first glance, you might be angry about how much data is being shared unencrypted. But remember, your internet service provider (ISP) like Bell, Telus, Rogers, or Eastlink needs to send you wherever you’re looking to go on the internet. Your IP address is also used to approximate your location, which can be helpful when trying to find local restaurants or businesses. 

VPNs can nicely complement HTTPS because they conceal your unencrypted metadata from your ISP, network administrator, or MITM attackers. Hiding metadata is very attractive for journalists, political dissents, or those in regions where accessing certain content may be illegal. In Canada, while our ISPs are not always the most upstanding organizations, they are not selling our internet usage to advertisers or manipulating traffic speeds to prioritize one service over another. 

Using a VPN at home to prevent your ISP from viewing your metadata is not worth it. You’ll likely become more frustrated due to speed throttling and lack of geo-specific search results than the privacy benefits you’d gain. However, if you’re in a region where specific content is blocked that you need to access, such as in China and social media like Facebook or Twitter, or you’re an international reader, and your ISP sells your web traffic data or throttles access to certain websites, then a VPN can be a helpful service.  

Use Case: Geo-restrictions

Bypassing geo-restrictions is likely the most popular consumer use for VPNs. Since VPNs mask your IP with their own, you can appear to be coming from anywhere in the world. Going back to the actual tunnel analogy from earlier, imagine that this tunnel is so long that it connects to many different places. So many, in fact, that you can claim you’re coming from just about anywhere when you’re coming out of the tunnel, and the border guard wouldn’t know if you’re telling the truth or not.

This assumption happens when you use a VPN to access another country’s Netflix catalogue or geo-restricted YouTube content. The United States and Canada have two of the largest Netflix catalogues in terms of quantity, but that doesn’t always mean the content you want to watch is available there. Similarly, some content I watch on YouTube is geo-restricted to a U.S.-only audience. 

VPNs allow users to select the country they want to appear to be coming from to access the content library of choice. This strategy works in reverse too. If you’re travelling outside of your home country, you may want to use a VPN to get access to content only accessible via your native country’s library.

VPN considerations

Now that you’ve read through the top four use cases for VPNs, let’s assume you’re now determined to subscribe to one. Yet, there are so many of them. Which one do you pick? Here is a list of top potential factors to consider:

1. Good security: This probably goes without saying, but you want to ensure your VPN uses industry-standard security practices. There are many buzzwords regarding security, so you may have to use your best judgment here. At the very least, make sure your VPN uses 256-bit or “military-grade” encryption.

2. Server locations & performance: If you’re using a VPN to avoid geo-restrictions, ensure the VPN you subscribe to offers servers within the region to which you need to connect. Additionally, watch out for massive speed cuts when using a VPN. Performance drops are common when using a VPN because your data has to travel further. Take advantage of free trials to make sure the performance meets your needs.

3. Device compatibility: Make sure that when selecting a VPN, you pick one that supports the operating systems you use. Most VPNs support all major operating systems; however, some services, like Netflix and Disney+, won’t let you stream content via their iOS apps when running a VPN. Keep these limitations in mind before spending big bucks on a VPN. 

4. Privacy, pricing & customer support: Let me be clear — most free VPNs are very bad. When you aren’t paying for a product, you most likely are a product. Remember that while your ISP or network administrator may not be able to see your web traffic metadata when using a VPN, your VPN provider still can. 

Therefore, selecting a VPN with a strong privacy policy is very important. Ideally, the VPN provider has a strict zero-log policy meaning they do not retain any of your browsing traffic. This is particularly important when using a free VPN since they likely profit from selling your internet traffic data to advertisers. When picking a VPN, you have to trust your VPN provider more than you trust your ISP, network administrator, or government. After all, you’re now funnelling all your network traffic through them, so if the VPN provider isn’t trustworthy, it makes for a poor privacy tool.

It’s also important to remember that while VPNs mask your IP address from trackers, they don’t block all trackers either. Advertisers and websites have many different ways to track you across the internet. So, again, VPNs aren’t a one-stop shop for preventing trackers either.

Choosing a good VPN doesn’t have to be crazy expensive, either. Pricing sensitivity is based on the wallet of the spender. Generally, a paid VPN is more trustworthy than a free one. However, take all this into account and do some price comparison. Make sure you’re getting a good deal based on the uses that you’ve identified for yourself. Free trials are great, but only if the customer service experience is there to back it up.

Personally, I rarely use a VPN because I work from home and trust my ISP (at least in this context). However, when I opt to connect to a public Wi-Fi network instead of using my cellular data or need to change my location to avoid the occasional geo-restriction, I use the free tier of ProtonVPN.

ProtonVPN offers the best free tier I’ve seen. While it doesn’t provide the fastest speeds or the most flexibility in terms of international servers, it does provide unlimited usage and support for macOS and iOS, my operating systems of choice. 

ProtonVPN is also ad-free, with a strict zero-logs policy and has the core benefit that privacy is a human right. If I needed more from my VPN, I’d likely subscribe to ProtonVPN. This isn’t an ad but an open recommendation based on what I currently use at the time of writing. When choosing a VPN, identify your personal use case(s), do some research, and find the best service that meets your needs. 

Categories
Mobile Syrup

San Antonio man uses AirTag to track stolen truck, confrontation turns deadly

Apple’s AirTag was pivotal in a case of car theft recovery in the U.S this past week.

The $39 CAD tracker uses ultra-wideband technology to share its location, which can be seen on the Find My app on your iPhone or iPad. This past week, a San Antonio, Texas resident whose truck was stolen decided to take the matter of retrieving his vehicle into his own hands.

As reported by MySanAntonio, Via: 9to5Mac, the person’s truck was stolen from his Northside home on Wednesday, March 29th. Fortunately, there was an AirTag inside the car. Using the location of this AirTag, he was able to track down his truck, which was found parked in a shopping center across town.

According to the report, the person called the police to report that his truck had been stolen but did not wait for the police’s assistance. He tracked down the vehicle and confronted the car thief. The police say that upon confronting the thief, some sort of disagreement ensued, and the situation escalated quickly. Police say that at this point, the details become a bit unclear, but according to the car theft victim, he believed the suspected car thief was armed with a gun, leading to a deadly firefight.

The suspected car thief was shot and pronounced dead, and police say they could not confirm if more than one weapon was found at the scene. The car theft victim reportedly stayed at the scene of the shooting, complied with police, and was taken into custody for questioning. The shooter is not expected to face charges, according to a San Antonio Police department spokesperson Nick Soliz, but an investigation is still ongoing.

This case serves as a reminder to the public that it is important to wait for the police in such matters. “Let us go with you. We have training,” said Soliz. While AirTag can be an effective tool for locating stolen items, it is crucial to exercise caution and leave any confrontations to the professionals.

Source: MySanAntonio, Via: 9to5Mac

Categories
Mobile Syrup

Musk replaces the Twitter bird logo with the Dogecoin logo

Last year, in a Tweet reply, Twitter user @WSBChairman suggested that Elon Musk should buy Twitter and change the bird logo to the Shiba Inu Doge logo. One year later, both of @WSBChairman‘s suggestions have materialized.

For starters, Musk acquired Twitter. To add to that, he’s now even changed the bird Twitter logo to the Doge logo, a nod to the cryptocurrency dogecoin.

Musk has long been a vocal supporter of cryptocurrency, especially dogecoin, and often comments on crypto via his Twitter account. The current move comes nearly a year after Musk announced that his Boring Company would accept dogecoin for rides in the Las Vegas loop tunnel.

It is currently unknown if the logo change is temporary or permanent. Whatever might be the case, it didn’t fail to sway the market. After the logo change, Doge’s market cap increased by roughly $3.9 billion from approximately $10.645 billion to $14.545 billion. Additionally, there is no way to inquire whether the change is permanent as Musk has set Twitter’s press email to auto-reply with poop emoji.

Image credit: Shutterstock

Categories
Mobile Syrup

Asus reveals the ROG Ally, its own Steam Deck-esque PC gaming handheld

On April 1st, Asus dropped a trailer for a Steam Deck-esque new gaming PC handheld called the ROG Ally. Naturally, people thought this was just an April Fool’s Day joke, but now, Asus has confirmed this is an actual product.

The Taiwanese electronics giant says the ROG Ally runs on Windows 11 and features a custom APU that’s AMD’s fastest to date. Further, it sports a dual fan design and support for the ROG XG Mobile eGPU to stream your ROG Ally games to a TV.

In a hands-on video, YouTuber Dave2D revealed a few more specs, including a 7-inch display, 1920 x 1080 resolution, 500 nits of brightness and a 120HZ refresh rate. Button-wise, the ROG Ally sports a standard dual-thumbstick, four-face button setup.

However, there are a few big questions remaining — namely, pricing and games. The former remains entirely clear, while the latter is fairly vague. In the reveal video, we see High on LifeGolf With Your Friends and Ghostrunner being played, but Asus simply says it “allows you to pick up and play your favourite game libraries” without naming any.

For now, Asus is simply directing people to a U.S. Best Buy landing page that provides no further details. You can also register for email updates on Asus’ website. Given the lack of information at the moment, it remains to be seen just how much interest people will have in the ROG Ally.

Image credit: Asus

Source: Asus

Categories
Mobile Syrup

Standard iPhone models rumoured to expand to ProMotion in the future

An exclusive staple of Apple’s iPhone Pro models is allegedly coming to non-pro iPhones in as little as two years.

Ross Young, the CEO of Display Supply Chain Consultants, tweeted an outline regarding display-related technology coming to future iPhones. It shows that ProMotion will be enabled on standard iPhones by 2025.

This new addition will allow the display to reach a 120Hz refresh rate, smoothing out both scrolling and video playback on the device.

Additionally, including ProMotion would allow older models to scale down to lower refresh rates, making for better power efficiency.

ProMotion was initially reserved for Pro models in the iPhone lineup, but Apple is no stranger to expanding its exclusive features to standard models as time goes on.

The roadmap tweeted by Young goes on to hint that the alleged iPhone 17 and iPhone 17 Plus will also feature ProMotion as well as an always-on display.

Source: @DSCCRoss Via: MacRumors

Categories
Mobile Syrup

Samsung Galaxy Z Fold 5 reportedly thinner, lighter than previous models

Reports from South Korean publisher ETNews suggest that the upcoming Galaxy Z Fold 5 could see Samsung perfect its hardware and hinge system.

It’s being teased that the 5th-gen version will be lighter and thinner than previous models and feature a hinge that leaves zero gaps between the phone’s displays.

The report states that the change would come from a teardrop-shaped hinge rather than the traditional U shape. This would make the Galaxy Z Fold 5 thinner and allow the phone to be folded completely flat.

Allegedly, the Z Fold 5 could weigh 13g less than the Z Fold 4, and measure 13.4mm when folded, compared to 14.2mm of the Z Fold 4.

The only downside of the report claims that the thinner design of the Z Fold 5 would not leave enough room for the Samsung S Pen. This would mean that the phone would not come with a stylus slot.

Although there have been no official reports, the Samsung Galaxy Z Fold 5 is predicted to be officially revealed in August of this year alongside the Z Flip 5.

Source: ETNews Via: Droid Life

Categories
Mobile Syrup

Samsung S23, S22 April security patch expected to come out on April 12

Canadian Samsung users will have to wait a bit to get the latest Samsung security update. Both the S23 series and S22 series will receive the April security update on April 12th, according to the Rogers OS Upgrade Schedule.

According to SamMobile, the S23 series’ update will come with various camera performance and behaviour improvements. The publication indicates that the devices will get an update to improve their autofocus, faster Gallery operations while deleting images that were just clicked, improved sharpness in video capture and improvements to the ultrawide camera in low-light conditions.

The update should also fix a bug that caused a green line to appear in some images. The handsets will also have improved video stabilization in full HD 60fps and low-light conditions.

Further, the update fixes image quality issues when Night Mode is off.

Alongside these patches, the update will include fixes for vulnerabilities similar to other Android security updates. Google hasn’t revealed the monthly security update yet, so we’re waiting to see what vulnerabilities have been fixed with this patch.

Even if you’re not with Rogers, expect the security patch to arrive around that date.

Image credit: SamMobile

Source: Rogers OS Upgrade Schedule, SamMobile

Categories
Mobile Syrup

Apple’s watchOS could soon receive its biggest update in years

watchOS, Apple’s smartwatch operating system, might be getting a rather substantial update this year.

According to Mark Gurman’s Bloomberg Power On newsletter, watchOS 10 will feature the most substantial update to the Apple Watch in several years.

Changes include a new visual design, offering Apple Watch owners a refreshed look and feel with watchOS 10.

“I believe the new watchOS should be a fairly extensive upgrade — with notable changes to the user interface — unlike iOS 17,” writes Gurman in the newsletter.

Gurman goes on to say that other updates, including iOS 17 and hardware refreshes — including even the Apple Watch Series 9 — are expected to be minor in 2023. There are reportedly plans for a more substantial Apple Watch update in 2024.

Last year saw the release of the Apple Watch Ultra, a rugged take on the wearable, and the Apple Watch Series 8, a relatively minor update to the Series 7 that includes a body temperature sensor and few other changes or new features.

Source: Bloomberg Via: iMore