T-Mobile will begin sharing your web browsing and mobile app data with advertisers starting April 26, 2021. T-Mobile is automatically enabling this for nearly everyone, but you can opt-out to prevent T-Mobile from selling this data to marketers.
This also applies to other T-Mobile-owned carriers, including Sprint and Metro by T-Mobile.
Have reason to be suspicious of a partner or employer? Feel that someone is watching you, perhaps with a hidden camera?
You could discover the truth if only you had some way of detecting the presence of a hidden camera. Fortunately, apps are available to help you find hidden surveillance cameras using just your smartphone.
As artists we often tell ourselves that the solution to our problems is money. And while money would definitely help us reach many of our goals faster, viewing things that way causes us to overlook the simple and cheap things that are right under our noses and can help us perform our jobs better. In this episode, Blueprint and Illogic break down 10 cheap things that every artist needs to have.
Shelter is a handy app that lets you create a sandbox on your Android device. This means you can run cloned copies of apps, store documents, and maintain accounts separately from your main workspace. It’s like having an extra phone living inside your device! Continue reading →
That Rona is an excuse for a lot of bullshit that will get pushed forward…..
As the Minnesota protests have spilled across the country, fueled by protestors angered over the police killing of an unarmed Minneapolis man named George Floyd, the protests have morphed into marches and demonstrations that have turned violent everywhere from New York City to Los Angeles. Curfews are being imposed in major cities around the US at the time of this writing, and at least eight states, as well as the District of Columbia, have requested the National Guard to assist local law enforcement. Continue reading →
You probably know that your smartphone’s operating system needs to be regularly updated to protect against security vulnerabilities. But your SIM card can be a source of security vulnerabilities too. Here we’ll show you some ways hackers can use SIM cards to gain access to devices, and advice on how you can keep your SIM card safe. Continue reading →