I think this is the best Android phone of 2019 ./ #Android #OpenSource

Pixel 4 XL bashing misses the big picture…

The new Pixel 4 series are getting a lot of flak from reviewers this year. And you have probably already heard the complaints: the battery life is not quite great, it costs too much, there is only 64 gigs of on-board storage, and on, and on.
Many of those criticisms are valid, but… I’ve been using the Pixel 4 XL in the past few days and those things are a footnote to something more important: this is the most enjoyable Android phone I have used so far in 2019, beating all others with its refinement and class. Those are not things that make for a great headline and they are not included on the specs list, but they are hugely important once you actually start using a phone.

Specs don’t tell the whole story

You can learn many things about phones by looking at their specs, but not quite the whole thing. And it’s in those intangibles that Google excels.
The first thing that I noticed about the Pixel 4 XL is the amazing display. You know the specs: it’s a 6.3-inch OLED display with a very high resolution (1440 x 3040 pixels), but let’s be honest and admit right away that every other phone out there features a big OLED screen, that is not what stands out. Where this particular display really excels, though, is in color reproduction: white balance is as perfectly tuned as I have seen on an OLED screen so far and colors have a vibrancy and richness to them, without going into the extreme neon tonalities (a problem I see commonly on other high-end phones and their Vivid modes). This display is an absolute marvel and if you value great image quality, you will appreciate it.
One thing it is not, however, is as bright as the screen on the latest Galaxy series or iPhones. This is a bit annoying when you look at the screen outdoors, on a bright sunny day, and I hope Google improves this aspect in the future, but apart from this issue, the Pixel 4 XL has a truly amazing display.
Right after the incredible display, the other thing that strikes me about using this phone is just how smooth and quick it is. The quickness is not just about the processor. Again, every flagship phone this year comes with the same Snapdragon 855 chip and while all those phones perform about the same in benchmarks, it doesn’t mean that the actual experience of using those phones is the same. The Pixel brings together the most refined Android gesture navigation system so far with the speed of a 90-hertz screen response, plus a good amount of under the hood optimizations, that combine for a killer performance. In my humble opinion, the Pixel 4 XL sets a new standard for a buttery smooth performance on the Android platform, and others should take notice.

Attention to detail like no other

Another area you won’t see mentioned often is the refined haptic feedback on the Pixel. The vibration motor here does a great job with a precise, well-tuned taps for notifications, but also for typing, which I found to be an extremely pleasing process on the Pixel. I was able to type faster and with less error thanks to that well-defined haptic feedback.
Then comes the attention to detail: the live wallpapers are absolutely gorgeous and it’s hard to wrap your head around the reason why other companies simply don’t pay that much attention to visual details like these wallpapers. It honestly feels like you are going back in time when you look at the poor selection of wallpapers on other rivals. Of course, this is not a reason why you would buy a phone, but it gives you a deep personal satisfaction to own a device where designers have crafted little details like that as well.
I also have a lot of good words about the loudspeaker quality on the Pixel: I personally listen to a lot of music on Spotify right on my phone, it’s often just easier than to connect to a speaker or headphones, and the loudspeaker here is loud and clear, among the best I have heard on a smartphone.
Last, but not least: it is the Android experience as a whole. There are no heavy, not quite thought custom skins that would slow down the phone, there are no excessive options, there is no clutter.
What about the downsides, though? We have run the Pixel 4 XL through our battery tests and while it doesn’t excel in any of them, it’s definitely not at the bottom of the charts and is right about average. In my personal experience, the phone would last a full day and while I do wish it went the extra mile, I don’t see battery life as a big issue. Quite honestly, last year’s iPhone XS, for example, struggled in a big way with battery life, but was getting far less criticism for that, so it’s a bit surprising to see the excessive criticism towards the Pixel.

Final words

Are there things that Google could have done better with the Pixel? Absolutely: for the camera nerd, the lack of an ultra-wide camera is an absurdity (I know it is for me), video quality is lackluster, for the specs obsessed the meager 64 gigs of on board storage are simply not acceptable at the $900 price point, and we’ve already mentioned the battery. And those much talked about radars are an absolute gimmick that I quickly disabled because they actually would skip songs when I unintentionally gestured around the phone.
But as I said in the beginning of the article, those ultimately feel like a footnote to the grand theme of the Pixel 4 XL: this phone is an absolute joy to use in a way that I have found no other Android phone quite matches. And while you should know about its shortcomings, keep that in mind and don’t skip on the new Pixel without trying it first.

Digital Knowledge: Many Americans are unclear about some key cybersecurity topics, terms and concepts – / #Privacy #Security #Internet

A majority of U.S. adults can answer fewer than half the questions correctly on a digital knowledge quiz, and many struggle with certain cybersecurity and privacy questions

A new Pew Research Center survey finds that Americans’ understanding of technology-related issues varies greatly depending on the topic, term or concept. While a majority of U.S. adults can correctly answer questions about phishing scams or website cookies, other items are more challenging. For example, just 28% of adults can identify an example of two-factor authentication – one of the most important ways experts say people can protect their personal information on sensitive accounts. Additionally, about one-quarter of Americans (24%) know that private browsing only hides browser history from other users of that computer, while roughly half (49%) say they are unsure what private browsing does.

This survey consisted of 10 questions designed to test Americans’ knowledge of a range of digital topics, such as cybersecurity or the business side of social media companies. The median number of correct answers was four. Only 20% of adults answered seven or more questions correctly, and just 2% got all 10 questions correct.

As was true in a previous Center survey, Americans’ knowledge of digital topics varies substantially by educational attainment as well as by age. Adults with a bachelor’s or advanced degree and those under the age of 50 tend to score higher on these questions. These are some of the key findings from a Pew Research Center survey of 4,272 adults living in the United States conducted June 3-17, 2019.


What is a “Click Farm” – #Fraud #Politics #Activism #Privacy #Security — #ClickFarm – @alayanimajneb

click farm is a form of click fraud, where a large group of low-paid workers are hired to click on paid advertising links for the click fraudster (click farm master or click farmer). The workers click the links, surf the target website for a period of time, and possibly sign up for newsletters prior to clicking another link. For many of these workers, clicking on enough ads per day may increase their revenue substantially and may also be an alternative to other types of work. It is extremely difficult for an automated filter to detect this simulated traffic as fake because the visitor behavior appears exactly the same as that of an actual legitimate visitor.

Fake likes generating from click farms are essentially different from those arising from bots where computer programs are written by software experts. To deal with such issues, companies such as Facebook are trying to create algorithms that seek to wipe out accounts with unusual activity (e.g. liking too many pages in a short period of time).


Facebook issued a statement stating: “A like that doesn’t come from someone truly interested in connecting with the brand benefits no one. If you run a Facebook page and someone offers you a boost in your fan count in return for money, our advice is to walk away – not least because it is against our rules and there is a good chance those likes will be deleted by our automatic systems. We investigate and monitor “like-vendors” and if we find that they are selling fake likes, or generating conversations from fake profiles, we will quickly block them from our platform.”[6] Andrea Faville reported that Alphabet Inc. companies, Google and YouTube, “take action against bad actors that seek to game our systems.”[10] LinkedIn spokesman Doug Madey said buying connections “dilutes the member experience violates their user agreement and can also prompt account closures.”[10] Chief executive and founder of Instagram, Kevin Systrom reports “We’ve been deactivating spammy accounts from Instagram on an ongoing basis to improve your experience.”[14]

Facebook’s purging of fake likes and accounts occurred from August to September 2012.[15] According to Facebook’s 2014 financial report to the Securities and Exchange Commission, an estimated 83 million false accounts were deleted, accounting for approximately 6.4% of the 1.3 billion total accounts on Facebook.[16] Likester reported pages affected include Lady Gaga, who lost 65,505 fans and Facebook, who lost 124,919 fake likes.[17] Technology giant Dell lost 107,889 likes (2.87% of its total likes) in 24 hours.[15]Billions of YouTube video fake views were deleted after being exposed by auditors.[18] In December 2014, Instagram carried out a purge deemed the “Instagram Rapture” wherein many accounts were affected—including Instagram’s own account, which lost 18,880,211 followers.[14]

SOURCE: https://en.wikipedia.org/wiki/Click_farm

Things You Need to Know About #Facebook and Mass #Manipulation – #Privacy #Security @alayanimajneb

As the number of websites increased on the internet, the registration process became redundant. You had to remember multiple usernames and passwords. This became a serious problem for users and websites. If the onboarding process is not convenient, user drop off rates would be higher.

Facebook and other social networks came up with the idea of sharing their login system. If you have a website, you can easily integrate “Login with Facebook”.

This was a win-win situation for everyone.

  1. For the user because they don’t have to go through the hassle of registration and remembering passwords.
  2. For websites because they can easily onboard customers.
  3. For facebook because it’s free marketing, a growth hack that will enable them to reach more users.

The problem is when they did more than just sharing their login system. Facebook collected a lot of information about the user. The biggest trick facebook ever pulled was users didn’t feel they were giving away so much information. They made a system that allowed users to share their information with applications outside of Facebook. This was done with the consent of the user.

There was a loophole, it not only allowed a user to share his information but it also allowed him to share his friend’s information. This would happen without the consent of their friends.

If Mary was using an app that uses Facebook’s login, she can permit that app to allow access to her friend’s information. They won’t even know about it.

Moving fast and breaking things came at the cost of user’s privacy. Something they should have put thought into. Facebook later fixed the loophole of allowing people to share information about his/her friends. It was too late though.

The shared login system gained massive adoption, there came a new category of apps called Social Apps. These apps simply used user’s or their friend’s information to accomplish tasks.

Social apps got data effortlessly, things you spoke to your networks since you joined Facebook were given away with a click of a button.

Cambridge Analytica used personality quiz apps to collect information about Facebook’s users. Cambridge Analytica was not the only app which collected such data. There are thousands of such apps and they still hold a lot of data.

These datasets were used to make predictive models.

Amazon uses predictive models to derive insights out of your past purchases and predict the probability of you buying a given product. They later email you with product recommendations.

Predictive models are no rocket science, it is simply based on patterns. Patterns are everywhere, there is a pattern in the way you write, talk, buy etc.

Target Figured Out A Teen Girl Was Pregnant Before Her Father Did. Here target had a massive dataset of purchases made by several people. People who were pregnant had a common pattern in the purchases they made. Simply put they bought the same kind of products. These models are not 100% accurate, but around 85%–95%, that’s good enough.

Here, the personality quiz contained information about the fears of the users. These fears were mapped to the kind of brands and products they like. Once a predictive model is built out of these massive datasets. This process can work two ways.

The brands and product you like can predict your fears. So even though a lot of people didn’t take a personality quiz, their fears could be predicted using their Facebook ‘likes’.

Using people’s fears to manipulate them is one of the tactics of persuasion. This is exploited by politicians and it is evident in their messaging. Read the book Win Bigly by Scott Adams, it is about the weapon-grade persuasive tactics used by Donald Trump.

So combining data science with the psychology of influence, tailored content were created that would make a mass influence for the United States Election, 2017. Facebook allows pinpoint targeting, they not only allow targeting based on age, gender location. But, also to a given set of user IDs.

This is extensively used in India by the political parties. Even trusted media, don’t verify the authenticity of such posts before publishing them.


Facebook built a system to manipulate us. They apologised and are claiming to improve things. There is something even worse, you need to know.

When you browse through newsfeed, spend time on each post, make comments, send private messages to your friends, etc. You are likely to be tracked and your data is sent to algorithms. Later, tailor contented is pushed to hijack your time and money.

Along with the fight against Racism, Gender Inequality, etc. we need to fight such tech companies who have built evil systems to hijack people.

Don’t consume every content from media, remember its only someone’s opinion, sometimes a lie.

Pop OS Linux – Nueva Distribucion | #Linux #CodigoLibre #DiNOaWindows | @Ubuntu @Microsoft

Liberado Pop!_OS 19.04 con Gnome 3.32, Kernel 5.0 y mas !

Los desarrolladores de System76 anunciaron hace pocos días el lanzamiento de la nueva versión de su sistema operativo Pop! _OS 19.04, la cual llega justo pocos días después del lanzamiento oficial de Ubuntu 19.04 Disco Dingo.

Para aquellos que desconozcan de esta distribución, deben saber que Pop!_OS es una distribución de Linux basada en Ubuntu, esta es desarrollada por System76 el cual es un famoso fabricante de equipos con Linux preinstalado.

Cuenta con el entorno de escritorio Gnome el cual tiene su propio tema GTK e iconos.

En este punto, tal vez algunos de ustedes se pregunten ¿Qué difiere de Ubuntu, si es igual a este en cuanto a la base, aplicaciones y apariencia?

System76 creo esta distribución tomando lo mejor de Ubuntu y también de Elementary OS, con el fin de ofrecer un sistema que este diseñado acorde a sus productos.

Ya que va especialmente enfocado para la creación de modelos de 3D, inteligencia artificial, diseño y otras cosas.

El fin de ofrecer Pop!_OS es que sus clientes tengan no solo un buen equipo de cómputo, si no que vaya también acompañado de un sistema que aproveche y exprima el máximo de los componentes de este.

En esta distribución podrás encontrar dos imágenes del sistema para poder escoger de las cuales son, una disponible para sistemas Intel/AMD y otra para NVIDIA. También cabe destacar que el sistema solo esta dieñado para la arquitectura de 64 bits (esto por las características de los equipos que ofrece).

¿Qué hay de nuevo en Pop! _OS 19.04?

Dentro de las novedades que se encuentran dentro de Pop! _OS 19.04, al igual que Ubuntu 19.04 Disco Dingo, esteviene con Gnome 3.32 y Kernel de Linux 5.0.

Mientras que System76 agrega su propio sabor visual a GNOME 3.32 seguramente trae mejoras de rendimiento que hacen que las animaciones sean más rápidas y un sistema en general más rápido.

En lo que respecta a Kernel de Linux 5.0 además de llegar con las novedades que se anunciaron en el lanzamiento de esta versión (puedes consultar el artículo en este enlace) los desarrolladores de System 76 añaden otras tantas mejoras regulares de soporte de pantalla y hardware.

pop os

Otros de los cambios que se destacan en este nuevo lanzamiento de Pop! _OS 19.04 son los cambios en el diseño de sus iconos.

Los iconos para Pop! _OS, aplicaciones, archivos y las carpetas se han rediseñado para complementar los iconos de Gnome bajo sus nuevas pautas de diseño.

Nuevas características

Pop! _OS  19.04 añade nuevas funciones al sistema de las cuales podemos destacar la opción “Modo delgado”que maximiza el espacio de la pantalla al reducir la altura del título en la ventana de la aplicación.

Otro de los cambios destacados en esta nueva versión es “el modo oscuro” que le da a las aplicaciones el ambiente de visión nocturna.

Además, se ha añadido una nueva opción de “Actualizar instalación” que le permite al usuario reinstalar el sistema operativo sin perder su cuenta de usuario y los datos almacenados en Inicio.

Esta sin duda es una excelente opción, ya que permitirá a los usuarios de esta nueva versión de Pop!_OS poder actualizar a versiones posteriores sin perder sus datos.

¿Cómo actualizar de Pop! _OS 18.10 a 19.04?

Si son usuarios de la versión anterior de Pop! _OS 18.10 y quieren actualizar a esta nueva versión sin tener que realizar una instalación en limpio.

Pueden ejecutar los comandos de actualización desde una terminal en su sistema, con los cuales podrán conservar sus datos, usuario y aplicaciones.

También deberán deshabilitar todos aquellos repositorios de terceros añadidos a su sistema, esto con el fin de evitar posibles conflictos con la actualización.

Pueden consultar la publicación realizada por un compañero de como actualizar a Ubuntu 19.04, donde los procesos descritos aplican sin problemas para Pop!_OS. El enlace es este.

Los comandos a ejecutar para actualizar son:

sudo apt update
sudo apt install pop-desktop
sudo apt full-upgrade

En caso de que esté interesado en una instalación nueva, puede encontrar los archivos ISO y torrent para los sistemas Nvidia y AMD en la página de descarga del blog oficial del sistema

7th. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 7


Are your NEWS sources reliable ?

Your News “Main” Source is Social Media

Whether it be finding out someone is pregnant, getting married or moving – your news source is social media.

You’re so disconnected from your friends, that you find out what’s going on with everyone via social media.

You often find yourself commenting immediately when one of your friends posts a status update or photograph.


10 Most Reliable News Sources
(From # 10 to # 1)
  • Wall Street Journal. 
  • New York Times. 
  • BBC. …
  • NPR. …
  • Snopes. …
  • Reuters. …
  • The Economist. …
  • PBS…
  • C-Span…
  • The Associated Press …



6th. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 6

Have you a social media problem? Or are you IT ? !

Social Media References

You find yourself making constant social media references.

When having conversations you’ll consistently refer to the “conversations” that you saw on Facebook or Twitter, – these could be conversations you actually interacted in or ones that you just scoped out.

While social media has proved to be an effective medium of communication, there are some concerns.

Because of the vast amount, the door for social networking abuse is left wide open.

About Social Networking

Social networking actually existed before Facebook. Online communities began building in the late 1990s with sites such as Classmates and SixDegrees. It wasn’t until around 2005 when social networking exploded with MySpace, Facebook and Xanga.

Although these online social communities have many positive attributes, there is one major negative attribute that all these sites have in common: Social networking abuse.

How Social Networking Abuse Occurs

There is nothing too technical about how people go about abusing others on social networks. It’s actually very simple: People lie. There are, of course, more complicated technical ways such as hacking into user accounts, accessing e-mail address books and finding and posting fake pictures so the abuser appears as someone he or she is actually not. Regardless, abuse happens when people lie and unfortunately, it is becoming more common as social networking sites begin to grow.

An Open Door for Predators

Here is the most common scenario for social network predators:

  • The predator opens an account using a fake name and birth date.
  • The predator will post a picture of someone else, usually a picture of someone around the same age of the predators “target group.”
  • The predator then is open to troll around the social networking websites as, for example, a 16-year-old girl when really the predator is a 42-year-old pedophile.

The Statistics

  • A study conducted by the Crimes Against Children Research Center, one in seven children aged 10 to 17 were victims of an online sexual solicitation.
  • In that same study, one-third of the children in this age group received what is called “aggressive sexual solicitation”. This means the predator asked to physically meet them, corresponded with them through regular mail (meaning the child gave the predator his or her home address) and/or received gifts.

Other Abusers

Unfortunately, sexual predators are not the only social network abusers; there are also cyber bullies.

About Cyber Bullying

Cyber bullying is a lot like real-life bullying and incidences are on the rise. Bullies often add users to their online network of friends, with the intention of being anything but. The bully then begins to harass the user in much the same way he or she would harass a victim in person through the use of teasing, derogatory remarks and put-downs (often referred to as “flaming”). Other ways cyber bullies harass their victims is through by listing the people they do not like and writing derogatory remarks about them on their pages. A final thought about cyber bullying is that one of the most common reasons reported as to why it is on the rise is due to the anonymity offered by the Internet. Bullies on the Internet are less likely to get in trouble than a bully on the playground because they do not have to use their real names or pictures online. Instead, they use screen names and avatars.

How to Help Prevent Abuse

The only way to completely protect young people from abuse on social networks is to banish Internet use all together. Since that is never going to happen, here are a few steps young adults, children and parents can take in order to help prevent abuse on social networks.

Children and Young Adults

  • Never engage – Don’t respond to unsolicited e-mail or friend requests. There is no way of knowing who is asking to be your friend. Yes, it could be someone you know, but it also could be a predator. Don’t take the risk, simply do not engage.
  • Make your account private – Only the people you choose will be on your friends list.
  • Block users – If cyber bullying is occurring through e-mail, block the user’s address.
  • Never give out personal information – This includes real name, home address, phone number and age.
  • Report unwanted sexual solicitations – Sexual solicitations must be reported to your local authorities. If you plan on doing so, be sure to keep a copy of whatever the predator has been sending you.
  • Report cyber bullying – you can report cyber bulling to school officials and law enforcement.

For Parents

  • Monitor computer usage – This becomes more difficult as children grow into teenagers. Having an open and honest dialogue with your teen-aged children will help them understand your concerns and worries.
  • Use parental locks – Each computer operating system is a little different, explore yours and get to know how to properly use locks and limits.
  • E-mail forwarding – Have your young child’s e-mail forwarded to your e-mail, while keeping a copy locally in his or her account.

A Final Word About Abuse

There is no sure fire way to stay 100 percent safe on the Internet. The only things a user and parent can do is stay aware and alert of predators and cyber bullies.



5th. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 5


Are there any “know it all” ? Are you one of them ?

Stranger Danger

You can give a basic life run down of complete strangers – who are friends of friends and even possibly friends of friends of friends.

Or of people who are only mere acquaintances.

Gossip is idle talk or rumor, especially about the personal or private affairs of others; the act is also known as dishing or tattling.


How To Avoid Spreading Gossip in 5 Easy Steps
  • Step 1: Don’t be that person who listens to smack about others. Simple as that. …
  • Step 2: Ask yourself why you are spreading rumors.
  • Step 3: Remember what it feels like. …
  • Step 4: Be indifferent to gossip about yourself. …
  • Step 5: Focus on the positive.


4th. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 4

Judging a person does not define who they are, it defines who you are !

Fake Friending

You only friend people because you’re nosey. You would never actually say hello or high five these “friends” in public.

Your only reason for friending them is so you know what’s going on in their lives and you can judge them.

Don’t pass judgment. If you find yourself being judgmental, stop yourself. …
Understand. Instead of judging someone for what he’s done or how he looks, try instead to understand the person. …
Accept. Once you begin to understand, or at least think you kind of understand, try to accept. …

3rd. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 3 

Message in a bubble !

Comment Conversations

You only have conversations via comment threads on your friend’s threads.

You don’t pick up the phone anymore, to see how your circle is doing – you’d rather just scroll down and type.

Calling ? Who calls anyways !