topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Tuesday November 11, 2025, 1:24 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 9 10 11 12 13 [14] 15 16 17 18 19 ... 264next
326
...Not really, it's been proven that people very rarely bother to use a forum search engine prior to just firing off a new thread. ...
I was unaware that this was "proven", but it certainly looks that way - judging from what I've seen, anyway. However, even of you used (say) a site: search (as opposed to the cruddy internal search tool), finding and consolidating relevant/related material in the discussion threads is still likely to be an uphill battle and somewhat hit-or-miss.

DCF is often a veritable mine of useful information, with stuff to be found on various subject categories in DCF discussion threads, but a lot of it seems to be buried in or scattered across threads broken into multiple micro-sub-categories. Occasionally, I try to pull these bits and pieces together into specific higher-level category threads to provide a sort of indexed experiential knowledge-point on a specific subject category that I am interested in. The trouble there is that I am the sole author/editor of the index I created, and - as things stand - it can't be edited in a shared or collaborative fashion by other DCF members. This is a spotty, unreliable and inefficient way of accumulating/curating a knowledge base category.
Ideally, we would use a Wiki for those...    :o
327
These could be useful:
Not sure if you will have seen these - possibly useful - discussions on DCF:

Also, if not already done, check out these potentially useful references: (some referred to in the links above)

My experience of modifying the inbuilt Windows system colours, fonts, etc. for people with macular degeneration is that such methods are constrained by being a bit complicated and are not entirely successful.
The built in "Ease of Access" mods in Windows, designed for visually-impaired users, also seem a bit limited.
If a web-based email access were used instead of the Windows Live Mail desktop program, then NoSquint could be ideal as its settings are pretty flexible and can be set for a given website.
328
If the Windows Magnifier (press Win and + keys) is displaying a black lens or screen window, then the likely cause is the NVIDIA graphics driver. The fix is to force the magnify.exe proggie to work with the standard GPU - not the NVIDIA GPU.
(FIX copied below - my numbering of the solution steps.)
Windows 10 Magnifier Lens Window is Black

By BGGRIT on 2015-08-13
I have set up my magnifier (size, shape, magnification, and to auto start), but the lens window will randomly turn black (not the entire screen just the lens window).  Makes it difficult to navigate with my vision issues.

Any solutions would be appreciated.  Thanks
______________________________________
...further down the page, it says:

tonycol Replied on January 16, 2018
Reply
In reply to Major Instigator's post on January 15, 2018

I am by no means an expert on Windows 10, but I can let you know how I resolved the problem on my own PC. My PC has an nVidia graphics card which works just fine with all applications with the exception of Magnifier.

  • Ensure nVidia Control Panel is installed and enter the control panel via a right click on the desktop screen, then select the nVidia Control Panel option in the context menu.
  • On the left side of the application which is open, there is the option for manage 3D settings. Select this option. I know you probably aren't bothered by 3D anything - it's just where the settings are.
  • On the right side of the screen select the 'Program Settings' tab.
  • If the drop down selector in part 1 does not contain magnifier (and it probably won't,) click the 'Add' button and then the 'Browse' button.
  • Navigate to c:\windows\system32\magnify.exe and double click on it. Doing this will add it to list.
  • Choose c:\windows\system32\magnify.exe from the list.
  • In part 2 choose integrated graphics from the drop down.
  • Click the Apply button.
_______________________________________
329
Rather clever US political campaign video. If I was an American, I'd vote for him - at least he's honest:

330
@science2002:
Just for curiosity, as a notetaker, are you now using OneNote or what? If so, will you stay with ON even when (from v.2019) it will save only to the cloud?
I shall probably stick with OneNote 2016 for the meantime, but am experimenting with a possible migration strategy --> IQ (InfoQube). Trouble is, ON is just so good at coping with the various data types that I use. Hard to beat.


@superboyac:
... My life has taken some drastic turns the last 5 years.  I hope it's for the best, and it's not something I look forward to repeating. ...

Yeah. I guess I know what that might feel like:
Life is what happens to us while we are making other plans.
 - Readers Digest, January 1957.
______________________________
Hang in there mate.
331
@science2002: Sorry, I can't help you as I'm not currently using WizNote - haven't used it in a long time - though I am still keeping an eye on its development.

@superboyac: Have you been stuck in a timewarp, or something?
332
Living Room / Re: My first excel macro
« Last post by IainB on October 09, 2018, 05:54 PM »
At the risk of repeating myself:
@Stephen66515: "Ethics" is usually more about maintaining moral principles in behaviour and business. It would seem to be just plain rudeness/bad manners to tell people to "google it" or "RTFM", and my principles prevent me from being rude to others.
After years of lecturing, consulting and generally trying to maintain a politely helpful and positive approach to people's questions (including being a volunteer on aardvark), I eventually decided on three (sorry, four) basic rules:
Rule 1: that there is no limit to our ignorance (including mine), and I should accept that;
Rule 2: to limit the contribution of my cognitive surplus to such people and their infinite ignorance/questions, by encouraging them to take more responsibility for seeking out/discovering their own answers.
Rule 3: that people generally seem to have little respect for and to have a limited capacity to internalise answers/knowledge which have come too easily to them, so generally avoid giving them any answers.
Rule 4: in any event, avoid "telling them the answer" or pushing my opinion forwards without substantiation in theory, experience and good practice (this takes work to communicate).

When I have strayed from these rules, I have usually regretted it (I think it has happened once in the DC forum).

Therefore, rather than tell people to "google it" or "RTFM", IF I decide to assist them at all, then - and even if I think that I know the answer already - I nowadays usually google it, or check Wikipedia (say) or RTFM for them, and then send them the results or source links, with the suggestion that  they could probably get even more useful information if they hunted around a bit more themselves or played about with the google search string. This is just helping people to help themselves.

...RTFM is never an acceptable answer to any question. Because it is not an answer at all. It's just a thinly disguised way of telling someone to get lost. ...
...Consider: It only takes a few seconds to type RTFM and hit the enter key. But it takes exactly zero work to ignore something completely and go elsewhere. Ideally where you do have something real to contribute.


("Take a man up in a helicopter for a day and he will be able fly for a day. Push him out of the helicopter whilst it is flying and he will fly for the rest of his life."
 - ancient Chinese proverb.)
333
General Software Discussion / Re: Batch for Docs (search and replacer and format)
« Last post by IainB on October 09, 2018, 04:51 PM »
@vincitygialam: Hmm. Lintalist might be useful here. It's a pretty powerful tool based on AHK (Autohotkey) and has a few handy plugins. I suggest you consider trying it out. (The link has instructional videos.)

Not sure whether it would necessarily meet all your requirements, but, on the other hand, though we usually tend to think that we know what our requirements are, it is often the case that we might change/develop our requirements after having had a suck-it-and-see using some new tool. That's because trying out new tools can help to expand our awareness of what is possible and what we would've liked to have had the ability to do had we known that the potential to do that thing existed in the first place - e.g., like discovering that MS OneNote can search for decipherable words/phrases in an audio file and point to where (how many minutes/seconds) that bit of audio is in the file. ("Wait. It can do that?").

Though I have been aware of Lintalist for years, I haven't really needed to use the extensive text-handling functionality that it provides, as I tend to use my own AHK scripts to meet my simple requirements. However, Lintalist seems to support plain text and formatted text (HTML, Markdown, RTF, Image), so I would probably use it if I needed that capability.
334
Living Room / Re: An article on the slow death of Google by Lauren Weisman
« Last post by IainB on October 09, 2018, 07:45 AM »
The seeds of this "failure" were probably germinating and detectable in the Google Wave Developer Preview at the Google I-O 2009 presentation.
I recall reporting that I had analysed the transcript of that presentation and counted all the instances of the signature meaningless BS/buzzwords in it and it didn't look good:
In the transcript there are a number of what I refer to as BS/buzzwords, clichés and alarm triggers, including, for example:
Word/cliché
excited
unbelievable
great
cool
[laughs]
amazing
No. of occurrences
      6
      2
      5
    10
    24
      5

Google were presumably paying exceedingly good money to the actors responsible for that abortive software development and for making that empty presentation. The audience obligingly applauded on queue.
It was déjà vu for me and the actors were history - apparently all gone.
But, for that to happen at all in the first place, you arguably really needed to have been making/tolerating serial execution errors somewhere upstream. That - to my mind - would have been representative of some kind of endemic corporate systemic failure. Never mind the quality, feel the width. I think that's often likely to be a sign of out-and-out desperation.
335
Me and a couple of Aussi mates were in a bar today, sinking a few beers. The TV news was on and we watched Justice Kavanaugh being sworn-in as an Associate Justice on the Supreme Court, after his being nominated by President Donald Trump:

Kavanaugh beer WWF (Wayback).gif

- Impressive!
We reckon Kav probably has Aussie roots.
336
Living Room / Re: Google finds Vulnerability in G+ API. Sunsets G+ in response.
« Last post by IainB on October 08, 2018, 06:25 PM »
Google have probably been looking for an excuse to kill off the failed G+ Beta for some time now, without further upsetting the residual users. This "vulnerability" may well present a timely and convenient justification for doing that.
337
Maybe there's a silver lining here. I mean, for example, supposing that the market value of Amazon and Apple stock had just tanked on a lack of confidence, based on the news of the Chinese hack published in good faith by Breitbart, and that stockholders had been subsequently unloading it like the plague before it fell even lower. Suppose that someone had decided to buy a lot of it at the currently lower bargain price levels and then the "convincing" news that it's not a hack after all coincidentally meant that the stock just bought would be worth a lot more overnight as confidence was restored. That someone wouldn't even need to settle on the purchase before selling it at a clear windfall profit.
Wouldn't that be a lucky thing!?    :Thmbsup:

These things can be just "lucky coincidences" for some and "opportunities" for those imbued with good investment foresight. And it's not like something similar hasn't happened before - is it?

For example:
  • Tesla: the report in the news that Tesla likely to face SEC investigation following Musk tweets amid debate of market manipulation. It seems that the CEO of Tesla apparently could have inadvertently probably caused a temporary spike in the continuum of Tesla stock value by Tweeting what turned out to be an apparently incorrect/untrue statement about funding being available for a private buyout, or something. This apparently could have run counter to SEC rules, in retrospect.
  • Intel (Spectre/Meltdown): a  while back I read somewhere that the CEO of Intel had apparently/reportedly unloaded a lot of stock shortly before the Spectre/Meltdown "security flaws" were so systematically published and likely to cause a temporary spike in the continuum of Intel stock value. (I don't recall reading whether this could have run counter to SEC rules in retrospect, or whatever.)

I recall reading of a big investment funds manager in the UK in the '70s called Jim Slater, who seemed to be perpetually having that kind of luck - he seemed to have really good foresight; apparently made millions by it. He was apparently put into clink and did time - I don't recall the full details - but he was recognised as being a good investment adviser.    :o
338
Living Room / Re: Problem for very strong brains
« Last post by IainB on October 06, 2018, 02:00 PM »
@kalos: It seems you might be posing typical problems in CPA (Critical Path Analysis).
I would therefore suggest that you do a duckduckgo.com (or google.com) search for:
  • (a) optimising the critical path - e.g., result here.
  • (b) optimising the management of resources (optimisation of resource planning/utilisation) - e.g., result here.

Also worth referring to is the excellent Microsoft Office Project YYYY Inside Out training package on CD.
Here, for example, is the summary of what's in it, from the Complete eBook of the Microsoft Office Project 2003 Inside Out version:
What’s on the CD
Your Inside Out CD includes the following:
  • ●    Complete eBook.  In this section, you’ll find an electronic version of Microsoft Office Project 2003 Inside Out. The eBook is in PDF format.
  • ●    Project Standard Trial.  In this section, you’ll find a trial version of Microsoft Office Project 2003 Standard Edition.
  • ●    Computer Dictionary, Fifth Edition eBook.  Here you’ll find the full electronic version of the Microsoft Computer Dictionary, Fifth Edition. Suitable for home and office, the dictionary contains more than 10,000 entries.
  • ●    Insider Extras.  This section includes files the author selected for you to install and use as additional reference material.
  • ●    Microsoft Resources.  In this section, you’ll find information about additional resources from Microsoft that will help you get the most out of Microsoft Office Project and other business software from Microsoft.
  • ●    Extending Project.  In this section, you’ll find great information about third-party utilities and tools you use to further enhance your experience with Office Project 2003.
The Companion CD provides detailed information about the files on this CD and links to
Microsoft and third-party sites on the Internet. All the files on this CD are designed to be
accessed through Microsoft Internet Explorer (version 5.01 or later).
The Complete eBook on its own (without the CD) is very useful, and you might well be able to lay hands on a hardcopy or .PDF file of that in a corporate training department, corporate library or public lending library.
339
Living Room / Re: I'm getting married, wish me luck!
« Last post by IainB on October 06, 2018, 11:02 AM »
Huh - what? Well that explains it, I guess. Dereliction of duty due to personal circumstances being allowed to take priority? What the heck has got into you?!

Well done! Congrats to both of you.    :Thmbsup:
340
Nah. We all know them pesky Russkies rilly the ones wot dun it, eh?
341
Living Room / Re: silly humor - SafePlaces.swf
« Last post by IainB on October 03, 2018, 03:02 PM »
SafePlaces.swf (in the .ZIP file below) was something of a classic in its time - one that I recently dug up.
Is has some fun for young and old. Bit of an amusing puzzle.
The links to the music that the little guy has on his cassette player are broken though, but they may be on Wayback.
Have fun.
Clue: experiment by clicking objects with the mouse.

342
Living Room / Re: What books are you reading?
« Last post by IainB on September 29, 2018, 04:27 PM »
Today I was reading some US media channels in my BazQux feed-reader that seemed to be absolutely choc-a-block with "news" about the pillorying of one Brett Michael Kavanaugh (a US Circuit Judge of the US Court of Appeals for the District of Columbia Circuit) - almost to the exclusion of any other US/world news.

I don't know anything about Kavanaugh, but what struck me was a news feed (chicagotribune.com) that referred to it as Kavanaugh's 'character assassination'.
The related videos were absolutely pure theatre...
Costanza popcorn-eating watching TV anim.gif

- but, watching them I had a sense of déjà vu and after a bit of head-scratching, I finally traced it back to that well-known hated/loved world leader, Adolf Hitler. I mentioned in this discussion thread, back in 2011:
...I am reading an interesting book at the moment, as I explained in a separate post...
...I had not actually wanted to read it, though I had been steeling myself for the time when I would have to.
I am reading this English translation, here, if you want to take a look: Adolf Hitler - Mein Kampf (James Murphy translation).pdf...

At 557pp, Mein Kampf is not a light reading exercise, but searching the .pdf file eventually turned this up: - Hitler was apparently describing the timeless methods that would seem to have been employed in the Kavanaugh pillorying:
From Mein Kampf, by Adolf Hitler - from pages 78 and 79:

... By far the most effective branch of political education, which in this connection is best expressed by the word 'propaganda', is carried on by the Press.  The Press is the chief means employed in the process of political 'enlightenment'.  It represents a kind of school for adults.  This educational activity, however, is not in the hands of the State but in the clutches of powers which are partly of a very inferior character.  While still a young man in Vienna I had excellent opportunities for coming to know the men who owned this machine for mass instruction, as well as those who supplied it with the ideas it distributed.  At first I was quite surprised when I realized how little time was necessary for this dangerous Great Power within the State to produce a certain belief among the public; and in doing so the genuine will and convictions of the public were often completely misconstrued.  It took the Press only a few days to transform some ridiculously trivial matter into an issue of national importance, while vital problems were completely ignored or filched and hidden away from public attention.

The Press succeeded in the magical art of producing names from nowhere within the course of a few weeks.  They made it appear that the great hopes of the masses were bound up with those names. And so they made those names more popular than any man of real ability could ever hope to be in a long lifetime. All this was done, despite the fact that such names were utterly unknown and indeed had never been heard of even up to a month before the Press publicly emblazoned them.  At the same time old and tried figures in the political and other spheres of life quickly faded from the public memory and were forgotten as if they were dead, though still healthy and in the enjoyment of their full viguour.  Or sometimes such men were so vilely abused that it looked as if their names would soon stand as permanent symbols of the worst kind of baseness.  In order to estimate properly the really pernicious influence which the Press can exercise one had to study this infamous Jewish method whereby honourable and decent people were besmirched with mud and filth, in the form of low abuse and slander, from hundreds and hundreds of quarters simultaneously, as if commanded by some magic formula.

These highway robbers would grab at anything which might serve their evil ends.

They would poke their noses into the most intimate family affairs and would not rest until they had sniffed out some petty item which could be used to destroy the reputation of their victim.  But if the result of all this sniffing should be that nothing derogatory was discovered in the private or public life of the victim, they continued to hurl abuse at him, in the belief that some of their animadversions would stick even though refuted a thousand times.  In most cases it finally turned out impossible for the victim to continue his defence, because the accuser worked together with so many accomplices that his slanders were re-echoed interminably.  But these slanderers would never own that they were acting from motives which influence the common run of humanity or are understood by them.  Oh, no.  The scoundrel who defamed his contemporaries in this villainous way would crown himself with a halo of heroic probity fashioned of unctuous phraseology and twaddle about his 'duties as a journalist' and other mouldy nonsense of that kind.  When these cuttle-fishes gathered together in large shoals at meetings and congresses they would give out a lot of slimy talk about a special kind of honour which they called the professional honour of the journalist.  Then the assembled species would bow their respects to one another. 

These are the kind of beings that fabricate more than two-thirds of what is called public opinion, from the foam of which the parliamentary Aphrodite eventually arises.

Several volumes would be needed if one were to give an adequate account of the whole procedure and fully describe all its hollow fallacies.  But if we pass over the details and look at the product itself while it is in operation I think this alone will be sufficient to open the eyes of even the most innocent and credulous person, so that he may recognize the absurdity of this institution by looking at it objectively. ...

- which all rather coincidentally seems to indicate that The Führer was apparently sitting in Cell 9 writing about the producers of what we today have labelled "Fake news".

My conclusion: Mein Kampf is worth a read as it may have perceptive, real educational and historical value - and maybe news media organisations have for years appreciated this fact and been using it as a textbook tutorial for honing their "reporting methods".

Utterly amazing. Read dis book!    :Thmbsup:
#BlownAway
343
General Software Discussion / Re: Et Tu, CCleaner!
« Last post by IainB on September 29, 2018, 11:55 AM »
@ital2: Thanks for the rant and info. It was interesting - especially the bit about System Ninja - and mostly/all made sense to me.
Regarding having to close a browser before CCleaner can delete its cookies, etc.: I would guess that the reason for having to close a browser before CCleaner can delete cookies or other files (e.g., cache) would be simply because those files will tend to have been locked by the browser whilst it is running and only get unlocked when the browser is shut down.
344
Living Room / Re: How has everyone been?
« Last post by IainB on September 29, 2018, 08:20 AM »
I'll try to address this later or in a future post IainB but I just finished listening to ContraPoints' Discord Hang Out right now and I need to rest and later I have to prepare for a 15 minute talk with Dr. Debra Soh in Patreon.
Well, I'd probably do the same in your shoes, truth be told. Always take the easier option. The world ain't gonna stop spinning if we say "manyana". And getting some rest is always a good idea anyway, in these turbulent times.
345
General Software Discussion / Re: Is it possible to group names by fuzzy logic?
« Last post by IainB on September 28, 2018, 10:38 AM »
Download Fuzzy Lookup Add-In for Excel:
https://www.microsof...etails.aspx?id=15011

Nice find! Looks interesting.    :Thmbsup:

I downloaded it to try it out, but I have Win10-64 Pro and MS Office Excel 2016 and noticed that that wasn't covered (not necessarily forwards compatible) in the page The Fuzzy Lookup Add-In for Excel performs fuzzy matching of textual data in Excel, where it says:
(Copied below sans embedded hyperlinks/images, with my emphasis.)
Supported Operating System
Windows 7, Windows 8, Windows 8.1, Windows Server 2008, Windows Server 2012, Windows Server 2012 R2, Windows Vista

Preinstalled Software (Prerequisites): Microsoft Excel 2007, 2010 or 2013
1 GHz processor, 1 core or higher
1 GB of RAM
2 GB of available hard disk space
The following libraries are required and will be installed if necessary:
.NET 4.5
VSTO 4.0

As a long-time Excel ASAP Utilities user, I couldn't seem to get any joy from site:asap-utilities.com/ "fuzzy" either.
Still, I shall try this one out (suck-it-and-see). Stuff from Microsoft Labs is usually pretty tolerant.
346
Living Room / Re: How has everyone been?
« Last post by IainB on September 28, 2018, 10:16 AM »
@Paul Keith:
Sorry, but I don't quite follow. I'm a bit confuzzled over this whole hikikomori thing.
What exactly are the criteria to be met before one can be said to be "hikikomori"? Are you suggesting that you meet all those criteria? Is race one of the criteria? Or ethnicity?
If there aren't any such criteria, then why the heck not?

If someone doesn't necessarily meet all the criteria (whatever those criteria might be), but yet identifies themselves as being hikikomori anyway, then who are we to deny them that self-identification? Or would they be officially deemed to be masquerading as hikikomori, or appropriating the hikikomori culture? If they were - in either case - then would that be an offence punishable under any state law in any country, or perceived as an unacceptable offence against social/moral virtue?
Should such pretenders be punished?
 
Is it possible for hikikomori-like characteristics to be scientifically assessed/measured with some kind of psychometric tests - e.g. (say), like Aspergers or IQ might be measured?
Is there an official hikikomori society that only hikikomori can be members of - sort of like Asperger support groups or Mensa - where to be a member one would need to score over so many hikikomori points to qualify for membership?

If there were a pukka hikikomori group, then should new members be admitted initially as equal members, or as Novices or Associates at first and then have to work their way up by degrees to Fellows, or something?
Should these hikikomori groups be open (e.g., like LBGTQXYZ, the German National Socialist Party, or whatever), or more closed/secretive (e.g. like the Masons or the Rosicrucians, or like those people who persist in stealing the food from my marked food containers in the office fridge)?

Is being a hikikomori something that one should feel socially fortunate about (e.g., like being given a winning ticket in the lottery of life), or the opposite (e.g., like contracting leprosy, or an STD)? Is being a hikikomori determined genetically - e.g., like gender X/Y chromosomes - or is it something that one develops into or feels oneself and one's self-identity to be intrinsically and inextricably drawn towards and part of (e.g., including various religio-political ideologies or belief systems, such as (say), 7th Day Adventists, Devil Worshippers, Klingon language speakers, LBGTetc, pedasty, God's Army, Nazi/fascism, or the KKK)?

Serious questions indeed. Enquiring minds need to know, and I think we should be told.
347
Living Room / Re: How has everyone been?
« Last post by IainB on September 27, 2018, 09:36 PM »
@Paul Keith: Eyebinallrightmon. Howubin?
EDIT: Corrected spellin: Eyebinallritemon. Howubin?
348
Living Room / Re: Privacy - HAT (Hub of All Things) = Sovrin ?
« Last post by IainB on September 27, 2018, 11:55 AM »
EDIT: Oops! Forgot to post this initially:
Identity For All - Permanent Digital Identities that Don’t Require a Central Authority
The Sovrin Solution
Sovrin is a decentralized, global public utility for self-sovereign identity. Self-sovereign means a lifetime portable identity for any person, organization, or thing. It’s a smart identity that everyone can use and feel good about. Having a self-sovereign identity allows the holder to present verifiable credentials in a privacy-safe way. These credentials can represent things as diverse as an airline ticket or a driver's license.

Sovrin identities will transform the current broken online identity system. Sovrin identities will lower transaction costs, protect people’s personal information, limit opportunity for cybercrime, and simplify identity challenges in fields from healthcare to banking to IoT to voter fraud.

...Interestingly enough, this would seem to be exactly the sort of thing that HAT (Hub of All Things) - referred to above per Armando (2016-07-29, 14:49:38) - is apparently designed to protect us from, whilst at the same time increasing our privacy and freedom of choice:

What is the Hub of all Things?


The Hub of All Things
...
349
Living Room / Re: Privacy- MEGA - General Data Protection Regulation Disclosure.
« Last post by IainB on September 27, 2018, 11:38 AM »
MEGA - MEGAsync - General Data Protection Regulation Disclosure:
(Copied below sans embedded hyperlinks/images.)
Spoiler
General Data Protection Regulation Disclosure

Introduction
In 2013 MEGA pioneered user-controlled end-to-end encryption through a web browser. It provides the same zero-knowledge security for its cloud storage and chat, whether through a web browser, mobile app, sync app or command line tool. MEGA, The Privacy Company, provides Privacy by Design.

As all files uploaded to MEGA are fully encrypted, their contents can’t be read or accessed in any manner by MEGA. Files can only be decrypted by the original uploader through a logged-in account, or by other parties who have been provided with file/folder keys generated by the account user.

Personal data is information relating to an identifiable natural person who can be directly or indirectly identified in particular by reference to an identifier.

MEGA stores the following categories of Personal Data
Contact Details
  • Email addresses
  • User’s name (if provided)

Transaction Details
  • IP address and Source Port for account creation and file uploads
  • Country location (inferred by matching IP to MaxMind IP database)
  • File size and date uploaded
  • Date that file/folder links are created
  • MEGA contacts
  • Chat destination contact(s) and time sent
  • Call destination contact(s), call start time and call duration
  • Subscriptions and payment attempts
  • Information provided to a payment processor when processing a subscription payment, such as Tax ID number, but not the credit/debit card number.

MEGA does not receive or store special categories of personal data or data relating to criminal convictions and offences, as any files that are uploaded to MEGA are fully encrypted at the user’s device so the encrypted data is not able to be decrypted by MEGA.

MEGA doesn’t share the data with any other party other than with competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences and as specified in the Privacy Policy clause 11.

Purpose
The purpose of storing the data is to manage account login and activity and to respond to information demands from authorities.

Processing
MEGA stores personal data but does not carry out any other processing activities on such data. This storage of personal data is necessary in order to provide the secure login to MEGA’s systems and to satisfy compliance obligations.

Lawful Basis of Processing: Contract
The processing of data is necessary for performance of the contract that MEGA has with each user, which they accepted through the Terms of Service when creating their account.

The Terms of Service clause 2 requires the user to agree to the Terms or otherwise to not use the service. Acknowledging and accepting the Terms of Service is a mandatory step in the signup process in all clients - web and mobile.

Clauses 50-51 of the Terms of Service incorporate the Privacy Policy by reference. The Privacy Policy specifies the personal information that is stored.

Retention of Personal Data
Personal data is retained indefinitely while the user’s account is open. After account closure, MEGA will retain all account information as long as there is any law enforcement request pending but otherwise for 12 months after account closure as users sometimes request that an account be re-activated. After 12 months, identifying information such as email and IP addresses will be anonymised (except that email address records will be retained for reference by the user’s contacts or where the user has participated in chats with other MEGA users) but other related database records may be retained.

After user deletion of a file all deleted files will be made inaccessible, marked for deletion and deleted fully when the next appropriate file deletion purging process is run.

After account closure all stored files will be marked for deletion and deleted fully when the next appropriate file deletion purging process is run.

Data Subject’s Rights
Each user has the rights specified in this disclosure notice.

Withdrawal of Consent
Users can only withdraw consent to MEGA collecting the specified personal information if they close their account.

Statutory and Contractual Obligations
Personal Information collected by MEGA is not collected because of any contractual or statutory obligation to third parties.

Automated Decision Making and Profiling
MEGA does not undertake any automated decision making or profiling.

The Right of Access
Individuals have the right to obtain:
  • confirmation that their data is being processed;
  • access to their personal data;
  • Any requests should be submitted to [email protected]. The information will be provided promptly, and at least within one month, without charge unless the request is manifestly unfounded or excessive.

Rectification
Individuals are entitled to have personal data rectified if it is inaccurate or incomplete. If MEGA has disclosed the personal data in question to any third party (such as a compliance authority), it will inform them of the rectification where possible and will also inform the individuals about the third parties to whom the data has been disclosed where appropriate. The only third parties that might have had disclosure are compliance authorities.

Erasure
The right to erasure does not provide an absolute ‘right to be forgotten’. Individuals have a right to have personal data erased and to prevent processing in specific circumstances:
  • The personal data is no longer necessary in relation to the purpose for which it was originally collected/processed.
  • The individual withdraws consent.
  • The individual objects to the processing and there is no overriding legitimate interest for continuing the processing.
  • The personal data was unlawfully processed (i.e. otherwise in breach of the GDPR).
  • The personal data has to be erased in order to comply with a legal obligation.
  • The personal data is processed in relation to the offer of information society services to a child.
Any requests for erasure will be considered in detail and would probably result in closure of the user’s account.

After account closure, MEGA will retain all account information as long as there is any law enforcement request pending but otherwise for 12 months after account closure as users sometimes request that an account be re-activated. After 12 months, identifying information such as email and IP address will be anonymised (except that email address records will be retained for reference by the user’s contacts or where the user has participated in chats with other MEGA users) but other related records may be retained.

After user deletion of a file all deleted files will be made inaccessible, marked for deletion and deleted fully when the next appropriate file deletion purging process is run.

After account closure all stored files will be marked for deletion and deleted fully when the next appropriate file deletion purging process is run.

In some cases a person may receive an email from MEGA asking the person to confirm their new account email address, but in fact they haven’t tried to open an account - someone else has started the process and used their email address either maliciously or by mistake. In these cases, MEGA has an ephemeral/incomplete account that might be used to upload files. On request, and after proving ownership of the email address, MEGA will arrange for the account to be deleted.

MEGA can refuse a request for erasure:
  • to comply with a legal obligation for the performance of a public interest task or exercise of official authority.
  • for public health purposes in the public interest;
  • for the exercise or defence of legal claims.
The Right to Restrict Processing
Individuals have a right to ‘block’ or suppress processing of personal data. When processing is restricted, MEGA is permitted to store the personal data, but not further process it. As MEGA only stores, and doesn’t further process the stored personal data, no action will be taken in response to a request to restrict processing.

Data Portability
The right to data portability only applies:
  • to personal data an individual has provided to a controller;
  • where the processing is based on the individual’s consent or for the performance of a contract; and
  • when processing is carried out by automated means.
On request by email to [email protected], MEGA will provide a user’s personal data in a structured, commonly used and machine readable form such as JSON files.

Note that all files in a user’s account can be downloaded and decrypted through any of the usual clients.

Lead Data Protection Supervisory Authority
The Lead Data Protection Supervisory Authority is the Luxembourg National Commission for Data Protection. This is the appropriate authority for accepting GDPR complaints about MEGA.

NATIONAL COMMISSION FOR DATA PROTECTION
1, avenue du Rock'n'Roll
L-4361 Esch-sur-Alzette
https://cnpd.public.lu

Controller
MEGA Limited
Level 21, Huawei Centre
120 Albert St
Auckland
New Zealand
Company number 4136598

Controller’s Representative
Mega Europe sarl
4 Rue Graham Bell
L-3235 Bettembourg
Luxembourg
Company number B182395
[email protected]

The Privacy Company. User-encrypted cloud services
 
MEGA
About us Plans & Pricing Resellers Service Policy Press & Media Credits Contact Us
Apps
iOS Android Windows Mobile Browser Extensions MEGAsync MEGAcmd MEGAbird
Support
Help centre Blog
Tools
SDK Source Code
Legal
Terms of Service Privacy policy Copyright Takedown Guidance General Data Protection Regulation Disclosure
© MEGA 2018 All rights reserved

350
Having worked in Defence and marketing and having managed the design, development and delivery of smart nationwide credit-card driven EFT-POS systems which collect, curate, manipulate and use user data for marketing advantage, I have learned some very good reasons why the individual needs to understand:
  • (a) the value and fragility of personal data-privacy and
  • (b) its relevance to freedom/liberty.

I generally try to think for myself and prefer to take a healthily skeptical and politically agnostic outlook on life. I am personally fed up to the back teeth with the incessant incitement to outrage and the bombardment of absurd political bias and being told how to behave or encouraged to moronically right-think all the time, as pushed by a majority media cohort apparently funded by vested interests (i.e., propaganda, AKA "fake news") seemingly hell-bent on manipulating us (e.g., including the Facebook - Cambridge Analytica fiasco and SnowdenGate.).

Though it inevitably seems/tends to push its own peculiar political bias a lot of the time (like many websites), the website innov8tiv.com occasionally publishes what seem to be relatively well-balanced posts on topics that could be of interest. I therefore keep it in my BazQux feed-reader and periodically check it out.
IMHO, the item copied below from innov8tiv.com is potentially informative and thus worth a read:
(Copied below sans embedded hyperlinks/images, with my emphasis.)
People browsing using Chrome were quietly logged into their Google accounts without their consents | So much for users’ Privacy
 Felix Omondi  September 24, 2018  Apps and Software

A professor at Johns Hopkins and a cryptography expert, Matthew Green, called out Google for making changes to Chrome, making the browser log in users into their Google account without the consent or even notifying them. A move security experts say puts the users’ privacy into jeopardy.

Historically, Chrome users have had the option of using the browser without logging in to their Google accounts. Although logging in does come with some obvious benefits such as having your bookmarks, passwords, and browsing history synced in the cloud and available across any device you are browsing on using the Chrome browser.

However, for security-conscious users who do not have Google – the most prominent advertising entity in the world – have their browsing data for purposes of sending them targeted Ads. Now that Google has made changes to the new Chrome to make the browser log users secretly into their Google Accounts means Google will get the data of users who would otherwise not have logged into their accounts.

Google has come out addressing these concerns raised by security experts stressing that users must have consented to the sync feature thus allowing the browser to transfer their data. Buried in the sync feature, is the revelation that for the sync feature as it works out will automatically also log you into your Google account.

So when a user logs in to their Gmail account on the browser, Chrome also automatically logs into their Google account. All that happens without the consent of the user or the user getting notifications.

“Now that I’m forced to log into Chrome,” wrote Green, “I’m faced with a brand new (sync consent) menu I’ve never seen before.”

Copied from: People browsing using Chrome were quietly logged into their Google accounts without their consents | So much for users’ Privacy | Innov8tiv - <http://innov8tiv.com/people-browsing-using-chrome-were-quietly-logged-into-their-google-accounts-without-their-consents-so-much-for-users-privacy/>
Interestingly enough, this would seem to be exactly the sort of thing that HAT (Hub of All Things) - referred to above per Armando (2016-07-29, 14:49:38) - is apparently designed to protect us from, whilst at the same time increasing our privacy and freedom of choice:

What is the Hub of all Things?


The Hub of All Things


Happy days.
Pages: prev1 ... 9 10 11 12 13 [14] 15 16 17 18 19 ... 264next