Tuesday, January 14, 2014

Editing Audio: Hindenburg vs WaveLab vs Audacity

A very quick comparison of three leading audio editors.

WaveLab

My version came with a Xoom microphone; the latest version costs about 550 euros. For Mac (and Windows), not Linux.

WaveLab LE 7.1

WaveLab is nice, stable and conservative. Clearly packed with features to explore and enjoy. Also quite expensive and not made for Linux.

Hindenburg

Running a trial (required for a journalism class). Basic version costs about 100 euros, "pro" version about 340 euros. For Mac (and Windows), not Linux.
Hindenburg 1.22
While skeptical, I was genuinely impressed. When working in Hindenburg, think of the user interface as a kind of storyboard; you're not cutting and pasting and deleting in the actual imported file itself. Rather, Hindenburg is centered around the clip boxes in the right hand menu. Sort and organize the bits and pieces of your recording there. Then drag the clips onto the output editing area (middle). And enjoy always being able to extend and concract the beginnings and ends of those clips as you edit! (For video editing, Apple's iMovie introduced the same concept in version 10.) Also has built-in auto-settings for major radio stations (BBC etc.). Not for Linux either.

Audacity

Free, open source, cross platform (for Mac, Linux, Windows and more). Export of MP3-files requires separate installation of LAME codec which is also free and easy.
Audacity 2.0.3
I'm sorry WaveLab and Hindenburg, I'm going to stick with good old Audacity. Ultra basic menu layout; keep in mind you'll need to change the tool (mouse cursor look; like in Gimp/Photoshop) regularly. Have edited multi-track productions (interviews with various background sounds and music; not symphonic concerts), without ever missing out a feature. Also has very efficient background noise removal feature! Obviously destroys competition when price is a factor.



Each screenshot above shows the unmodified software having just imported an mp3-file of A Hero Comes Home from the Beowulf soundtrack.

Saturday, July 27, 2013

How to encrypt your emails

Using PGP encrypted emails nobody except the sender and the intended recipient will be able to read and understand the contents. Below is a quick guide to encryption.
Each user needs three things, basically: PGP encryption software, a key pair and public keys of contacts. It isn't hard and here’s how to do it.

Step 1: Install PGP software
There are options. I recommend using GnuPG (or, for Linux, KGpg). Or, if you use webmail, go to your browser’s plugin site and search for a PGP implementation. Or go to download.com and search for PGP to find free software for PGP. Or buy Symantec PGP. Just like people can send each other email without worrying which email client the recipient use for reading it, neither does the software people use for PGP matter much.

Step 2: Create a key pair
You will use your private key to encrypt things (files, emails). Others will use your public key to encrypt things for you. Follow instructions in the software for creating a key pair (usually a guide will launch after install). Do not forget your passphrase (aka password) and keep it well secured. You might also want to keep a backup of the key files or install them on more than one devices/computers.

Step 3: Exchange public keys
Send your public key to the contacts that need it. Or put it on your website or on a public key server. If you’re paranoid, copy it to a USB stick, put the stick in a brown envelope and hand it over only to people you meet in back alleys. Similarly, acquire the public keys you need from your contacts. You can download the public key for benno@ecowar.eu right from the site. and send me yours if you want to. In your PGP software, find the option to import a key, then browse to the file location.

Step 4: Enjoy the privacy
PGP is pretty good privacy. The mathematics says the NSA has an astronomical chance of hacking your key given enough time and a couple of their supercomputers. Other than that you should be safe.

Remember, however, that whoever you communicate with using PGP can still share your stuff. The security of your contacts is still a matter of trust. Also remember that prolific hackers and authorities alike will be able to see who you communicate with and how much. (That’s part of the reason Wikileaks required the use of Tor as well as PGP.) And remember that using PGP is no different than having a very heavy safe in your office - you’ll still be required to open it if a judge tells you to. Plus, of course, emails will still leave meta-data for agencies to analyze.

That being said, below is a complete list of all my passwords. That’s how i trust PGP ;-)

-----BEGIN PGP MESSAGE-----
Version: GnuPG v2.0.19 (GNU/Linux)

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=PGiV
-----END PGP MESSAGE-----


Face the facts: We can’t trust secretive US agencies, the Russian mafia nor the Chinese military hackers to not snoop on our mostly mundane (yet, given our epicurean civilizational state of democracy which also entitles us to bomb lesser countries, perfectly justifiably private) chatter. But everyone can do their share to make confidentiality a norm.

[Cross-posted from ecowar.eu.]

Sunday, May 26, 2013

"Come bomb the Little Mermaid"


Right now smartphone-armed guerrillas battle from street to street in Copenhagen. Google made them do it.
It has been dark for a few hours. The temperature is falling to minus ten degrees, just as the forecast promised, and there is plenty “fresh wind from the east and northeast” this January evening in Denmark. A small group of men are standing on Langelinje harbor in Copenhagen all staring at their smartphones. They can already feel the cold in their toes and fingertips, but they remain in the area for several hours. For they are on the warpath.
“You think it's a game. But it is not.” So warns a female voice at first run of the Android application called Ingress. Maybe there's some truth to that. Is Google subsidiary Niantic Labs' new, mysterious, worldwide game created to entice users themselves to collect even more data for Google?
In Ingress two competing factions color the world map green or blue. This is done by physically visiting local area landmarks and special buildings, in the game called portals, and conquer them through the app. So, if there has been a little silent in online games like 'World of Warcraft' at the latest, it may be because many of the players has risen from the cushioned chairs and now are all biking around between all sorts of sights while waging a virtual war – and sending photos and location data to Google.

The frogs against the smurfs

During the day, the Copenhagen Ingress street fighters Ttgeek and gnomen work as a web developer and a child educator respectively. A few weeks ago they did not know each other. Both were inspired to apply for access to the game after watching a YouTube video. In it a physics project goes horribly wrong and mysterious energy - called Exotic Matter - has been blown out across the surface of the earth.
Team Enlightened is trying to expose the public to as much radiation as possible by coloring the map in green. Ttgeek and gnomen was among the first who joined the team Resistance who defend humanity by coloring in blue. The two teams have nicknamed each other “frogs” and “smurfs”.
“The video poses questions. You don't know what the game is when you see it, but it's something with GPS, a “capture the flag” thing. And it's a spiced up geocaching thing,” says Ttgeek with reference to the better known and more peaceful way to go on a treasure hunt with GPS equipment.
Ttgeek have reached level 8, which is still the highest that can be achieved as a player, or “agent”. But with great fervor he helps other Resistance fighters to obtain higher ranks and keep Copenhagen blue. This evening among others Agent gnome has appeared on the agreed venue.
“I think the movie looked really good. They have put a lot of energy in the history. And then I needed to get out, I have lost several pounds. People ask why I bother. But before I sat and played 'World of Warcraft' for twelve hours straight. And smoke cigarettes,” laughs gnomen.

Skirmish near the Royal Palace
The Little Mermaid on Langelinje,
Copenhagen, Denmark.
Here as a level 4 Resistance portal.

The troops have assembled, the equipment is in order, let there be gaming. Ttgeek have a Motorola tablet with large battery and gnomen have a HTC with small screen and thus low power consumption. Both can mount their Android weapons to the handlebar of their bikes in waterproof casings.
The two leads the charge against the evening's target. Without getting off their bikes eagerly hacking the portals that the flock passes. Like this, they will be able to continue for more than six hours. Google could hardly have designed Street View bikes better themselves.
Tonight the Resistance attacks the many statues of Langelinje, held by the Enlightened. By Gefionspringvandet, a fountain at one end of the harbor, Ttgeek gives instructions: He goes first to bomb portals into a weak state. Then the lower ranking teammates reap points by conquering and rebuilding the portals.
But it's not as easy as it sounds because the frog portals shoot back. The little smurfs are repeatedly drained of energy and must commute to the Amalienborg palace square, where many blue portals are spewing out so much Exotic Matter that one trip around the equestrian statue of King Frederik V is more than enough for a full recharge.
“Come bomb the Little Mermaid,” writes invulnerable Ttgeek impatiently while his foot soldiers are cycling a second round among the guardsmen on the palace square. Hopefully the communication channel of Ingress isn't one listened in on by the police intelligence service.

Melee on the memorial column

Suddenly, the otherwise bombed-out memorial column for Ivar Huitfeldt turns green again on the Android screens. Ttgeek rapidly returns. Immediately he recognizes a white car that he knows belongs to a member of the Enlightened. The frogs have noticed one of their territories is being taken over by keeping an eye on the Ingress intel website, and one member has rushed to defend it.
But after a short time the car disappears. Tgeek is too strong.
“Close combat is the most fun. The first four days that I played, it was all on my own. I walked around two o'clock at night in complete darkness with headset on and heard the eerie sounds from the app,” laughs gnomen.
“I like getting more about, experiencing the city, and Ingress has helped. I also think it's a fun collaboration, dealing with strangers,” adds Ttgeek.
But the game can get out of hand sometimes, says gnomen:
“Yesterday, when I went to bed, I saw that my portal outside the front door was about to be taken over. So I went over and took it back. Afterwards I went somewhere else. And it ended with a walk on a total of three hours as I recaptured all that they had taken. And when I got up next morning, they had taken over everything once again.”

To get started, visit the official websites:
...and...

The above report is from late January 2013. It was originally published in Danish. and is now cross-posted to Newsvine.
Since then both gnomen, the reporter and several other Copenhageners have reached level 8. As a consequence the game has changed. But it has also changed because many more portals have been added to the map and because Niantic Labs have let gameplay evolve from user suggestions.
A couple of practical considerations that may have seem obscure and geeky are common knowledge to the hard core Ingress agent. For example:
  • GPS is tricky. Ingress is using a routine less stressful to the phone and/or servers than regular navigation apps so you will see your position fly about on the scanner. And moving just on the northern side of a massive structure, you can hide entirely from the satellites to freeze your position. Usually just incredibly annoying.
  • 3G uses a lot of battery. If more than one agent operate together, just one device should communicate with servers and share a local network. Then the other agents should turn off 3G and log onto the shared network using wi-fi.
  • Even when properly protected in waterproof bags, devices will not immediately recharge after ten hours out in the rain. Has something to do with the moisture.
  • Using a bit of wire you can make your own external phone battery from a scooter battery carried in a shoulder bag.