Lensa AI, an all-in-one photo/video editor, has taken the social media world by storm. But at what cost?
What is Lensa?
Lensa AI currently tops at number one on Apple and Google Play stores with its new AI profile generator. Users create stunning and unique profile pictures by uploading 10-20 pictures of themselves.
These photos are then used to generate profile pictures in different artistic styles.
“you grant us a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully-paid, transferable, sub-licensable license to use, reproduce, modify, distribute, create derivative works of your User Content”
In plain English, this means that by agreeing you allow Lensa to use photos you upload in whatever way they like.
Also, consider that many smart devices now use face IDs to unlock. Hackers could use AI art to generate realistic photos of your face to unlock your devices.
Conclusion
While this technology is powerful and exciting, it is also new. With any new technology, it is critical we understand how it can impact our lives.
According to this study, there are about 2,200 cyber attacks happening every day. That is an attack every 39 seconds!
We can almost begin to feel paralyzed about what we can do to protect ourselves online.
With this understanding, this guide was made to help those who want protection but don’t know where to start.
Each section or “level” is meant to be implemented from level 1 to Level 3. But, do not feel as though you need to put in place all 3 levels.
Important Note:
This guide focuses on data protection rather than anonymity/privacy. Applying the principles below can help with privacy, but will not be enough.
Level 1: Basic Security
Passwords:
For most users, passwords can often be a point of anxiety.
Always trying to remember a complex password is frustrating. Yet, it is crucial that you make each password as unique and complex as possible.
This is where a password manager can be a lifesaver.
Password managers store all your credential login information. These managers can also fill out sign-in portals for you.
When you reuse the same passwords, you give the hacker more information to use against you.
For those in the market for a password manager LastPass is a fantastic option. They have a free plan that would meet most users’ day-to-day needs.
Multi-Factor Authentication:
M.F.A. (Multi-Factor Authentication) is a critical step for protecting your data online.
For those who don’t already know, M.F.A. is a multi-step login process for the user to authenticate.
Don’t worry if this sounds complicated! It’s not!
A good example of M.F.A. is signing into Google. Users provide their username and password, as well as a one-time password sent to their phone number.
Always opt for M.F.A. when possible.
Antivirus Software:
Although this may seem somewhat obvious, many people don’t install antivirus software.
Antivirus software protects you from attacks like downloads that contain malicious software. Often this malware resides on your workstation undetected, logging all your information.
Antivirus prevents this by analyzing the files you download as soon as you download them.
Level 2: Mid-Level Protection
Social Media:
Social media is a research heaven for hackers.
When you post PII (identifiable information), hackers can gather this information and use it against you.
Try to avoid posting personal email addresses, phone numbers, home addresses, or pictures of your government/business I.D.s.
VPN?:
In recent years using a VPN has been seen as a “magic bullet” for all of your data protection needs.
Sadly, it’s not.
At a high level, VPNs function by changing the location where your device is located.
This hides your activity from anyone listening and your ISP (Internet service provider).
While this is great, VPNs will not protect you from hackers if you use the same passwords on sketchy sites.
But, I would still recommend getting a VPN.
Most VPN services offer add-on tools (e.g. Ad Blockers, Tracker Blockers, and Password Managers) with your subscription.
These tools can also help you stay secure online, by making it harder to gather information on your internet activity.
Social Engineering:
Social engineering is one of the most important points on this list.
At a high level, social engineering is by which hacking occurs at the human level.
The Uber hacker confirming his social engineering attack
This can happen in many different forms, one of which you would already know as spam calls. Spam calls are often easy to detect, but other forms of social engineering are more subtle.
Here is a list of the most common themes across most social engineering attacks.
Common Themes:
The message plays on your emotions to act out of fear, anger, excitement, etc.
The message disguises itself as an organization that you trust (exp. “Amazon” sending you a message to click on a code via WhatsApp)
Unusual links (exp. http://www.ubr.com)
There is incorrect spelling and grammar
Level 3 – Extreme precaution
Multiple Email Addresses:
By using multiple email addresses, you limit the amount of information that can be leaked at one time. Each email is for a different area of your life (e.g. work, promotions, entertainment). By doing so you force the hacker to work harder, giving you time to react.
Conclusion:
By implementing these security practices, you prevent potential attacks from ever taking place.
Living in the digital world can be overwhelming, but it is possible to protect your data.
Whether you are an ambitious student looking to improve your grades or a simple hobbyist trying to refine your skills, understanding how to study effectively can greatly improve the quality of your time spent learning.
Below is a list of the three most effective studying strategies that you can implement today!
Strategy List Overview
Feynman technique
Leitner System
The SQR3 Method
Feynman Technique
The idea of the Feynman technique is to help learners become aware of the difference between knowing and understanding. This is done by the learner taking a concept/principle and explaining it to others.
By doing this, you are forced to use much simpler words and phrases than you would normally. This in turn helps you to have a deeper understanding of the subject and identify where the deficiencies in your understanding lie. Often, we can use complex words and phrases as a crutch not understanding their true meaning.
Below are the steps needed to implement the technique.
Steps
List the concept you want to study
Write a simple and clear explanation
review explanation
re-learn and re-read
Repeat
2. Leitner System
The Leitner system is a technique that utilizes the principle of spaced repetition using flashcards and boxes. For each box, you assign a certain number of times you will review the cards inside (e.g. every day, every other day, and once a week).
The effectiveness of this technique is that cards you are able to memorize quickly will go to the end where they will be reviewed less often. While the cards you are not able to memorize as quickly stay toward the front requiring you to review them more often. But there is a catch, no matter at what point the card is if you are not able to remember the card it then gets sent to the front to start all over again.
3. SQR3 Method
The SQR3 method is a reading technique that can be used to help learners read more proactively. Being more proactive helps learners better recall the information that they read as well as have a deeper understanding of its importance.
Below is a step-by-step explanation of how to implement the SQR3 reading method.
Skim
Questions
R1 = Read
R2 = Recite
R3 = Review
Steps
1. Skim
First, begin by skimming and noting all the headers and key themes in the passage.
2. Questions
After having skimmed the passage, begin the second step by making each of the headings into as many questions that you think will be answered in the passage.
3. R1 = Read
The third step is to read and look for answers to the questions asked in the previous step.
4. R2 = Recite
After reading, summarize in your own words what the section was about and the answers to the questions that you had asked.
5. R3 = Review
The last step is to review. In this step, go over any points or passages that you felt were unclear or questions that you had while reading. Answer these questions and review again.
Conclusion:
By now you should have the skills to be able to receive more value from studying. Please feel free to implement any of the techniques listed above best suited to your needs. Best of luck.
On September 15, 2022, Uber reported that they were responding to a cybersecurity incident. That incident, as we later found out, was a security breach of Uber’s entire IT infrastructure.
A hacker, an unknown 18-year-old, posted screenshots of the company’s financial and admin dashboards, proving he was successful.
He spoke with journalists about how he compromised Uber the following day.
Educating yourself about social engineering will mitigate attempts from hackers. Learn what applications and protocols your company uses to communicate. Doing so you will notice anything abnormal/strange and can respond.
2 – Privilege Access Management
Once the hacker gained access, he then was able to add his device to the company VPN. This allowed him to scan the company’s internal network for any information.
While scanning the network, the hacker discovered a network share.
This network share housed a PowerShell script containing admin credentials for Thycotic (PAM).
The hacker then had access to all of Uber’s services, DA, G Suite, and AWS.
Avoid giving one credential access to all of the solutions in your environment. By distributing the access, you force your attacker to work harder and waste time. Giving you more time to respond.
3 – Multi-Factor Authentication
When the hacker found the admin credentials, it was game over for Uber. He could now access anything in the company’s digital environment.
The hacker decided to take a look around. He went from application to application taking screenshots of the company’s data.
After looking around, the hacker announces himself to the company through Slack.
According to the hacker in a later report on why he targeted Uber, he said that it was for “fun”.
Lesson:
Note that the hacker was able to access all of Uber’s services with only a username and password. This is a massive security mishap.
By not implementing multi-factor authentication you allow hackers easier access to your application. Whenever possible, always put in place multi-factor authentication.
Nothing is as seemingly painful for a photographer than getting back from a long shoot only to realize that all the photos that you took are blurry. Adding salt to the wound, the photos that you were especially excited about are the worst.
We’ve all been there learned those hard lessons. But I would argue that this is not the worst thing ever, actually I would say that it’s a great thing! You want your photos to be sharp and be able to replicate that every time. This indicates that you have a need to strengthen your skills and knowledge as a photographer. With this list, soon you’ll be taking razor sharp photos.
If you are in a rush, check below for an overview of all the points in the list. Please feel free to jump around to each of the points as they pertain to you.
Solution overview
Slow Shutter Speed
Auto Focus (Single Point)
Caffeine / Too little Food
Image stabilization
Shutter Speed
One of the most common problems that new photographers run into while trying to take sharp photos is shutter speed. A slower shutter speed can cause shaking and image blur. While in certain cases image blur can be an extremely creative tool, however, if undesired it can be extremely unfortunate. A common rule of thumb is that if you are walking about and trying to freeze motion completely in your image 1/250 shutter speed is a great option.
If you are in a low-light scenario or need more light and can’t change your ISO and aperture then “really cutting it close” would be don’t go below the reciprocal of your focal length. An example is if you are using a 50mm lens try not to go below 1/50 shutter speed. That being said, keep in mind that even shooting at this shutter speed can be difficult.
Another common problem that many photographers run into when dealing with blurry photos is with focus. To save a lot of head ache and time, use auto focus (if available) rather than manual focus. Modern cameras are so good at focusing correctly that even the cameras themselves are able to see things that we can’t. Generally you can enable autofocus by switching the button from MF to AF on your camera lens.
Now, when you half press the shutter button your camera will automatically look for a point to focus on. As great as this is, if you do not indicate which specific point to focus, your camera might try to pull a different part of the image into focus. You can solve this by enabling single point auto focus. Single point auto focus will tell the camera exactly on which point you want to focus.
Photo By Digital Photography School
For the final step, you will need to choose what kind of autofocus you want the camera to use. As a quick overview, you will most likely use only two, One-shot and Continuous (also called AI Servo). Most of the time you will use one-shot. However, if you have a subject that is moving a lot and you want the camera to keep track of that subject then use continuous autofocus.
Photo By Canon.com
(Note) There are certain situations in which manual focus would be preferred like in astrophotography and atypical lighting. However for the majority of the time you can reliably use auto focus.
Food / Caffeine
This point might seem abnormal at first, but limiting your caffeine intake and having something to eat before you shoot can be just as effective. Even if you feel as though you have a high caffeine resistance, your hands can still be shaky from the caffeine. Similarly if you haven’t eaten much, your photo could be affected by hunger shakes.
You might be tempted to think “I could just increase my shutter speed to account for the hand shake.” and for the majority of the time you can. But you might find yourself in a situation where there’s not enough light to account for the shaking.
General tips, try to not intake caffeine within 4 hours of a shoot. Similarly try to pack a snack in your bag that can act as quick and easy calories to help stave off hunger shakes. I personally like to keep a couple bananas and a granola bar since they’re not messy and don’t leave a lot of residue on the fingers.
Image stabilization
For the last point I would like to touch briefly on in camera body and lens image stabilization. Most modern lenses and cameras have image stabilization that helps the photographer get sharp shots in less than ideal shooting situations. Uneven terrain, a strong gust of wind, and even a car horn honking can make you move just enough to make the image blurry.
Photo By Zack Sutton at LensRental.com/Blog
Some camera bodies and lenses can even work together to provide even better stabilization. Check with your users manual and online to see if you can utilize this feature. If not, try enabling the in camera body stabilization. For lenses, typically there is a switch on the side to toggle the stabilizer on and off. Once both are turned on, you will have stabilization from 2 different points.
Conclusion
If you apply all or even some of the points listed above your photos will not only dramatically increase in sharpness, but you will have greater control over the result of the image taken. While this list is not exhaustive, these are some of the things that have helped me with taking sharper images. Let me know in the comments what are some of things that has helped you take sharp photos!
You did it! You have finally decided to buy a DSLR/mirrorless camera. Everything is going great, you are taking amazing photos and you start to wonder where has this interest been your whole life.
Then you start to notice your photos, although amazing, don’t have the rich creamy bokeh that you see in other photos. On top of this, you start to feel a little disconnected from photo taking process. It doesn’t feel as exciting as when you started.
This feeling is normal and in fact, is a great thing! It means you have outgrown your kit lens and it’s time to invest in a prime lens.
Congratulations!
But what is a prime Lens?
Unlike a zoom lens, which has a variety of focal lengthens, a prime lens only has one. Yep, just one! This means that in order to get closer to the subject you would need to “zoom” with your feet. This can be quite jarring to photographers who are used to standing in one place and moving the focus ring to get closer. While at first, this might seem to limit, it can actually be quite beneficial.
Pros for Buying a Prime Lens
Budget Friendly
When deciding between choosing prime or zoom, your budget can be a huge factor. Quality zoom lenses are often a lot more expensive than buying a quality prime lenses.
An important question to ask yourself when deciding to buy a prime lens is, do I want/need multiple focal lengths that are good or one that is amazing? Answering this can help a lot with knowing what kind of lens you would need and potentially save you a lot of money.
Faster Aperture – Better in low light
Another pro, when buying a prime lens, is the ability to have a wider aperture. This means more light can enter the camera. Why does this matter? Being able to shoot in low-light settings without having to crank up the ISO can be for a lot of photographers a huge selling point. Less ISO generally means less noise in the photo, which often can be distracting for the viewer.
Because the camera can take in more light, a higher shutter speed can add more options to the photographer’s tool belt for creative expression.
My last point, if not the biggest reason to buy a prime lens, is that you will greatly improve your ability to take more engaging and powerful photos. Being reduced to a single focal length can be a bit of a challenge. But by being forced to one length you will have to move physically, which in turn will expand your ability to capture subjects in unique compositions that you wouldn’t have thought of initially. This is an incredibly important skill to have not only for beginners but also for advanced photographers who feel that they are stagnating in their creative development.
What Now?
By now you should be asking yourself, what kind of prime lens should I get? There are so many to choose from. There are however two focal lengthens that are fantastic go-to options. Primes are not only extremely versatile but affordable as well. These are the 50mm and the 35mm.
(Important Note)
When referring to focal lengths I am referring to these lengthens for a full-frame sensor. If you were to buy a 50mm camera that has an APS-C sensor you would instead have a length of ~75mm. When you are buying a prime lens make sure to take into account the sensor size of your camera. In this guide, we are using the full frame equivalent.
Which one should you buy?
For your convenience, I have compiled a list detailing some of the pros and cons of the 2 lenses.
35mm
Pros:
Closest length at which we naturally see
Provides a classic look that many photographers use
Whichever lens you should buy really comes down to what kind of photography you shoot the most. Do you like shooting portraits and need amazing bokeh for food photography, A 50mm would be a great option. Or, do you find yourself wanting to capture more of the scene and are able to shoot in less-than-ideal environments, A 35mm might work better for you.
But it all really comes down to you, yes you. You could have all the best gear in the world but still take less-than-average photos. The greatest photos that you think you’ve ever taken are probably memorable not because of what gear they used, but rather the story and felt it communicated to you.