Choosing the Right IoT Platform

Reading Time: 5 minutes

No doubt the Internet of Things needs no introduction here given how the latest big wrinkle in the application of World Wide Web-based technology has become so integrally involved in both our private and working lives. As it stands currently, working with IoT applies to some businesses more than others, but it’s fair to say that any of them that put a premium on customer accessibility and control will need to be adhering to IoT realities.

Here at 4GoodHosting, we’re a good Canadian web hosting provider like any other in that we prefer to keep our thumbs on the pulse of certain trends in the greater industry more so than others. IoT is definitely one of them, and it continues to be interesting to watch how it reaches further into our digital world every day. Consumers are going to expect more and more ‘smartness’ from their ‘things’ going forward, and businesses of course need to be receptive to that.

This makes choosing the right IoT platform a complex endeavor. The landscape can be confusing for IoT hobbyists, experienced developers, and senior executives alike. Today we’ll give you a quick overview of the IoT platform landscape and how you should evaluate IoT platforms based on your needs.

Defining an IoT Platform

Quite simply, an IoT platform is an integrated service offering what’s needed to bring physical objects online. Supporting millions of simultaneous device connections is the challenge, and your platform needs to allow you to configure your devices for optimized communication between machines. The consensus among developers is that it’s really quite difficult to build a well-functioning IoT product.

IoT Platform Types

End-to-end IoT Platforms

End-to-end IoT platforms provide hardware, software, connectivity, security, and device management tools to handle the massive numbers of concurrent device connections. They also provide all managed integrations needed, which can include OTA firmware updates, device management, cloud connection, cellular modem and more, all of which connect and monitor a fleet of devices online.

Connectivity Management Platforms

These platforms offer low-power and low-cost connectivity management solutions via Wi-Fi and cellular technologies. Connectivity hardware, cellular networks, and data routing features are all part of connectivity management platforms in IoT.

IoT Cloud Platforms

Cloud platforms are very beneficial, serving to get rid of the complexity of building your own complex network stack and offering backend and other services to monitor and track millions of device connections that are occurring simultaneously.

Data Platform

As you’d imagine, every type of IoT platform deals with data in some way. IoT data platforms serve the function of combining many of the tools you need to manage / visualize data analytics and them route them as needed.

IoT Platform Verticals

Placing these IoT platforms into categories is really being too simple with them. The breadth of functionality for each makes it so that they don’t fit into a single category. The most logical way of looking at them is what they offer for different interests and related users:

Hobbyists / Prototyping Solutions / Utilities / Live Search (A.I.) Applications / Development Kits / DIY solutions / Consumer Electronics / Home automation / Wearables / Industrial IoT (IIoT) Solutions / Smart factory warehousing applications / Predictive and remote maintenance / Industrial security systems / Asset tracking and smart logistics/ Transportation monitoring / Energy optimization / Connected logistics / Agriculture Industry / Healthcare Industry / Energy Industry / Smart Cities

What to Look for When Examining Platforms

It’s definitely helpful to know what you should be looking for, based on your intended solution:

  1. Connectivity

How effectively is the vendor’s network coverage fitting your business’ current and future initiatives?

  1. Method of Connectivity

What type of connectivity is needed? Will a Wi-Fi or cellular solution be best for your IoT product? Assess these needs and then determine how the vendor can address them.

  1. Market Longevity

Looking at how long the IoT platform been in business is helpful. The space itself is relatively new, but building has occurred quickly and a lot can and will change in a very short period of time. Aim to find an IoT platform that has been offering services for 4+ years at a minimum.

  1. Type of Service

How does the IoT platform describe and sell themselves? Some will be purely connectivity platforms, some will be end-to-end solutions that offer hardware and software to go along with connectivity. How one will suit you best comes about after assessing your business needs. How will they change over time?

  1. Geographic Coverage

Is an embedded sim with global support provided? Is this IoT platform one that covers the regions your business needs? Looking over all aspects of your global reach needs should be part of the consideration as well.

  1. Data Plan

Is a fair data plan included with the platform? The ability to pause or suspend your data services at any time and the ability to control how much data that is used should be on your checklist.

  1. Security / Privacy

Look into the platform and specifically how they’ve dealt with security and privacy issues and reviewed their security content as needed to date. Evaluate how their platform combats security issues frees you from having to do that yourself.

  1. Managed Integrations / API Access

How does the vendor integrate every complexity required for the IoT connectivity you’re after – cellular modems, carrier / sim cards, device diagnostics, firmware updates, cloud connections, security, application layer, RTOS. The best ones will consolidate all into a simple package that works out to very little of it ending up on your plate.

  1. Data Access

How easy does it look to be to take the data acquired through the IoT platform and then integrate it with your enterprise back ends and current cloud service? How will this data then be used? Does the service match those needs?

  1. IoT Ecosystem

The relationships between the services the IoT platform offers should be clearly understood. This will help you learn how their services can be of assistance in helping you build your product

  1. IoT Roadmap

The expansion of IoT platforms is going to continue ahead at full steam. Does this IoT platform’s roadmap match your organization’s needs, and will expansions into connectivity, data, and hardware be helpful for you?

  1. OTA Firmware Updates

How does the vendor allow you to send updates and fix bugs on your devices remotely? It is a simple process, or a complex one. Obviously, simpler is far preferable.

Good Ones

  • Particle — Particle is an enterprise IoT platform that’s ideal for building an IoT product, from Device to Cloud.
  • Salesforce IoT — Maximizes your business efforts with IoT cloud services.
  • Microsoft IoT Azure — Very popular, and enhances operational productivity and profitability by means of a preconfigured connected factory solution.
  • Artik Cloud — The ARTIK IoT platform is ideal for IoT open data exchange
  • Google Cloud’s IoT Platform — integrated services that get high marks from end users and allow you to easily and securely connect, manage, and internalize IoT data
  • IBM Watson IoT — IBM’s new Watson Internet of Things (IoT) is a cognitive system that picks up on AI and then practicalizes it for use within IoT functionality.
  • Xively Platform — an enterprise IoT platform to help accelerate your connected product or service.

These are just a few of many that seem well-received by developers.

Major Security Hack Means It’s Time to Update or Re-Install WhatsApp

Reading Time: 3 minutes

WhatsApp is one of the most ubiquitous and popular instant messenger apps these days, and it’s fair to say that there’s likely hundreds of thousands of people who have it installed on their smartphone and make frequent use of it. Well, no one’s about to tell you should stop doing so if you’re one of them, but it turns out that you may want to update it manually now – or perhaps even better delete and re-install it – due to recent developments that have just now gotten out into the media.

Part of being a good Canadian web hosting provider is giving clients a heads up on such developments, and that describes 4GoodHosting to a tee if we may say so ourselves. Often times these sorts of things aren’t quite ‘newsworthy’ in that sense, but again considering how common WhatsApp is these days we decided to make it our topic for the week.

Right then. So, despite encrypting every conversation and following best security practices, WhatsApp (which is owned by Facebook for those of you who care about those things) it seems has been the victim of a cyber attack.

It recently announced that it found a vulnerability that was allowing shady types to infect WhatsApp users with spyware when they made – or even attempted to make – a call using the app.

No Answer – No Problem

Now most people aren’t ones to take notes of character and number chains, but it would seem this this WhatsApp vulnerability is going by CVE-2019-3568. What makes it especially noteworthy is that it allows attackers to infect the device, and have success doing so even if the user at the other end receiving the call didn’t answer it.

The means by which these nefarious individuals did this was by exploiting a buffer overflow weakness in the app, one that enables them to hack into WhatsApp before doing the same on the device running the app.

When asked about it, the security team at WhatsApp chose to refer to it as an ‘advanced cyber actor’ – a rare but very dangerous type of cyberattack. It is different from other malware attacks that are done with the more standard ‘phishing’ approaches. If it were of a more ordinary version of this type, the phishing nature of it would mean that the individual on the other end would need to answer the call in order for the infection to be complete.

As mentioned, however, attackers can use spyware to exploit the devices – even if the users don’t receive the call.

Right, onto the potential repercussions of any such attack. They can result in cybercriminals gaining access to personal data stored on the phone. Further, it could allow them to modify things or lock the mobile before demanding a ransom from the users.

If you’re reading this and you’ve yet to receive any ransom notes for a unexplainably locked device or any other similar red flag, you’re likely okay but you should go ahead and delete and reinstall WhatsApp. Interestingly enough, I just got a new Android phone the other day and so I was installing WhatsApp quite literally at the same time I was reading this news. So unless you’re in a similar scenario, you should definitely be looking for an available update at the very least (and make sure it’s a very recent one)

These WhatsApp versions were vulnerable to the spyware attack:

  • WhatsApp for Android prior to v2.19.134
  • WhatsApp Business for Android prior to v2.19.44
  • WhatsApp for Windows Phone prior to v2.18.348
  • WhatsApp for iOS prior to v2.19.51
  • WhatsApp Business for iOS prior to v2.19.51
  • WhatsApp for Tizen prior to v2.18.15

Go Get ‘Em

It’s been reported that WhatsApp responded to the attack without delay and said the only became aware of the vulnerability some time earlier this month. Within 10 days of realizing the breach, WhatsApp released a server-side fix to mitigate the attack. It’s understood, however, that many WhatsApp users were already potentially exposed to the attack before the fix was issued.

In addition, WhatsApp is also releasing an update to the mobile app as of today (Monday, May 20th) that should help squash similar cyber attacks for the foreseeable future. Along with the patch they have asked all users to update the app to the latest version while also ensuring their operating system is equally as updated.

Off you go and update your WhatsApp if it’s part of the indispensable array of apps you use on your device day in and out.

5 Ways to Speed Up Your PC Running Windows 10

Reading Time: 5 minutes

One of the unfortunate realities for human beings is that as we get older, it’s not as easy for us to perform athletically like we once did. When we’re on the right side of 30 it’s not too challenging to run fast, jump high, and turn on a dime. The 30s are a bit of a transition, and once the 40s arrive it’s pretty clear we’re past our prime. Computers slow down as they age too, but that’s a situation that is remedied a lot more easily.

You can take your OS back to it’s virtual 20s quite straightforwardly if you know what to do. That’ll be the topic of discussion here today, and for the world’s most common OS specifically – Windows 10. Here at 4GoodHosting, we’re a good Canadian web hosting provider like any other in that we can relate to how it’s frustrating to have to deal with a device – desktop, tablet, smartphone – that’s more putt-putt than vroom-vroom. What we’ve put together here today is 5 ways to speed up your PC running Windows 10, and they’re all fairly easy to implement.

  1. Change your power settings

Those of you using Windows 10’s Power saver plan should be aware that you’re actually slowing down your PC. It reduces your PC’s performance in order to save energy (most desktop PCs will usually have a Power saver plan of some sort). Switching your power plan from Power Saver to High Performance or Balanced will provide you with an instant performance boost.

Here’s how to do it in Windows 10;

  • Launch Control Panel, then select Hardware and Sound > Power Options

You’ll then see two options: Balanced (recommended) and Power Saver. (Certain makes and models will have other plans here as well, including manufacturer-branded ones with some.) Clicking the down arrow will show any additional plans that are options to the High Power setting.

To change your power setting, simply choose the one you want, then leave then the Control Panel. High performance will provide the most oomph, but as you’d expect it uses the most power; Balanced finds a nice medium between power use and better performance; Power saver scales everything back for as much battery life as possible. Desktop users will of course have no reason to choose Power saver. The balanced option is a good choice for Laptop users when unplugged, and then moving to high performance when enjoying a power source.

  1. Disable Programs Running on Startup

Another cause for your Windows 10 PC being slow and sluggish is that you’ve got too many programs running in the background. Often these are programs that most people never use, or only very rarely. Prevent them from launching and running on start-up can free up your PC’s engine quite effectively. Here’s how to get at them:

  • Launch Task Manager / Press Ctrl-Shift-Esc or right-click the lower right corner of your screen and select Task Manager

A different scenario may be that Task Manager launches as a compact app with no tabs, and if so you can then click “More details” at the bottom of the screen. The Task Manager should then be made accessible.

Now click the Startup tab. You’ll be provided with a list of the programs and services that launch when you Windows starts. Each program’s name as well as its publisher will be listed, and it will indicate whether the program or services is enabled to run on start-up. More importantly, you’ll also be shown its ‘start-up impact’ – how much it slows down your OS. Very valuable info here and really lets you be judicious about what stays and what goes.

So to stop a program or service from launching at start-up, you simply right-click it and select ‘Disable’. This doesn’t disable the program entirely, rather it only will prevent it from launching at start-up. You’re still able to manually run the application after launch anytime you like. Further, you can follow the same steps and reenable it any time you like.

  1. Shut Down Windows Tips and Tricks

While you’re using your Windows 10 PC normally, Windows tracks what you’re doing and offers tips about steps you might want to take with the operating system based on your usage patterns. Most people don’t find these tips helpful, and research has indicated that the vast majority of users ignore them. So it’s pretty safe to say they’re likely not going to be helpful for you either.

Fortunately, you can tell Windows to stop giving you advice. Here’s how:

  • Click Start button / Select the Settings icon / Go to System > Notifications & Actions / Scroll down to the Notifications section and turn off ‘Get tips, tricks, and suggestions as you use Windows’

Simple as that, and more resources dedicated to where you want them to be.

  1. Stop OneDrive from Synching

Microsoft’s cloud-based OneDrive file storage is built into Windows 10, and it serves to keep files synched and up-to-date on all of your PCs. It’s also a useful backup tool that will keep files intact if your PC or its hard disk fails. You’ll still have to restore those files, but you can know they’ll be there. If that’s not something that’s a priority for you, then you likely can really speed up your OS by turning off this function. You’ll want to be certain of that before you disable it, and this is how you can do that:

  • Right-click the OneDrive icon in the notification area on the right side of the taskbar / Choose ‘pause syncing’ from the popup screen that appears and select either 2 hours, 8 hours or 24 hours

You’ll now have a chance to evaluate whether you’re seeing a noticeable boost in your computer’s operating speeds. If that’s the case, and you decide you do wish to turn off synching, this is the next step

  • Right-click the OneDrive icon / select Setting > Account / Click ‘Unlink this PC’ / From the screen that appears, click ‘Unlink account’

You’ll now still be able to save your files to your local OneDrive folder, but it won’t synch with the cloud.

  1. Turn Off Search Indexing

Windows 10 indexes your hard disk in the background, and this lets you search your PC more speedily than you’d be able to if no indexing were being done. Slower PCs that use indexing inevitably experience a decline in performance. It’s possible to give them a speed boost by turning off indexing. This is true even if you have an SSD disk, and turning off indexing can improve speeds in these instances as well. The constant writing to disk that indexing does will even slow down SSDs over time.

To gain maximum benefit in Windows 10, turning off indexing off entirely is highly recommended. Doing it is fairly simple:

  • Type index in the Start Menu search box / Click the Indexing Options result that appears / Once Indexing Options page of Control Panel appears, click the Modify button / From the list of locations being indexed, you can now uncheck the boxes next to any location to make it so that it will no longer be indexed.

Searches may be slightly slower after this, but for most users the difference will be negligible. You should get a nice overall performance boost once you put a stop to search indexing.

These are just a few of the many ways to increase the overall speed of your Windows 10 PC, and a quick Google search should be all that’s necessary for you to find much more information on this subject.

Protecting a VPN From Data Leaks

Reading Time: 5 minutes

One thing that certainly hasn’t changed from previous years as we move towards the quarter pole for 2019 is that hackers are keeping IT security teams on their toes as much as ever. That shouldn’t come as much of a surprise given the cat and mouse game that’s been going on in cyberspace between the two sides for a long time now. Cyber threats are as sophisticated as ever now, and for everyday individuals they biggest concern is always that the privacy of sensitive data will be compromised.

One of the most common responses to enhanced and more enabled threats is to go with a Virtual Private Network and all the enhanced security features that come with them. Here at 4GoodHosting, we’ve been promoting them for our customers very actively in likely what same way every other Canadian web hosting provider has. There’s merit to the suggestion, as VPN connections protect online privacy by creating a secure tunnel between the client – who is typically uses a personal computing device to connect to the internet – and the Internet.

Nowadays, however, VPN networks aren’t as automatic as they were when it comes to trusting in secure connections and understanding that there won’t be data leaks. The good news is that even people with the most average levels of digital understanding can be proactive in protecting their VPN from data leaks. Let’s look at how that’d done here today.

Workings of VPN

A reliable VPN connection disguises the user’s geographical location by giving it a different IP address. There is also architecture in place to encrypt data transmitted during sessions and provide a form of anonymous browsing. As it is with almost all internet tools, however, VPN connections can also face certain vulnerabilities that weaken their reliability. Data leaks are a concern amongst information security researchers who focus on VPN technology, and it’s these issues that are most commonly front and centre among them:

  1. WebRTC Leaks

Web Real-Time Communication (WebRTC) is an evolution of the VOIP (Voice over Internet Protocol) for online communications. VoIP is the technology behind popular mobile apps such as Skype and WhatsAppp, and it’s been the leading force behind making legacy PBX telephone systems at many businesses entirely obsolete now.

WebRTC is also extremely valuable with the way that it allows companies to hire the best personnel. Applicants can be directed to a website for online job interviews with no need for Skype or anything similar installed.

Everything would be perfect, except for the fact that the IP addresses of users can be leaked, and even through a VPN connection.

  1. DNS Hijacking

It’s fair to say that hijacking domain name system (DNS) servers is one of the most tried-and-true hacking strategies, and interestingly a large portion of that has been made possible by well-intentioned efforts to enact internet censorship. The biggest DNS hijacking operation on the planet is conducted by Chinese telecom regulators through the Great Firewall, put in place with the aim of restricting access to certain websites and internet services.

DNS hijacking encompasses a series of attacks on DNS servers, but arguably the most common one involves taking over a router, server or even an internet connection with the aim of redirecting traffic. By doing so hackers are able to impersonate websites; your intention was to check CBC News, but instead you’ll be directed to a page that may resemble it but actual uses code to steal passwords, compromise your identity, or leave you with malware on your device.

Often times WebRTC and DNS hijacking are working in conjunction with each other: a malware attack known as DNS changer that can be injected into a system by means of JavaScript execution followed by a WebRTC call that you’re unaware of. Done successfully, it can gain your IP address.

Other lesser-known vulnerabilities associated with VPN networks are Public IP address, torrents, and geolocation

How to Test for Leaks

It might be best to cut right to chase here sort of – The easiest way to determine if you’ve got a leak is to visit IPLeak.net, and do it with your VPN turned off. This site is a very nice resource. Once you’ve visited, then leave seat and turn your VPN back on before repeating the test.

Then, you compare results.

The torrents and geolocation tests available are fairly worthwhile themselves, but probably not as much of a factor indicator as the DNS. Navigating the internet is done by your device communicating with DNS servers that translate web URLs into numeric IP addresses. In the bulk of those instances, you’ll have defaulted through your ISP servers, and unfortunately these servers tend to be very leaky on their own to begin with.

Leakage through your local servers can serve up your physical location to those with bad intentions, even with a VPN set up and utilized. VPN services route their customers through servers separate from their ISP in an effort to counter these actions.

Once you determine your data is leaking, what is there you can do to stop it? Read on.

Preventing Leaks and Choosing the Right VPN

A good suggestion is to disable WebRTC in your browser, and doing so even before installing a VPN solution. Some developers have set this to be a default configuration, while most better ones will have this is an enabled option.

Search ‘WebRTC’ in the help file of your browser and you may be able to find instructions on how to modify the flags or .config file. Do so with caution, however, and don’t take actions until you’re 100% certain they’re the correct ones or you may risk creating quite a mess for yourself.

Other good preventative measures include:

  • Going with the servers suggested when configuring your VPN – typically not those of your Internet service provider (ISP) but ones maintained by the VPN provider. Not all of them have them, though
  • Aiming to have a VPN that has upgraded protocols making it compatible with the new IPv6 address naming system. Without one, you’ll have a much greater risk of leaks. If you’re about to move to a VPN, this should be one of your primary determinations
  • Making sure your VPN uses the newest version of the OpenVPN protocol, and especially if you’re on a Windows 10 OS device (it has a very problematic default setting where the fastest DNS servers is chosen automatically. OpenVPN prevents this)

Overall, the security of tunneled connections is going to be compromised big time by a leaky VPN. If the security of your data is a priority for you, then you should be evaluating VPN products, reading their guides and learning about best ways to secure your system against accidental leaks.

Keep in mind as well this isn’t a ‘set it and forget it’ scenario either. You need to check for leakage from time to time to ensure nothing has changed with your system. Last but not least, make sure the VPN you use has a kill-switch feature that will cut off your connection immediately if a data leak is detected.

New Epic Quickly Becoming Browser Of-Choice for Those Big on Privacy

Reading Time: 4 minutes

Things change quickly in the digital world, and what was barely even on the radar can become a front and centre issue overnight in some cases. Go back 10 years and the issue of privacy in web browsing wasn’t something the vast majority of people paid even the slightest bit of attention to. Nowadays, however, it’s definitely a hot-button topic given all the news that’s come out about web browsing histories and the like being tracked, monitored, and then made available to whoever doesn’t mind paying for information about what people like YOU search for online.

Some people don’t have a problem with that. Other people have quite a significant problem with that. If you’re part of the second group there then you may have already switched over to using a web browser like DuckDuckGo or something similar. It’s a fine privacy-promoting web browser in itself, but it’s a bit of a generalist in that it works suitably well across the board but not especially well for any one framework.

And that’s where and why Epic coming onto the scene is as noteworthy as it is. It is a Chromium-based browser designed to ensure privacy without giving up anything i speed or functionality. It blocks ads as well as prevents user tracking, and also includes built-in protection against a wide range of surveillance methods cryptocurrency mining scripts among them.

It promises to be just what the Doctor ordered for those who think these types of overwatch activities are unacceptable, and here at 4GoodHosting we’re like any other quality Canadian web hosting provider in that we agree with you wholeheartedly. Let’s take a look at what makes this new no-tracking web browser such a good fit and why it promises to be especially well received.

Surfers 1 / Watchers 0

It’s fair to say that it’s really a shame that the innocence and carefreeness of using the world wide web to gain information is gone now, and that government agencies, corporations, and malicious hackers lurking in the shadows and taking notes is entirely unacceptable. Even those who aren’t overly incensed at having their privacy violated will almost certainly choose to stay ‘incognito’ if the opportunity to do so exists.

Epic’s creator, Alok Bhardwaj, attributes much of his need to build such a resource on coming to understand that on average, there are some 10 or so trackers on pretty much every website you visit. For some still, there’s up to 30 or 40 companies that are logging your visit.

Fortunately, his new Epic browser includes built-in protection against a wide range of surveillance tactics, and without any of the BS like what was seen in 2015 in the States with AT&T’s policy where subscribers had to pay up to 50% more to secure a reasonable level of privacy.

The original version of Epic has been around since August of 2018, but the Chromium-based version of it is still new to the scene. It allows users to enjoy private browsing without sacrificing speed or functionality, and also blocks ultrasound signal tracking and cryptocurrency mining scripts. Plus, with a new mobile browser on the way, Epic continues to take actions that support the company’s belief in a free internet.

 

Sight for Sore Eyes: Privacy-Focused Web Browser

U.S. President Donald Trump’s 2017 decision to cann internet privacy rules as passed by the Federal Communications Commission in the previous year put an effective end to internet users having more rights concerning what service providers can do with their data. Here in Canada we certainly haven’t been immune to the increasingly grey areas of what can and can’t be done as far as monitoring a web browser user’s history.

Likely no one needs convincing that relying on governmental agencies to solve data privacy issues will likely result in little if anything being done. So we’re left to take matters into our hands as much as we can. Good news on that front, as Epic is an exceptionally private browsing experience that’s also fast and intuitive and based on Google’s open-source Chromium project for long-term practicality in the bigger picture of things.

That perspective was very important in the development of this new browser, according to Bhardwaj. Microsoft announced that the company would build their next browser on Chromium, and so the decision was made to build a browsing experience that’s very private, but just as fast as using Google Chrome.

Mission Accomplished

We’d say it is – Epic is one of the most simple, private, and fast browsers on the market today, and it’s really raised the bar that was set by the original private browser, Tor. (which is still a great browser FWIW, still doing very well and also offers an extremely anonymous service)

One area where Epic meets a need that Tor can’t, however, is with malicious cryptocurrency activities. Hackers have used Tor to steal cryptocurrency from users, and fairly recently too.

Long story short, Epic is the only private browser out there that just works out of the box with a high level of privacy and speed, and it doesn’t have any of the issues where advanced security protocols render certain website undeliverable. In the event that one won’t, Epic lets you turn off the proxy and ad blocking feature for a particular website if needed.

Other appealing features:

  • Free VPN
  • 1-click encrypted proxy
  • Blocks fingerprinting and ultrasound signaling
  • Locally stored database of the top 10,000 websites in the world

Coming to Mobile Soon

Epic is expected to launch the company’s mobile browser before long. They expect their mobile browsers to be even more significant than the desktop browsers, given the scale that mobile’s going to operate on. With the extent to which most of us use our smartphones for internet search queries, there’s no doubt that this mobile browser release will put Epic even more in the spotlight in the near future.

5G Networks: What to Expect

Reading Time: 5 minutes

We don’t know about you, but for those of us here it doesn’t seem like it was that long ago that 3G Internet speeds were being revelled in as the latest and greatest. Things obviously change fast, as 3G has been in the rear view mirror for a long time now, and the reality is that the newest latest and greatest – 4G – is about to join it there.

Here at 4GoodHosting, the fact we’re a leading Canadian web host makes us as keen to learn more about what the new 5G networks have in store for us as anyone else who’s in the digital space day in and out. It appears that we’re in for quite a treat, although there are some who suggest tempering expectations. That’s to be expected anytime wholesale changes to infrastructure key to big-picture operations are forthcoming.

Nonetheless, we’re supposed to be immersed in the 5G world before the end of next year. Mobile 5G is expected to start making appearances in cities around North America this year, with much more extensive rollouts expected in 2020 so a discussion of what we can all expect from 5G is definitely in order. Let’s do it.

What is 5G, and How’s It Going to Work?

To cut right to it, 5G is the next generation of mobile broadband that will augment 4G LTE connections for now before eventually replacing them. 5G is promising to deliver exponentially faster download and upload speeds along with drastically reduced latency – the time it takes devices to communicate with each other across wireless networks. Right, that alone is worthy of some serious fanfare, but fortunately there’s even more to this.

But before getting into additional benefits expected to be seen with 5G networks, let’s have a look at what makes them different from 4G ones and how exactly these new super networks are predicted to function.

Spectrum-Specific Band Function

It’s important to start with an understanding of the fact that unlike LTE, 5G is going to operate on three different spectrum brands. The lowest one will be the sub-1GHz spectrum bands like GSMA / ITU. They are what’s known as low-band spectrums, and they’re the ones used for LTE by most carriers in North America. This spectrum is quite literally running out of steam, so it’s ready to be replaced. It does provide great area coverage and signal penetration but peak data speeds never exceed 100Mbps and often you’re not even anywhere close to that even.

Mid-band spectrums provides faster coverage and lower latency but the long-standing complaint related to them is that they fail to penetrate buildings and peak speeds top out at around 1GB

High-band spectrums (aka mmWave) are what most people think of when they think of 5G, and high-band spectrums can offer peak speeds up to 10 Gbps along with impressively low latency most of the time. The major drawback here though? It has low coverage area and building penetration is poor.

It appears that most carriers are going to start out by piggybacking 5G on top of their 4G LTE networks to start, and then nationwide 5G-exclusive networks will be built. Providers are very aware that small cells are going to required so that these suped-up 4G LTE networks don’t have their 5G appeal diminished with poor penetration rates and intermittently average download speeds.

In this regard, we all stand to benefit from the industry being cautious about not rolling out 5G on its own and then having growing pains with these networks.

Right, some people may not be familiar with small cells. They’re low-power base stations that cover small geographic areas that allow carriers using mmWave for 5G to offer better overall coverage area. Beamforming will be used to improve 5G service on the mid-band by sending a single focused signal to each and every user in the cell, while systems using it monitor each user to make sure they have a consistent signal.

Latency promises to be nearly if not entirely non-existent between the small cells and beamforming within 5-G enabled 4G LTE networks.

Examples of How 5G SHOULD Make Things Better

  1. Improved broadband

The reality today is that carriers are running out of LTE capacity in many major metropolitan areas. In some spots, users are already experiencing noticeable slowdowns during busy times of day. 5G will add huge amounts of spectrum in bands that have not been dedicated for commercial broadband traffic.

  1. Autonomous vehicles

Uber may have a devil of a time getting footed in Vancouver, but you can likely expect to see autonomous vehicles made possible with ubiquitous 5G deployment. The belief is that it will make it possible for your vehicle to communicate with other vehicles on the road, provide information to other vehicles regarding road conditions, and share performance information with both drivers and automakers.

This applications has a TON of promise, and it’s definitely one to keep an eye on.

  1. Public Infrastructure & Safety

It’s also predicated that 5G will allow cities and other municipalities to operate with greater efficiency. All sorts of civic maintenance process will be made more efficient by means of 5G networks.

  1. Remote Device Control

The remarkably low levels of latency expected with 5G make it so that remote control of heavy machinery may become possible. This means fewer actual people in hazardous environments, and it will also allow technicians with specialized skills to control machinery from any location around the globe.

  1. Health Care

5G and its super low latency may also be huge for health care applications. Since URLLC reduces 5G latency even further than what you’ll see with enhanced mobile broadband, we may see big improvements in telemedicine, remote recovery and physical therapy via AR, precision surgery, and even remote surgery in the very near future once 5G becomes the norm.

One of the most beneficial potential advances that may come with 5G as it concerns healthcare is that hospitals may be able to create massive sensor networks to monitor patients, allow physicians to prescribe smart pills to track compliance, and let insurers monitor subscribers to determine appropriate treatments and processes.

  1. IoT

Last but certainly not least is the way 5G will benefit the Internet of Things. As it is now, sensors that can communicate with each other tend to require a lot of resources and really drain LTE data capacity.

With 5G and it’s fast speeds and low latencies, the IoT will be powered by communications among sensors and smart devices. These devices will require fewer resources than ones that are currently in use, and there’s huge efficiencies to be had with connecting to a single base station.

It’s interesting to think that one day 5G will probably be as long-gone and forgotten as 3G is now, despite the fanfare we all gave it many years ago. You can’t stop progress in the digital world, and it’s fair to say that 99% of us wouldn’t want to even if we could.

 

Getting Ready for Wi-Fi 6: What to Expect

Reading Time: 5 minutes

Most people aren’t any more familiar with Wi-Fi beyond understanding that it means a wireless internet connection. Those same people won’t be aware that in the last near decade the digital world has moved from Wi-Fi 4 to to Wi-Fi 5, and now Wi-Fi 5 is set to be replaced by Wi-Fi 6. What’s to be made of all of this for the average person who only knows that the wi-fi networks in their home and office are essential parts of their connected day-to-day, and that the wi-fi in Starbucks is pretty darn convenient as well.

The numeric chain that identifies a Wi-Fi standard is something they may well recognize though. 802.11 is the standard, but the Wi-Fi 4 you had from 2009 to 2014 is different from the same 802.11 standard you’ve had with Wi-Fi 5 since then till now. What’s to come later this year with Wi-Fi 6 will be a different 802.11. Right, we get you – what’s the difference exactly.

Here at 4GoodHosting, we’re like any quality Canadian web hosting provider in that the nature of our work and interests makes it so that we pick up on these things, if for no other reason than we’re exposed to and working with them on a regular basis. Much of the time these little particulars related to computing, web hosting, and digital connectivity aren’t worth discussing in great detail.

However, because Wi-Fi is such an essential and much-appreciated resource for all of us we thought we’d look at the ‘new’ Wi-Fi set to arrive later this year here today.

Wi-Fi 6: Problem Solver

When we look at ‘802.11ac’, the average person won’t get the significance of that. The fact is, however, they should and what Wi-Fi 6 is being designed to be is a solution to that problem.

What we’re going to see is the beginning of generational Wi-Fi labels.

Let’s make you aware that there is a collective body known as the Wi-Fi Alliance. They are in charge of deciding, developing, and designating Wi-Fi standards. We are all aware of how devices are becoming more complex and internet connections evolve, and when they do the process of delivering wireless connections also changes.

As a results, Wi-Fi standards — the technical specifications that manufacturers establish to create Wi-Fi — need to be updated from time to time so that new technology can flourish and compatibility extends to the near entirety of devices out there.

As mentioned though, the naming of Wi-Fi standards is totally foreign to the average person if they ever try to figure what that numeric 802-something chain stands for. The Wi-Fi Alliance’s response to this is now to simply refer to the number of the generation. Not only will this apply to the upcoming Wi-Fi 6, but will also be retroactive and thus apply to older standards. For example:

802.11n (2009) – Wi-Fi 4

802.11ac (2014) – Wi-Fi 5

802.11ax (expected late 2019) – Wi-Fi 6

It’s easier to see how this is a better classification approach, but there’s likely going to be a a period of confusion where some products are labeled with the old code and some are just called Wi-Fi 4 or Wi-Fi 5 when they’re functionally interchangeable in as far as ‘type’ is concerned. Eventually, however, this should be resolved as older product labeling is phased out and everyone – or most people at least – become familiar with the new Wi-Fi classifications. In all honesty, for most people if you just pay even the slightest amount of attention you’ll begin to notice the difference without having to put much thought into it.

How Wi-Fi 6 Will Be Different – And Better

The biggest impetus to create Wi-Fi 6 was to better accommodate all the many new Wi-Fi technologies that have been emerging. Wi-Fi 6 helps standardize them. Here’s the most relevant developments, and exactly what they should mean for your wireless network.

Lower Latency

Lower latency is a BIG plus that’s going to come with Wi-Fi 6, and you’ll probably notice it right quick. Reduced latency means shorter or no delay times as data is sent – which is very similar to ping rate and other such measurements. Low latency connections improve load times and prevents disconnects and other issues more effectively. Wi-Fi 6 lowers latency compared to older Wi-Fi standards, and it does so using more advanced technology like OFDMA (orthogonal frequency division multiple access). Long story short, it’s going to pack data into a signal much more completely and reliably.

Speed

Wi-Fi 6 will also be faster, and considerably faster compared to Wi-Fi 5. By offering full support for technologies like MU-MIMO, connection quality will improve for compatible mobile devices in a big way, and content delivery should be sped up accordingly. These improvements won’t be as relative to Internet speed as you might think too. They can and likely will improve the speed of your Wi-Fi data and let your receive more information, more quickly.

Now a question we imagine will come up for most of you – will all routers be able to work with the new 802.11ax standard? No, they won’t. If your router is especially dated, you should happily accept the fact it’s time to get a newer model. It will be 100% worth it, don’t have any doubts about that.

Wi-Fi 6 is also going to mean fewer dead zones, as a result of expanded beamforming capabilities being built into it. ‘Beamforming’, you say? That’s the name for the trick your router uses to focus signals on a particular device, and that’s quite important if the device is having difficulty working with a connection. The new WiFi 6 802.11ax standard expands the range of beamforming and improves its capabilities. Long story short again, ‘dead zones’ in your home are going to be MUCH less likely.

Improved Battery Life

Wi-Fi 6 is going to mean better battery life, and we’ll go right ahead and assume that’s going to be most appealing for a lot of you who are away from home for long periods of the day and taking advantage of Wi-Fi connectivity fairly often throughout.

One of the new technologies that Wi-Fi 6 is set up to work with is called ‘TWT’, or target wake time. It assists connected device with customizing when and how they ‘wake up’ for the purpose of receiving data signals from Wi-Fi. Devices are able to ‘sleep’ while waiting for the next necessary Wi-Fi transmission and battery drain is reduced as a result. Your phone does not sleep at all itself, only the parts of it that are operating with Wi-Fi.

Everybody will like the idea of more battery life and less time spent plugging in to recharge.

Keep an Eye Out for the Wi-Fi 6 Label

How will you know if a router, phone or other device works with the new 802.11ax standard? Simply look for the phrase ‘Wi-Fi 6’ on packaging, advertisements, labels or elsewhere. Look up the brand and model # online if for some reason you don’t see it on the packaging. The Wi-Fi Alliance has also suggested using icons to show the Wi-Fi generation. These icons appear as Wi-Fi signals with a circled number within the signal.

Identifying these icons should help you pick out the right device. If not, you can of course always ask the person behind the till and they should be knowledgable regarding this (if they work there you’d have to assume they would be).

Keep in mind that most of the devices around 2020 and later are expected to be Wi-Fi 6, and so we’ll have to wait a year or so before they start to populate the market.

 

Chromium Manifest V3 Updates May Disable Ad Blockers

Reading Time: 4 minutes

It’s likely that a good many of you are among the thousands upon thousands of people who have an Ad Blocker installed for your web browsers of choice. Some people do use them simply to avoid the nuisance of having to watch ad after ad, and it’s people like these that have necessitated some sites to insist that you ‘whitelist’ them in order to proceed into the website they want to visit. That’s perfectly understandable, as those paying advertisers are the way the website generates income for the individual or business.

For others, however, we spend a great deal of our working day researching and referencing online, and having to watch ads before getting to the content we need in order to do our work. For us, an ad blocker is much more of a tool of necessity rather than convenience. Still, we get caught up in more than a few sites that will insist on being whitelisted too. For me, my ad blocker is a godsend and I don’t whitelist any website or disable my ad blocker for any of them.

Here at 4GoodHosting, part of what makes us a good Canadian web hosting provider is having built up an insight into what really matters to our customers. The bulk of them are people who use the Information Superhighway as a production resource rather than web ‘surfers’ for whom it’s more of an entertainment one. That’s why today’s news is some that’s sure to be very relevant for most of our customers.

Weakened WebRequest APIs

Some of you may not know how your ad blocker works, and that’s perfectly normal. As long as it does its job, you don’t really need to know. Chromium is Google’s newest all-powerful web browser, and just like Chrome did you can expect it to soon become nearly ubiquitous as most people’s web browser of-choice.

However, Chromium developers in the last few weeks have shared that among the updates they are planning to do in Manifest V3 is one that will restrict the blocking version of the webRequest API. The alternative they’re introducing is called declrativeNetRequest API.

After becoming aware of it, many ad blocker developers expressed their belief that the introduction of the declarativeNetRequest API will mean many already existing ad blockers won’t be ‘blocking’ much of anything anymore.

One industry expert stated on the subject, “If this limited declarativeNetRequest API ends up being the only way content blockers can accomplish their duty, this essentially means that two existing and popular content blockers like uBO and uMatrix will cease to be functional.”

What is the Manifest V3 Version?

It’s basically a mechanism through which specific capabilities can be restricted to a certain class of extensions. These restrictions are indicated in the form of either a minimum, or maximum, version.

Why the Update?

Currently, the webRequest API allows extensions to intercept requests and then modify, redirect, or block them. The basic flow of handling a request using this API is as follows,

  • Chromium receives the request / queries the extension / receives the result

However, in Manifest V3 the use of this API will have its blocking form limited quite significantly. The non-blocking form of the API that permits extensions to observer network requests for modifying, redirecting, or blocking them will not be discouraged. In addition, the limitations they are going to put in the webRequest API have yet to be determined

Manifest V3 is set to make the declarativeNetRequest API as the primary content-blocking API in extensions. This API will then allow extensions to tell Chrome what to do with a given request, instead of Chromium forwarding the request to the extension. This will enable Chromium to handle a request synchronously. Google insists this API is overall a better performer and provides better privacy guarantees to users – the latter part of which if of course very important these days.

Consensus Among Ad Blocker Developers and Maintainers?

When informed about this coming update many developers were concerned that the change will end up completely disabling all ad blockers. The concern was that the proposed declarativeNetRequest API will result in it being impossible to develop new and functional filtering engine designs. This is because the declarativeNetRequest API is no more than the implementation of one specific filtering engine, and some ad blocker developers have commented that it’s very limited in its scope.

It’s also believed that the declarativeNetRequest API developers will be unable to implement other features, such as blocking of media element that are larger than a set size and disabling of JavaScript execution through the injection of CSP directives, among other features.

Others are making the comparison to Safari content blocking APIs, which essentially put limits on the number of admissible rules. Safari has introduced a similar API recently, and the belief is that’s the reason why Apple has gone in this direction too. Many seem to think that extensions written in that API are more usable, but still fall well short of the full power of uBlock Origin. The hope is that this API won’t be the last of them in the foreseeable nearest future.

Google Chrome Solution for ‘History Manipulation’ On Its Way

Reading Time: 3 minutes

No one will need to be convinced of the fact there’s a massive number of shady websites out there designed to ensnare you for any number of no-good purposes. Usually you’re rerouted to them when you take a seemingly harmless action and then often you’re unable to back <- yourself out of the site once you’ve unwilling landed on it. Nobody wants to be on these spammy or malicious pages and you’re stressing out every second longer that you’re there.

The well being of web surfers who also happen to be customers or friends here at 4GoodHosting is important to us, and being proactive in sharing all our wisdom about anything and everything related to the web is a part of what makes one of the best Canadian web hosting providers.

It’s that aim that has us sharing this news with you here today – that Google understands the unpleasantness that comes with this being locked into a website and has plans to make it remediable pretty quick here.

The first time something like this occurs you’ll almost certainly be clicking on the back button repeatedly before realizing it’s got no function. Eventually you’ll come to realize that you’ve got no other recourse than to close the browser, and most often times you’ll quit Chrome altogether ASAP and then launch it again for fear of inheriting a virus or something of the sort from the nefarious site.

How History Manipulation Works, and what Google is Doing About It

You’ll be pleased to hear the Chrome browser will soon be armed with specific protection measures to prevent this happening. The way the ‘back’ button is broken here is something called ‘history manipulation’ by the Chrome team. What it involves is that the malicious site stacks dummy pages onto your browsing history, and these work to fast-forward you back to the unintended destination page you were trying to get away from.

Fortunately, Chrome developers aren’t letting this slide. There are upcoming changes to Chromium’s code which will facilitate the detection of these dummy history entries and then flag sites that use them.

The aim is to allow Chrome to ignore the entirety of these false history entries to make it so that you’re not buried in a site that you had no intention of landing on and the back button functions just as you expect it to.

This development is still in its formative stages, and we should be aware that these countermeasures aren’t even in the pre-release test versions of Chrome yet. However, industry insiders report that testing should begin within the next few weeks or so, and all signs point towards the new feature being part of the full release version of the web browser.

In addition, this being a change to the Chromium engine makes it so that it may eventually benefit other browsers based on it. Most notable of these is Microsoft Edge, making it so that the frustrations of a paralyzed back button will be a thing of the past for either popular web browser. So far there’s no industry talk of Apple doing the same for Safari, but one can imagine they’ll be equally on top of this in much the same way.

Merry Christmas from 4GoodHosting

Given it’s the 24th of December here we of course would like to take this opportunity to wish a Merry Christmas to one and all. We hope you are enjoying the holidays with your family and this last week of 2018 is an especially good one. We can reflect on 2018, and look forward to an even more prosperous year in 2019.

Happy Holidays and best wishes, from all of us to all of you!

The Surprising Ways We Can Learn About Cybersecurity from Public Wi-Fi

Reading Time: 6 minutes

A discussion of cybersecurity isn’t exactly a popular topic of conversation for most people, but those same people would likely gush at length if asked about how fond of public wi-fi connections they are! That’s a reflection of our modern world it would seem; we’re all about digital connectivity, but the potential for that connectivity to go sour on us is less of a focus of our attention. That is until it actually does go sour on you, of course, at which point you’ll be wondering why more couldn’t have been done to keep your personal information secure.

Here at 4GoodHosting, cybersecurity is a big priority for us the same way it should be for any of the best Canadian web hosting providers. We wouldn’t have it any other way, and we do work to keep abreast of all the developments in the world of cybersecurity, and in particular these days as it pertains to cloud computing. We recently read a very interesting article about how our preferences for the ways we (meaning the collective whole of society) use public wi-fi can highlight some of the natures and needs related to web security, and we thought it would be helpful to share it and expand on it for you with our blog this week.

Public Wi-Fi and Its Perils

Free, public Wi-Fi is a real blessing for us when mobile data is unavailable, or scarce as if often the case! Few people really know how to articulate exactly what the risks of using public wi-fi are and how we can protect ourselves.

Let’s start with this; when you join a public hotspot without protection and begin to access the internet, the packets of data moving from your device to the router are public and thus open to interception by anyone. Yes, SSL/TLS technology exists but all that’s required for cybercriminal to snoop on your connection is some relatively simple Linux software that he or she can find online without much fuss.

Let’s take a look at some of the attacks that you may be subjected to due to using a public wi-fi network on your mobile device:

Data monitoring

W-fi adapters are usually set to ‘managed’ mode. It then acts as a standalone client connecting to a single router for Internet access. The interface the ignore all data packets with the exception of those that are explicitly addressed to it. However, some adapters can be configured into other modes. ‘Monitor’ mode means an adapter all wireless traffic will be captured in a certain channel, no matter who is the source or intended recipient. In monitor mode the adapter is also able to capture data packets without being connected to a router. It has the ability to sniff and snoop on every piece of data it likes provided it can get its hands on it.

It should be noted that not all commercial wi-fi adapters are capable of this. It’s cheaper for manufacturers to produce models that handle ‘managed’ mode exclusively. Still, should someone get their hands on one and pair it with some simple Linux software, they’ll then able to see which URLs you are loading plus the data you’re providing to any website not using HTTPS – names, addresses, financial accounts etc. That’s obviously going to be a problem for you

Fake Hotspots

Snaring unencrypted data packets out of the air is definitely a risk of public wi-fi, but it’s certainly not the only one. When connecting to an unprotected router, you are then giving your trust to the supplier of that connection. Usually this trust is fine, your local Tim Horton’s probably takes no interest in your private data. However, being careless when connecting to public routers means that cybercriminals can easily set up a fake network designed to lure you in.

Once this illegitimate hotspot has been created, all of the data flowing through it can then be captured, analysed, and manipulated. One of the most common choices here is to redirect your traffic to an imitation of a popular website. This clone site will serve one purpose; to capture your personal information and card details in the same way a phishing scam would.

ARP Spoofing

The reality unfortunately is that cybercriminals don’t even need a fake hotspot to mess with your traffic.
Wi-Fi and Ethernet networks – all of them – have a unique MAC address. This is an identifying code used to ensure data packets make their way to the correct destination. Routers and all other devices discover this information Address Resolution Protocol (ARP).

Take this example; your smartphone sends out a request inquiring which device on the network is associated with a certain IP address. The requested device then provides its MAC address, ensuring the data packets are physically directed to the location determined to be the correct one. The problem is this ARP can be impersonated, or ‘faked’. Your smartphone might send a request for the address of the public wi-fi router, and a different device will answer you with a false address.

Providing the signal of the false device is stronger than the legitimate one, your smartphone will be fooled. Again, this can be done with simple Linux software.

Once the spoofing has taken place, all of your data will be sent to the false router, which can subsequently manipulate the traffic however it likes.

MitM – ‘Man-in-the-Middle’ Attacks

A man-in-the-middle attack (MITM) is a reference to any malicious action where the attacker secretly relays communication between two parties, or alters it for whatever malevolent reason. On an unprotected connection, a cybercriminal can modify key parts of the network traffic, redirect this traffic elsewhere, or fill an existing packet with whatever content they wish.

Examples of this could be displaying a fake login form or website, changing links, text, pictures, or more. Unfortunately, this isn’t difficult to do; an attacker within reception range of an unencrypted wi-fi point is able to insert themselves all too easily much of the time.

Best Practices for Securing your Public Wi-Fi Connection

The ongoing frequency of these attacks definitely serves to highlight the importance of basic cybersecurity best practices. Following these ones to counteract most public wi-fi threats effectively

  1. Have Firewalls in Place

An effective firewall will monitor and block any suspicious traffic flowing between your device and a router. Yes, you should always have a firewall in place and your virus definitions updated as a means of protecting your device from threats you have yet to come across.

While it’s true that properly configured firewalls can effectively block some attacks, they’re not a 100% reliable defender, and you’re definitely not exempt from danger just because of them. They primarily help protect against malicious traffic, not malicious programs, and one of the most frequent instances where they don’t protect you is when you are unaware of the fact you’re running malware. Firewalls should always be paired with other protective measures, and antivirus software being the best of them.

  1. Software updates

Software and system updates are also biggies, and should be installed as soon as you can do so. Staying up to date with the latest security patches is a very proven way to have yourself defended against existing and easily-exploited system vulnerabilities.

  1. Use a VPN

No matter if you’re a regular user of public Wi-Fi or not, A VPN is an essential security tool that you can put to work for you. VPNs serve you here by generating an encrypted tunnel that all of your traffic travels through, ensuring your data is secure regardless of the nature of the network you’re on. If you have reason to be concerned about your security online, a VPN is arguably the best safeguard against the risks posed by open networks.

That said, Free VPNs are not recommended, because many of them have been known to monitor and sell users’ data to third parties. You should choose a service provider with a strong reputation and a strict no-logging policy

  1. Use common sense

You shouldn’t fret too much over hopping onto a public Wi-Fi without a VPN, as the majority of attacks can be avoided by adhering to a few tested-and-true safe computing practices. First, avoid making purchases or visiting sensitive websites like your online banking portal. In addition, it’s best to stay away from any website that doesn’t use HTTPS. The popular browser extender HTTPS everywhere can help you here. Make use of it!

The majority of modern browsers also now have in-built security features that are able to identify threats and notify you if they encounter a malicious website. Heed these warnings.

Go ahead an make good use of public Wi-Fi and all the email checking, web browsing, social media socializing goodness they offer, but just be sure that you’re not putting yourself at risk while doing so.