I forgot to add it has the standard lighten/darken control around the light sensor.
Only seven images including the ones in the video. I used three testing another camera.
It was super windy and the old 400mm definitely does not have image stabilization. I got lucky during a short lull.
Sony A7, Aperture Priority, 1/60 second, Fotodiox FD-E adapter, Prospec 400mm (FD) @ f8, Vivitar 2X Teleconverter
I’ll try some exposure stacking – bracketing gave me some good sky-dark mountains and the reverse.
Things I missed or glossed over in the video:
Canon still has the manual.
Scene modes: Portrait – “soft effect”, Landscape – deep DoF, Night Scene – slow shutter + flash, Sports – continuous shooting with AF, Night Snapshot – reduces camera shake (boosts ISO & shutter?), Kids & Pets, Indoor, Sunset, Foliage, Snow, Beach, Fireworks, Aquarium, Underwater, ISO 3200 (2X normal highest), and Color Swap.
Metering modes: Evaluative, Center weighted average, Spot AE Point/Center – spot metering is whatever is in the center of the LCD, and Spot AE Point/AF Point – AE point follows AF point (only works with FlexiZone AF selected).
I compost most things but goatheads get the flame.
The proprietor of Wildharber Farm.
I use two-factor authentication. It’s a lot more secure but it’s also a little scary if something happens to your phone. Because of that, I set up backup codes and downloaded a set of ten (you can only get 10 at a time). When it works, it’s nice – you click Try another way and enter the one-time-use code from the stash of ten instead of having a code texted to you.
What Google doesn’t tell you is, if you turn two-factor off and then back on, the backup code setup goes away. It’s not just that the codes you downloaded are invalid, it’s as if you never set up to use backup codes(1). You have to go into your security settings, select two-factor authentication, set up to use backup codes again, and generate new codes. I did not know this. I searched for documentation (“help” files are the only documentation) and I didn’t find it anywhere(2).
An analogy:
My car uses two-factor to start. It has a smart fob – detecting the fob and pressing the Start button starts the car. If the fob battery goes dead and I use the key, the car doesn’t forget how to start normally when I put a new battery in the fob.
I tested before a trip and tried to use a backup code. I didn’t see the backup codes option under Try another way, got frustrated, and pasted the backup code into the field where you normally enter the texted code. It recognized that it was an 8-digit backup code rather than a 6-digit text code and told me to go to Try another way(3). Nice infinite loop there.
When I got in using a texted code, I set up backup codes again and downloaded a new set. I logged out, cleared everything, and closed the browser. When I got back in using a backup code, the email notifying me that a backup code was used told me I had ten codes remaining. I had just used one of the ten one-time-use codes to log in which generated the email notification(4).
Rod Serling voice: Picture this. A man on a deserted island has almost no power left in a satellite phone. Does he gamble on a phone number he’s not sure he remembers correctly or does he try to email to an address he knows is correct? The last time he emailed, it told him he had one code remaining so he tries email. No, he had no codes remaining. His email fails. He dies.
I haven’t tried it but I think the on-off-on scenario might also break the code generation app. It would depend on whether the app generates 6-digit codes like the ones you receive as a text or 8-digit backup codes.
Can I turn off two-factor authentication after I’ve turned it on?
If you already use two-factor authentication, you can no longer turn it off. Certain features in the latest versions of iOS and macOS require this extra level of security, which is designed to protect your information. If you recently updated your account, you can unenroll for two weeks. Just open your enrollment confirmation email and click the link to return to your previous security settings. Keep in mind, this makes your account less secure and means that you can’t use features that require higher security.
You can tell the bellows pinholes are small because the ghosts have diffraction effects.
Looking closer, this isn’t missing development, it’s the bathroom wall. Dev problem would be on the left.
Timeline:
20 February 2019 – CafePress is hacked and over 23 million account are compromised.
13 July 2019 – According to this Forbes article, We Leak Info adds the CafePress breach to their database.
5 August 2019 – The author of the Forbes article receives an email from have i been pwned about the CafePress breach.
20 September 2019 – I receive an email from CafePress about the “Data Security Incident”.
It’s been 7 months since the data was stolen. If it hadn’t been found in the wild by third parties, they still might not know.
It’s been at least 2 months since they found out and they just now got around to telling their customers.
I didn’t have a CafePress account. Just to be sure, I tried to log in:
A non-apology worthy of a politician caught red-handed:
“…And other information.” I learned about physical address from haveibeenpwned.com.
Later in the email is this:
“What We Are Doing
We have been diligently investigating this incident with the assistance of outside experts. We also have contacted and are cooperating with federal law enforcement authorities. In addition, we have taken various steps to further enhance the security of our systems and your information, and the affected database has been moved to a different environment.”
Not much and pretty vague. The part where the customer has to do things is so long it refers to another section:
“What You Can Do
As described in the “Additional Resources” section below, we recommend you remain vigilant and take steps to protect against identity theft or fraud, including monitoring your accounts and free credit reports for signs of suspicious activity.
We also recommend that you visit the CafePress website at www.cafepress.com and log in to any online account you may have, which should prompt you to change your account password, if you have not done so recently.”
They go on to say:
“In general, you should always ensure that you are not using the same password across multiple accounts, and that you are using strong passwords that are not easy to guess.”
There, there [pat on the head]. That’s trivial, deflecting, and condescending. A user account didn’t cause this, CafePress’s incompetent security did. How about I take investment advice from Bernie Madoff?
One more bit and I’ll stop ranting. About this. For a while.
All of the links in the email, including the big 3 credit reporting agencies, go through CafePress’s email list provider.
I mean, why wouldn’t I trust a link with
…krmpkhgftlhjtmbmjrsbzjfgrpjltskzppmktwzhsrfp_vjjjfrrrrkynfhgmmfmmrr.html
as much as I trust one that goes to
https://consumer.ftc.gov?