DEVONthink’s encrypted databases are useful for keeping your private data, e.g., financial or health records, though they can be used for any purpose. If you decide you don’t need a particular database to be encrypted, here’s how you can unencrypt it. (more)
When DEVONthink 3 debuted, it came with the option of creating a truly secure, encrypted database. If you have an unencrypted database and would like to convert it to an encrypted one, here is how you do it. (more)
Focus modes allow you to minimize distractions in different circumstances. This usually involves disabling notifications from certain people or applications. DEVONthink To Go also supports Focus modes and lets you filter your information as needed. Here is, how that works. (more)
On his blog, David Sparks a.k.a. MacSparky paints a dark picture of an age of mass surveillance. And David is right. We can only watch out and base our decisions what products to use and which services to trust on smart choices. Here are some of our thoughts and two links. (more)
When it comes to syncing with DEVONthink, we are often asked questions about what an encryption key is and how you make and use one. Here’s a brief explanation. (more)
An article published yesterday by Reuters casts a shadow on Apple’s commitment on privacy and encryption. We tell you how to keep your data out of iCloud backups, encrypt databases, and synchronize them securely. (more)
No matter what we do online there are companies trying to follow us, learn more about what we do, and build profiles. Some web sites contain more tracking code than actual content. On the web you can use ad blockers and search engines like DuckDuckGo or Startpage but there’s little you can do about apps on your iPhone or your Amazon Echo calling someone you don’t what them to talk to. (more)
When syncing DEVONthink on macOS, you have the option of using a local sync location, called a local sync store. Technically it’s a folder on a volume that keeps databases in syncable form. Since it’s writing directly to a local disk, it’s by far the fastest and most transparent sync option. (more)
Last week Bloomberg Businessweek published an article named The Big Hack. The authors claim that testers have found a tiny microchip on server mainboards that wasn’t part of the original designs:
During the ensuing top-secret probe, which remains open more than three years later, investigators determined that the chips allowed the attackers to create a stealth doorway into any network that included the altered machines. Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China. (more)
We know that you like to keep your private data private. And our software and processes are designed to keep it that way. Here’s what we’ve done recently to protect your privacy and security as well as our own integrity in these matters: … (more)
By using our site, you acknowledge that you have read and understand our Cookie Policy and our Imprint.