Slydial is a pretty slick app that everyone should secretly have. Essentially, it’s designed to deceive people into thinking that the user actually called them. The app somehow connects straight to the target’s voicemail, never giving the target the option to pickup Additionally, assuming the targeted caller had service, the target’s phone shows a missed call from the user.
The use case scenarios for this range from convenient to unethical. Mostly I used it when I’m too lazy to text a message and I suspect the other person doesn’t want to talk to me either. I’ve actually never told people close to me about this app, so if they read this post the may have closure on the peculiar times they were sitting right by their phone and all of a sudden they got an alert of a voice mail message from me. Guilty as charged.
There are two versions of the service. The free one which, as one would expect, has advertisements in it which are tolerable, but definitely would be nice to avoid. The paid version skips the adds, costing 10 cents a call or 3 bucks a month (both reasonable but I don’t pay).
According to their adds, there’s even a tool in the paid version where, “you can send the same voice message to multiple people, appearing from any number you prefer.” That last part is interesting. In theory you could leave a voice mail message appearing as someone else? This could definitely lead to unethical activities! I’m thinking I may use this when my daughter is a sophomore in high school and some Senior boy starts calling her. Such boy may receive a message as follows. “This is Sargent Slaughter From the Local Police Department (number matches!). We understand you’ve been talking to a certain young lady. I will personally put my life on hold and kick your ass if you ever call her again! Have a great day!”
One could have less amusing examples involving”The STD clinic”, “A Bail Bondsman,” or “A Senior Auditor from the IRS.”
I suspect political campaigns have used this feature as I received a couple calls that went to voicemail with obscurely personal messages. “Hey it’s the mayor… I … dang… I’m sorry I missed you… I thought this would be a good time to reach you. Well anyway… blah blah vote for me blah blah”). No mayor would ever call me. Predictably, the message never said my voice, so without the personalized Proof Of Work, I’m pretty sure tens of thousands of other registered voters received the same message.
Anyway, this is indeed a sly little app to have in your arsenal. It’s so easy to use it doesn’t warrant a tutorial.
I found an amazing website that does a brilliant job of using a a couple simple concepts to combine for an incredibly useful tool. OriginStamp.org is a true gift to the world by developers André Gernandt and Bela Gipp. In conversation with them they told me, “We started this project just for fun and didn’t expect so many people to use it.”
The site’s popularity doesn’t surprise me — it’s awesome! They have created a FREE service that allows anyone to prove they possessed any type of electronic file before a specific date. The electronic file could be as simple as a string of text, or as massive as a movie file.
I’ll dive into the technical details later, but consider a couple basic applications:
Someone has written an amazing script and wants to have it logged as their work, before sharing with a publisher.
Someone moves into a new rental property, and takes extensive video of the condition of the property, which they want to archive on the day of their move-in. By archiving the footage, the landlord cannot argue that the video was taken on the move out date.
Someone wants to log a text prediction. Example would be if I said, in 2015, “I, PG CodeRider, predict the Cubs will win the 2016 World Series in a game 7 thriller against the Indians!” it would be pretty impressive!
Without OriginStamp, creating verifiable proof of a file’s existence, before a certain date is difficult (having a “saved as” date with the file doesn’t count). Users would likely have to defer to a third party to provide proof of ownership. This lends itself to the following problems:
The third party site likely costs money.
The third party site may disappear.
The third party site may not remain credible to the rest of the world.
The third party site might experience a server crash, hack, or accidentally delete your file.
OriginStamp avoids all of these problems. The simplicity of their approach, combined with their robust method of validation, makes it truly an elegant creation. The site ingeniously leverages the bitcoin blockchain as a point of reference. Because the blockchain is a decentralized entity with literally thousands of people monitoring its integrity, it is impossible to manipulate historical entries. Additionally, due to this same decentralized nature of the blockchain, it is difficult to imagine a scenario where the Blockchain would suddenly cease to exist. Thus a user can rest assured knowing their claim is verifiable so long as the internet remains functional and Bitcoin continues to have even a small percentage of people using it.
How You Can Use This Tool (without actually understanding it)
For those of you that just want to “trust me” and believe this works, without understanding why, here’s a step by step guide of how you can use it:
1) Create a FINAL VERSION of a file or text that you want to verify. It is critical that not a single change occurs in your file, or it won’t be verifiable in the future. Example is if you write a million word novel, once you submit it, you can only reference that version you submitted. A change to a single character will make the entire file incapable of being proven to be your file at the time of the transaction.
I’m going to go through this process by validating a screenshot I created with my 2016 presidential predictions. Again, the “Final Version” is very key, and it’s easy to overlook how it’s possible to accidentally alter. In my case, I cannot simply post a copy of the JPG file of my prediction and maintain the integrity, because when a user downloads the file, certain attributes such as the “saved date” would be different than the original. Thus I have posted a zipped version of my jpg file, which if someone were to download and extract the jpg file, would ultimately be my FINAL VERSION.
It’s also important to note that you include something that references you as the creator in the file, so that no one else can claim it as their work. My file has my name in the screenshot.
In my example, the exact SHA-256 hash of my FINAL VERSION is: 3742fd0fcebd60f38995429e736a1e2f3f040ea367c21ce87cb1b9bcd89e5d89
If you aren’t certain you’ve hashed correctly from a 3rd party site, you could cross check with a single letter of text “a” which should result in: ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb
Make sure you have a copy of your hash, as well as the original copy of your file.
3) After submitting your file, you will get a notification saying your hash has successfully been created. Note that OriginStamp will not “submit” it to the blockchain until about 7PM East Coast time. They only submit free submissions once a day, to keep their costs down, and depending on how busy the blockchain is it may take up to 2 days to register. If you’re in a hurry to get your hash submitted, they offer a premium service to accomplish this where they wallop you with a colossal fee of $1 to get it in right away.
4) If you trust OriginStamp to remain in existence forever, you need not do anything further. When you need verify the date of your file, go to their website, click Verify Stamp, and enter your hash, or drag in your file, and the site will tell you when it was submitted. However if you wish to be able to validate your file without the existence of Originstamp, you’ll need to collect a few more pieces of information. After waiting a day or two, you’ll need to revisit OriginStamp, click Verify Stamp, enter your hash or upload file and it will take you to a confirmation page. On this page, it will list of all the hash submissions as well as the Check Sum hash. You should store both of this with your final version file. The list of all hashes can be a somewhat long now as the site gains popularity.
Hopefully you would never have to defend the legitimacy of your file, but if you did, you should have a pretty convincing case. Of course, I have no idea how a jury would react to this information, or if it would even be admissible as evidence. However, to illustrate what you have, below is how I would argue the authenticity of my Presidential prediction if someone was accusing me of being a fraud in a court of law
Me: “Your honor, I did in fact create this JPG on 10/31/2016. To prove it I used a site called OriginStamp. This site took my file and hashed it using the SHA-256 method. If you go to OriginStamp, they will confirm this transaction.”
Accuser: “What the heck is OriginStamp?!? Judge, objection! I’ve never heard of this site. How can we trust its validity?”
Me: “Okay forget going to OriginStamp, we can walk through what they did. OriginStamp created an SHA-256 hashed text of my file (see above). OriginStamp then took ANOTHER SHA-256 hash (the Check Sum) of all the other records they received that day. I have a list of these and the SHA-256 hash of these can be conducted on numerous sites.
“As is the nature of SHA-256 hashes, they are relatively easy to calculate in one direction, but impossible to conduct in a reverse manner. Stated differently, I can claim with utmost certainty that no one on the planet can produce any SHA-256 pre-calculation string which results in the same final hash output as any of mine, without using my file or text. Such an effort would take far more than millions of years with today’s computing power.”
Accuser: “So what he has a hash that is unique? What does this prove?”
Me: “It doesn’t prove anything yet, but as a final step, Originstamp used the final Check Sum hash along with Base 58 encoding, to find a Bitcoin address to log a small Bitcoin transaction which cleared on 11/3/2016. This process can also be demonstrated on multiple websites, I have a screenshot from Brainwalletx.Github.io. A user simply needs to enter the Check Sum as the Secret Exponent to generate the address that was used. What this means is that this address was specifically used for this purpose we have outlined. The possibility that this address which comprises a hashed connection to my exact file is incredibly unlikely.”
Accuser: “So you’re saying there’s a chance…”
Me: “Technically yes, but the fact that an active address which I found with my specific JPG hash in it is beyond infinitesimal. There are exactly 2^256 possible bitcoin addresses — that’s far more atoms than there are on earth, sun, and other planets, combined. The likeliness of this series of events happening is less than me playing the Mega Millions Lottery and winning, four times in a row.”
Accuser: “Okay so how do we know you didn’t make the entry after the election?”
Me: “The blockchain’s integrity is maintained by thousands, perhaps millions of computers validating transactions. At the end of Sep 2016, the hash calculation rate per second was 2.6×10^16. This represents far more processing power than any single entity such as the United States government could direct at the blockchain in hopes of manipulating the network. It would be easy for me to find at least a dozen articles on the web, or a computer science professor to testify how unrealistic back-dating entries in the block chain is.”
Accuser: “I still think this is bogus”
Ultimately your argument would likely hinge on testimony of some math expert, but that’s my best effort to simulate how to defend the legitimacy of the transaction. Note the links in the discussion above for reference on how Base58 encoding is conducted.
For better or worse, I have been entangled with Google Drive since its inception. It’s not perfect, but the ability to access it through most customers’ networks or while using their mandated laptops has proven extremely useful. My most common usage is accessing notes or solutions I’ve compiled from previous projects. I realize lots of offer ways to do this, some probably better. But Drive was one of the first I found, so I have a lot in there which makes the concept of switching to GitHub, OneNote or something else seem not worth the effort.
One problem I did encounter was saving text in the Google Doc format. When storing saved code for VBA or Swift, Docs occasionally applies little adjustments in the formatting or attempt to spell check which was undesirable. What I really wanted was a text editor like Notepad. Google drive does let you save Text files, but they weren’t very easy to edit from the normal interface.
I found a great solution with an app called Drive Notepad available in the Chrome Webstore. This does almost everything I want with some helpful features. Most notably, you can adjust what language your code is displayed in, which is extremely useful for its readability. Initially I was just looking for a text editor (which there are plenty of), but this works even better. See screenshots below.movie Rings trailer
Can share with usual google share options, though not in real time like doc or sheets.
Searchable as a regular google drive. I use excessive comments in my archived solutions specifically to facilitate the searching based on what I will likely remember.
Have to manually save. Unlike google drive document that saves literally in real time, Drive NotePad requires you to manually hit save or CTL S. This has never been a problem for me as it delivers a warning when you navigate away after changes, but it would be nice to have. I’m sure the creator has been bombarded by this request.
Files count against your storage space on google drive. Nobody should care about this, I just am listing it in case anyone was curious. Source text takes up an infinitesimal amount of space that this will never be an issue. I always got some quirky satisfaction of knowing that Google Docs and Sheets never counted against my storage limit (which I’m not near close to hitting). If you’re rolling your eyes that I listed this as a small drawback, I don’t blame you.