Encrypted Video Conference Calls With Signal

No intro paragraph needed. Title says it all. Let’s get started:

If a group chat for everyone that needs to be on the conference call doesn’t yet exist, you’ll need to create one and add participants. Once it exists, anyone can join in a conference or bail out at any time. They can do it by text, audio, and/or video as long as the group exists.

You can inform everyone that you’d like to start at a particular date and time and they’ll need to set their own reminders to show up.

To Create a Group

(To JOIN an existing conference call, go to your existing Signal group, then skip ahead to step #8)

  1. Start Signal.
  2. In the lower right, tap the blue icon with the pencil in it to start a new conversation.
  3. You’ll see “New group” at the top.
  4. Type in someone’s name from your contacts. Tap their name in the search results and they’ll be added to the group.
  5. Repeat step 4 for everyone you want to be in the group.
  6. Once done adding participants, in the lower right, tap the right arrow in the blue circle.
  7. Enter a Group Name. This will be visible to all participants. Then hit the blue pill button in the lower right with “create” in it.
    1. The group now exists
  8. Anyone in the group can now text the whole group or join a video or audio call. Tap the camera icon in the upper right hand corner.
  9. You will join an existing video conference OR if you’re the first one, you’ll start one.
  10. While IN the conference call, tap anywhere on the screen where there is NOT a button or other control… for example, tap on someone’s face, and you’ll get 4 icons at the bottom of the screen. To toggle your camera, hit the camera icon. To toggle your microphone, tap the microphone button. Swipe up to switch between views of each member.

Anyone in the group can come and go as they please. Anyone can participate as video+audio or audio only or just send texts.

The group stays forever until someone deletes it.

Enjoy your encrypted conference calls!

This is what the Decentralized Web 3.0 will look like

The Decentralized Web 3.0 will bring you the following benefits:

  • The end of ISPs and governments spying on your online activities.
  • The end of big tech collecting all your private data.
  • The end of email providers being able to see your personal email.
  • Encryption of EVERYTHING.
  • The end of social media censoring you.
  • The end of demonetization.
  • The end of spam.
  • The beginning of making money by receiving marketing email (if you choose to).
  • The end of censored banking.
  • The end of domain name confiscation.
  • The end of web hosters shutting you down.
  • The end of registrars shutting you out.
  • The end of app stores removing your apps.
  • The beginning you YOU being in FULL CONTROL of your personal data.

Here’s how, but first a short history…

Internet 1.0

introduced the world to the idea of everyone being a publisher.  Unfortunately, there was no security designed into the architecture and it was mostly static and difficult to have interaction.

Internet 2.0

was a more structured way of creating websites, with more user friendly user interfaces and lots of interactive content, in addition to improved security models.

But something went wrong.

Something went HORRIBLY wrong!  As individuals started becoming effective communicators across geographical and political boundaries, they started being silenced for multiple reasons… sometimes by anti-competitive companies with deep pockets, but usually political reasons by tyrannical regimes in back-assword countries, then in first world countries, by corporations (Twitter, Facebook, Google, Amazon, Instagram, etc…) and so-called “educational” institutions, and in some cases, even first world governments, themselves.

Anti free speech campaigns began successfully shutting out an entire class of voices via social media outrage mobs demanding voices they didn’t like be silenced and for some reason, the big social media companies complied and shut them down by shadow banning, removing them from search, suspending their accounts, or deleting their accounts altogether, frequently with no warning and no explanation.

Then they went after their income.

YouTube began demonetizing video creators.  PayPal began killing users’ PayPal accounts.  It even spread out to the real world.  Credit card companies began shutting down people’s accounts and even BANKS started deleting their OWN CUSTOMERS!  All for political ideological reasons!

They rewound the freedom clock back to the early 90s, and in some cases, back 100 years or more.

Enter Decentralization…

Decentralized services were already being created before “the purge” started, but decentralization started to accelerate because of this.  The FIRST popular decentralized service to hit the scene was #BitCoin, which is a fully decentralized, global currency.  What makes it so powerful is that there’s no central point of failure, and more importantly… no central point of attack.  It’s a BRILLIANT system that prevents double-spending, prevents counterfeiting, and gives control of assets back to the people.  Governments CANNOT control it!  It first rolled out in 2008 and has grown exponentially since then.  It’s been so successful, than many millionaires have been made because of it and thousands of other cryptocurrencies have been created.

The technology behind it can be used for so much more than JUST money.  In fact, all the strangle-points (or censor-points) of the current (or “legacy”) internet can be censorship resistant using the same or similar decentralized technology that BitCoin uses:

  1. DNS
  2. File Storage
  3. EMail

DNS

is the Domain Name System that allows you to type in human readable names into your browser like https://BitCoin.org or other sites you’re familiar with.  The reason this works is because your browser takes the name you enter into your browser’s address bar and looks it up in a publicly distributed database to find the actual IP address of the computer you’re really wanting to connect to.  Even though the database is decentralized, there’s a centralized authority that authorizes the names AND they are beholden to governments, so when a government demands control of your domain name, then you lose your domain name and all your visitors and paying customers, and there’s nothing you can do about it.  Domain name registrars can also take your domain names away, and this has been happening due to political reasons.

There are now several decentralized DNS replacements.  One of which is https://NameCoin.org  This is an open source project designed to have NO central authority.  It’s controlled by a blockchain (the technology that drives BitCoin).  In fact, it’s copied directly from Bitcoin, using BitCoin’s source code.  When you register a domain name on THIS system, you do it with a cryptocurrency called NameCoin.  Once registered, you own the domain name like you own your cryptocurrency.  It CANNOT be taken from you.  For now, there’s a problem in that current (legacy) browsers are unaware of this technology and so those names can’t be used with regular browsers unless you install plugins for them.

File Storage

Another weak point for censorship on the legacy 2.0 web is web hosting.  The way it works is you rent space and CPU capacity on someone else’s servers to host your websites.  If the hoster doesn’t like your politics, you’re GONE!  This has been happening at an accelerating pace.

The solution is decentralized file storage.  One of the most popular at the moment is https://IPFS.io which is a fully decentralized file distribtution system.  IPFS stands for InterPlanetary File System.  The genius behind this is that you don’t request content via a URL with a domain name and a path and file name.  Instead, you request it from the decentralized IPFS network via the HASH of the file you want.  (A “hash” is a mathematically generated number based on the CONTENTS of a file.  IPFS hashes are unique for every file).  If you’re a web publisher, you publish your files to the IPFS network.  Users can request your files (like website HTML pages) via the unique HASH of your file.  The IPFS network goes into action, looking for any node that has that file, and if found ANYWHERE on the network, delivers it to the user.  As a file is requested more often, it starts to spread across the globe, becoming more and more decentralized and faster to load.

Decentralized DNS systems, like NameCoin can be configured to return an IPFS file.

EMail

Your EMail will radically change too.  From your usage point of view, it will still look and feel similar to what you’re using now, but it’ll have the following, drastically different and improved features:

  1. Censorship-resistant, meaning no one can shut down your e-mail account.
  2. Decentralized.  There will be no central server that you connect to.
  3. Encrypted.  By default, ALL of your email will be heavily encrypted, without any effort on your part.
  4. Spam-Free:  NO ONE will be able to send you email unless you authorize them to.  You’ll also be able to set prices that spammers must PAY YOU in order to send you spam, should you elect to even receive spam.  The global system will prevent any email going to you unless you’ve authorized it AND that it includes the proper amount of cryptocurrency you’ve specified.

Conclusion:

In conclusion, the dark forces trying to silence you or block you from seeing speech that THEY do not approve of are coming to an end.  No websites will be blocked by other people deciding what you can see.  Your sites will not be blocked.  Your web hosting cannot be blocked.  Your social media will not be blocked.  Your videos will not be blocked.  Your content will not be demonetized.  Your banking will not be stopped.  Your web browsing cannot be spied upon.  Your email cannot be read by third parties.  Spam will be a thing of the past.  Censorship will be much more difficult for the censors.  And everything will be encrypted all of the time.  AND you’ll even MAKE MONEY by receiving marketing email and ONLY if you choose to do so.

All of your data will be 100% in YOUR control.

Your data will be stored, fully encrypted on your end, across multiple, replicated hosts (or locally only on your hardware), readable ONLY by YOU!

Decentralized Resources in the making (or already made):

The list keeps growing and is far far bigger than this list.  Check out all the decentralized apps on https://Blockstack.org as plenty of examples.

The Importance of Decentralized Apps & Services

First, a definition:  What IS a decentralized app or service?

A decentralized app or service, its data, and the user accounts are available from multiple locations.  If any one of them go offline, the app or service continues to be functional and distribution of the app or service does not cease, the data does not go away, the user accounts do not die, and no functionality ceases to function.

Let’s review how legacy (centralized) apps and services currently work…

Ordinary, legacy services that you’re probably used to are things like Google Maps, Google GMail, Google Search, Google Drive, Google Docs (seeing a pattern here?), Google’s YouTube.  Aside from the obvious fact that all of these are from A SINGLE COMPANY! they’re also centralized.  In spite of the fact that Google has a planetary wide system where they distribute their services and storage, they have the following centralized points of failure:

  1. They’re all owned by one company.
    1. Google could, in theory, go out of business.  Wait!  Stop laughing.  Where are you going?  Obviously, that’s not likely to happen any time soon, but it’s always a possibility, especially with the possibility that they may be broken up into multiple smaller companies, due to their gigantic control of virtually the entire internet.
    2. They can (and DO) censor.  THOUSANDS of YouTubers have had the following problems, increasing and accelerating in occurrences, frequently for political, not safety reasons:
      1. Demonetization.
      2. Shadow banning.
        1. Removing their videos or channels from “suggested videos”.
        2. Hiding their videos or channels from search results.
        3. Marking them as “age restricted”, which hides them from search results where “child safe” restrictions are enabled, such as public libraries and schools.
      3. Videos deleted.
      4. Channels deleted.
    3. Falsification of viewer counts.
    4. Blocking of voting.
    5. Blocking of comments.
    6. Simply not paying the creators what they’re owed.
  2. They’re all reliant on the centrally controlled DNS system.
    1. Though the DNS is a decentralized service, the CONTROL of it is NOT.  The CONTROL of the DNS is controlled by an organization called ICANN (Internet Corporation for Assigned Names and Numbers).  They’re the ones that can take your domain name away from you.  They used to be a U.S. based organization, but in 2016, the U.S. government, in a highly controversial move, transferred control to an international body that is not adherent to your first amendment rights.  At the time of this writing (2020/1/4), there are fears that tyrannical governments like Russia or China may start to get partial control of this too.  Both of them are already creating their own DNS and many countries block domains from their entire citizenry.
      1. See this:  UN Moves Towards Handing Dictatorships Power to Control the Internet
  3. They all have access to your PERSONAL data.
    1. Any data you enter into their apps or websites is viewable by them and stored on their servers.  YOUR data is controlled by other people.
  4. Your user account is proprietary for THEIR services
    1. You’ll have to create separate accounts for apps and services on OTHER centralized apps and services not owned by Google.
    2. Your user account and password are known and stored on these organizations servers.  They have access to EVERYTHING you do with their apps, and so do their employees and contractors!

Decentralization solves ALL of the above problems!  Here’s how:

  1. No centralized DNS.
    1. Decentralized apps do not rely on the centrally controlled DNS (Dynamic Name System).  Once you install and run the app on your local device, most of the functionality happens on your own device.  In cases where data needs to be shared, it’s either done so directly from your device to your friend’s device, if you’re having a private conversation, or it’s distributed to a decentralized, public data system like IPFS (InterPlanetary File System).
  2. Decentralized account management:
    1. Instead of creating a user account on a centralized web site for each and every website you visit, you create ONE account.  And you do this on your own device.  And you do not publish it (unless you want to).  This is how cryptocurrencies work.  You create your “wallet” using software running on your own computer.  It’s essentially a very large and random number, run through a cryptographic algorithm that generates TWO keys:  One private (that you hide from everyone) and on public (that you can share with the world).  These keys work in unison.  If you want to prove to anyone that you created content, you encrypt it with your private key.  Anyone with your public key can decrypt it.  Technically, that’s not what we call “encryption”.  It’s “digitally signing”.  If something can be decrypted using your public key, it’s proof that it was encrypted (or signed) with your private key, meaning only YOU.  If someone wants to send you something private, they’ll encrypt it with your public key.  It can ONLY be decrypted with YOUR private key.  This key combination is your “account” and you can use that on any decentralized app that uses that particular technology.  You can also create multiple accounts, if you like.
      1. You create your accounts on your own device.
      2. You use the same account everywhere (if you want).
      3. You can create as many accounts as you like.
      4. No one, but YOU has control over your accounts.  No one can delete them.
  3. Decentralized app deployment:
    1. Apps are made accessible on a network of nodes, rather than a centralized app store.  Some examples of decentralized networks are BitTorrent & IPFS.  This prevents a single entity (Like the Apple App Store or Google’s Play Store) from deleting them.  It also prevents a centralized authority, like ICANN from taking away the public’s access to your content via the DNS.
  4. Personal Data & Remote Storage
    1. While personal data does NOT need to be decentralized, decentralized apps SHOULD handle personal data ONLY locally, on the user’s device, OR, per the user’s intention, encrypt, then store on the user’s choice of cloud storage, preferably a decentralized cloud storage, like SiaCoin or FileCoin, or replicated (after encrypted) across multiple accounts on separate centralized cloud storage services like Amazon S3, Google Drive, DropBox, etc…
  5. Monetization
    1. Content creators should receive payments DIRECTLY from the consumers of their content, usually in the form of cryptocurrency.  The app providers need only provide the means for the content creator to accept cryptocurrencies.  This is usually done by the content creator registering their cryptocurrency wallet addresses with their content and users being able to tap or click it and then transfer crypto directly to the creator.  There should be no middleman involved.
  6. Elimination of DDOS
    1. Distributed Denial Of Services is an attack against a CENTRALIZED web site.  For example:  Multiple machines send thousands or millions of requests to a website, overwhelming the CENTRALIZED servers, causing them to be unable to respond to legitimate requests, because they can’t tell the difference.  If your services or content are decentralized, there’s no central server to attack.
  7. Faster Downloads
    1. When you download content from a decentralized network, you’re not relying on the limited server resources of a single organization or single server anymore.  The system finds the closest or fastest nodes to you that have the content and deliver it to you.
  8. Global bandwidth
    1. Decentralized distribution means closer physical transfers.  In other words, as a downloaded item gets distributed via the act of downloading, it spreads organically across the internet.  Each download is done via the closest neighbor, preventing clogging up the longer path connections, making the rest of the internet faster for everything else too.

Decentralization provides massive benefits for BOTH publishers AND consumers.

  1. For Consumers:
    1. As a consumer, the content you love cannot be taken away from you just because of the politics of the day or the preferences of the owner of an organization.
  2. For Publishers/Creators:
    1. You can’t be censored.
      1. Twitter, Facebook, & YouTube have gone on a massive censorship craze and in spite of being hauled in front of Congress multiple times and facing backlash from the public, they’re only accelerating their censorship.  Decentralization puts an end to that.
    2. You can’t be demonetized.
      1. A sinister part of censorship is demonetization.  In addition to silencing dissident voices, they’re also cutting off their funding and propping up the distribution of funding of only the voice they approve of.  Decentralization puts an end to that.

Speaking of Decentralized Monetization,

If you like my work, you can contribute directly to me with the following cryptocurrencies:

BitCoin:

bc1qx6egntacpaqzvy95n90hgsu9ch68zx8wl0ydqg
bc1qx6egntacpaqzvy95n90hgsu9ch68zx8wl0ydqg

LiteCoin:

LXgiodbvY5jJCxc6o2hmkRF131npBUqq1r
LXgiodbvY5jJCxc6o2hmkRF131npBUqq1r

How to deal with Trolls Online

Years ago, back when Google+ was still in the invite phase, I wrote the following article on Google+ Netiquette:

Google+ Netiquette

Years have gone by and the pleasant days of invite only are gone and now we deal with trolls on a daily basis.  If you’ve spent any time online, you’ve dealth with trolls.  But what IS a troll?

Troll Defined

According to Google, it’s someone that “make(s) a deliberately offensive or provocative online posting with the aim of upsetting someone or eliciting an angry response from them.”

image

According to the Urban Dictionary, it’s “Being a prick on the internet because you can. Typically unleashing one or more cynical or sarcastic remarks on an innocent by-stander, because it’s the internet and, hey, you can.”

image

Let’s look at some real life examples of trolling, shall we?

Here’s a typical one I encountered recently.  During an innocent conversation about someone that got a chip on their Gorilla Glass screen on their Samsung Galaxy S7 phone, which, has a premium build glass and metal body (that’s important to follow the trolliness here)…

image

So, this troll jumped into an ongoing, pleasant conversation instantly stating lies (or he’s just 2 generations behind on his knowledge of what Samsung phones are made of), then he jumps to drastically wrong assumptions, repeats his misinformation, jumps to massive conclusions, attacks the entire Android platform, then expands his insults to all Android users across the entire planet, then accused me of being the troll when I called him out on his trolliness.  This thread went on further with more of the same.

image

Good Luck Lifestyle Theme Trolls 5″ – Ballerina by Play Along

This is just the latest troll I’ve dealt with and is a typical example of the trolls I deal with almost daily.  No doubt, in true troll form, if this troll ever sees this post, he’ll make a new thread claiming this post is all about him.  Reminds me of the old Carly Simon song, “You’re So Vain” … you probably think this song is about you.  Would be the same with any troll that I used as an example here.  This is just the most recent one at the time of this posting.

Of course, you see this behavior on any subject where people have opinions… politics, religion, science, favorite devices, etc…

But, how do you DEAL with these trolls?

There are 2 schools of thought on this and they’re both equally valid:

  1. Ignore them and the’ll go away.  Also known as “Don’t feed the trolls”.
  2. Take them on.

The conventional wisdom is “don’t feed the trolls”.  The theory goes that they only post to get people riled up and if you ignore them, they’ll go away.

While that’s true for some trolls, and in my opinion, a very small minority of them, it’s not true for all trolls and it’s my experience that it’s not true for most of them.  Ditto for the claim that they just want to rile people up.  My experience in dealing with them going all the way back to 1988 is that most of them are just people with strong opinions, poor social skills, and an extraordinarily sensitive ego.  Their purpose is not to rile people, but to make themselves feel better by belittling others.  When uncontested, they feel vendicated and that is a reward to them to do more of the same.

image

So, step 1, Don’t be a Troll!

See these Google+ Netiquette tips

Step 2:  Understand that you’re not necessarily dealing with this one troll, but combating a larger problem of trolls everywhere.

Step 3:  Determine what kind of troll this person is.  Are they just confused and if you provide corrected information, will it fix them?  Or, are they a repeat troller or trolling in a known trolling topic (such as iOS vs. Android or Republican vs. Democrat)?

Step 4:  Always try to first resolve issues politely and respectfully, even when the other party isn’t being respectful… IF you’re not sure they’re a repeat offender or trolling on a repeat troll topic.

Step 5:  Establish yourself as a polite, honest, reasonable person.  Politely try to resolve the problem.  Don’t give them an opportunity to label you as a troll.  They’ll do this anyway, but when you’re being more than polite, it only makes them look more ridiculous.  This is a big hit to their ego.

Step 6:  Re-confirm that you’re goal is to get to the truth, not to argue, and that you’d appreciate being treated with respect and that you’ll provide him (or her) with respect too.  Killing them with kindness makes their heads explode.  On a few occassions, they realize what they’ve done and apologize.  Sometimes they just leave, licking their wounds, usually blocking you on the way out.

There are, however, times when a troll needs a true smackdown.  I caution against this unless you can hold your own and are an expert in the topic being discussed.  Don’t be rude for the sake of being rude (that’s trolling), but feel free to mirror their insults.  Copying and pasting their own text against them is a great way to mirror their bad behavior that they can’t tag you on, because they’re actually the ones that wrote it.  Make absolutely certain that your facts are correct, because if you make any factual mistakes, YOU will be called out.  Keep reminding them that you tried to be civil, rational, and respectful, but they chose this path and you’re simply reciprocating the style of discussion that they chose… that it appears to be the only style they’ll pay attention to.  Also, trolls hate it when you use complex sentences and multisyllabic words or sound educated in any way.

Conclusion

When a troll has an unpleasant experience trolling (when their ego is hurt), they’ll think twice before trolling again, especially against you.

Thank you for sharing this article.  See this image?

image

You’ll find actual working versions of them at the top and bottom of this article. Please click the appropriate buttons in it to let your friends know about this article.

CSRSS.EXE is NOT a Trojan–Windows help phone scam!

Help me impede the scammers!

image

Quick Disclaimer:  Yes, there IS a virus or trojan that uses the name csrss.exe, BUT……….

There’s a phone scam going on where someone from India calls you up from out of the blue, claiming to be from Microsoft support, responding to your computer problem (which you may or may have not put in a request for help… usually not), then scamming you to give them control of your PC, where they trick you into buying fake warranties for many hundreds of dollars, while also stealing your financial information and all your passwords.  They’ll give you tons of fake evidence that your computer is infected with trojans and viruses.

Part of their success lies in the fact that while they have remote control of your PC (that you were tricked into giving them), they’ll use your PC to Google for csrss.exe then the first link in the search results claims that it is a trojan virus.  IT IS NOT!  csrss.exe is a core part of Windows.  However, it’s likely true that some trojans disguise themselves as csrss.exe.  BUT, 100% of all Windows PCs have a LEGITIMATE file called csrss.exe.  If you have the file, AND YOU DO (if you’re running Windows)!, it does not mean you have a virus or a trojan.  You absolutely have to have this file or your system will not function.

What can you do to help me impede the scammers?

This may sound self serving, admittedly, but I need you to search for csrss.exe on Google and NOT click anything except a link to this page, right here.  That will push this page up in the Google rankings.  Why?  Because when the scammers are pulling up the csrss.exe search in Google on their next victim’s PC, hopefully the victims will see THIS search result and put a stop to the scam.

If it makes you feel better, I’ll even refrain from putting any advertisements in this article.  It’s more important that we stop the scammers than I make a couple cents over a year or so (and yes, if I had an ad on this page, I’d only be getting a few pennies PER YEAR, if anything at all!)

Also, please share this article in whatever form you can to spread the word about the scam and to encourage others to do the same with the search rankings.

Have you received a similar call from these people?

Let us know in the comments.

Thank you for sharing this article.  See this image?

image

You’ll find actual working versions of them at the top and bottom of this article. Please click the appropriate buttons in it to let your friends know about this article.

It’s YOUR fault GMail puts important E-Mail in the SPAM folder!

That’s right!  Did you know that Google’s GMail spam filter is largely based on its users marking e-mail as spam?  For example, if you voluntarily signed up for an e-newsletter, then decide you don’t want it anymore, if you mark it as spam, which it is not! because you asked for it! then other people, who also signed up for it stop getting it because when enough of you mark the SAME e-mail (which is NOT spam) as “spam”, GMail considers it spam and starts moving it into the spam folder of every GMail user that subscribes to it.

[GARD]

What you can do to stop the madness

It’s your civil and moral responsibility to unsubscribe from e-mail that you signed up for.  In every legitimate E-Mail subscription that you signed up for, each issue e-mailed to you will have an unsubscribe link, usually somewhere at the bottom.   USE THAT unsubscribe link instead of giving a false spam report.

I recently received a letter in the mail from a financial firm for which I do business and have money in.  The letter said that they haven’t heard from me in a while and were about to give my account to the state as an “abandoned” account.  After going through my GMail spam folder, I see that SAME letter in there from weeks earlier!  You know why it’s there?  Because some people that did or do business with this firm decided they didn’t want to receive any more mail from them and instead of doing the right thing and properly unsubscribing, they marked it as spam in GMail.  That caused the GMail servers to automatically move everyone else’s into the spam folder too!

So, STOP DOING THAT!

Of the 76 e-mail messages in my spam folder for the past 30 days, only 6 of them were legitimate spam.  Why?  See above.  You are destroying the reliability of the GMail spam filters.

[GARD]

Your actions online don’t always just affect you.  In this case, they have a detrimental effect on other users.  Sure, this is definitely partly Google’s fault, but it’s also partly your fault too (if you’re one of the ones doing this).

So, please stop doing this and please pass the word along so others stop doing it too.

See these images?

image

You’ll find actual working versions of them at the top and bottom of this article. Please click the appropriate buttons in it to let your friends know about this article.

Check back later for updates too!

crb tech dba jobs in pune

There’s some jerk on Google+ spamming just about every community group with the a bit.ly link to a Google search for:

crb tech dba jobs in pune

[GARD]

So, I’m hoping this article finds its way to the top of the Google search for those keywords.  The spammer’s profile has NOTHING but about 100 of the same spam… each one in a different community.  Communities like “I love myself”, “Nature”, “I love animals”… totally nothing to do with CRB Tech DBA jobs in Prune.

JobSpammer

Google InBox Invite Winner #5

Alrighty!,  It’s now time for the FIFTH Google Inbox invite give away.  If you want one too, click here and give us an entertaining sob story.

Google InBox Invite

…you’ll have a better chance at winning if you share a link to that page and post YOUR link of your share on the invite form.  To get the link to your post, if you’re on the desktop browser, right-click the timestamp on your post and copy the link, then paste THAT into the web form.  To get the link from your phone or tablet, OPEN your post where you shared mine, open the menu, and choose “Link”, which will copy it to your clipboard.  Then paste it into the web form in your mobile browser.  Our 1st and 2nd winners did that and so has this 4th winner.  And here’s our latest winner’s sob story:

[GARD]

 

“Curiously I cry for Inbox. Corn Flakes do not taste good with salty tears falling from my eyes. Please don’t make me eat salty Corn Flakes anymore.”

OK.  I won’t make you do it anymore.

Congratulations to Jimmy Richards!  For his sob story.  He has just won an invite to InBox!  I hope you enjoy it!

Jimmy Richards

The competition is NOT over and if you’ve already entered and didn’t win this one, you’re STILL in the running and could win the next one!

See these images?

image

You’ll find actual working versions of them at the top and bottom of this article. Please click the appropriate buttons in it to let your friends know about this article.

Check back later for updates too!

Google InBox Invite Winner #4

OK, FOURTH  Google Inbox invite give away.  If you want one too, click here and give us an entertaining sob story.

Google InBox Invite

…you’ll have a better chance at winning if you share a link to that page and post YOUR link of your share on the invite form.  To get the link to your post, if you’re on the desktop browser, right-click the timestamp on your post and copy the link, then paste THAT into the web form.  To get the link from your phone or tablet, OPEN your post where you shared mine, open the menu, and choose “Link”, which will copy it to your clipboard.  Then paste it into the web form in your mobile browser.  Our 1st and 2nd winners did that and so has this 4th winner.  And here’s our latest winner’s sob story:

[GARD]

“My girlfriend lives in Kainan, Japan and I desperately -sniff- need a sleek way to better communicate with her. -SOB-“

Congratulations to Spencer Williams!  For his sob story.  He has just won an invite to InBox!  I hope you enjoy it!

Spencer Williams

The competition is NOT over and if you’ve already entered and didn’t win this one, you’re STILL in the running and could win the next one!

See these images?

image

You’ll find actual working versions of them at the top and bottom of this article. Please click the appropriate buttons in it to let your friends know about this article.

Check back later for updates too!

Google InBox Invite Winner #3

 

Time to announce the THIRD Google Inbox invite give away.  If you want one too, click here and give us an entertaining sob story.

Google InBox Invite

…you’ll have a better chance at winning if you share a link to that page and post YOUR link of your share on the invite form.  To get the link to your post, if you’re on the desktop browser, right-click the timestamp on your post and copy the link, then paste THAT into the web form.  To get the link from your phone or tablet, OPEN your post where you shared mine, open the menu, and choose “Link”, which will copy it to your clipboard.  Then paste it into the web form in your mobile browser.  Our 1st and 2nd winners did that.  And here’s our latest winner’s sob story:

[GARD]

“I had a dream that if I don’t successfully get an inbox invite then everyone’s gmail account will switch to IMAP based outlook accounts and  pandemonium breaks out. We don’t need that, do we?”

That would be fun!

Congratulations to Jason Johnson!  For his sob story AND thank you Jason, for voluntarily helping me test the website.  He has just won an invite to InBox!  I hope you enjoy it!

Jason Johnson

The competition is NOT over and if you’ve already entered and didn’t win this one, you’re STILL in the running and could win the next one!

See these images?

image

You’ll find actual working versions of them at the top and bottom of this article. Please click the appropriate buttons in it to let your friends know about this article.

Check back later for updates too!