I’m in the process of migrating to a new Mac. It is proving surprisingly cumbersome to do so. The Migration Assistant I tried in peer to peer mode stalls as soon as one of the laptops (and then both) falls asleep, and does not resume when woken up. Giving it expects to take several hours to copy everything it isn’t viable to stay next to it just to keep both machines awake. I set both up to not fall asleep, but those are system settings within a user account it appears, and it logs out of those when doing the migration. I could migrate from my Time Machine to the new laptop, which also needs the Migration Assitant however, which loops me back to the falling asleep bit.

So I’ve decided to do the migration by hand. That’s actuallly not entirely unwelcome as it allows me to ignore the accumulated detritus of working on the old laptop for 7 years. It’s just a lot of work to think of how to copy over certain databases, licenses, settings of specific tools etc. It will have to happen in stages, and partly as needs arise.

All the software I intend to keep using is installed (Evernote nor Things are making the move with me). I’ve copied over my documents archive, and connected the new laptop to my Nextcloud cloud. Next steps are setting up my e-mail and calendar accounts in Thunderbird, and migrating my Alfred snippets. After those I’m good to go for working on the new laptop. Anything else is non-essential, and can be dealt with in stages. This includes image and music libraries, book collections, etc. It likely will be a good while until I’ve added the various tweaks and twiddles to reduce friction in my workflows, to mirror 7 years worth of tweaks on the old system.

A client sent me a batch of e-mail messages with attachments as part of collecting material for a study. Those e-mail messages were sent as attachments themselves, as MSG files. This is an Outlook format that can’t easily be opened by other mail clients, not even with Outlook for Mac online discussions suggest. To get at the attachments hidden in those MSG formatted files I looked for a tool to help out.

I found two, where for each I needed the paid version to get at the attachments. One was about a quarter of the costs of the other. So I opted for MSG Viewer Pro, and not MSG Viewer for Outlook. There are a number of online tools, but I don’t want to risk client information that way. There are also one or more open source tools freely available, but it was not immediately obvious I could access and save attachments contained in those MSG files with them. In the end I was glad I opted for the cheapest option, as it turned none of the attachments sent were relevant to my current work.

At Re:Publica 14, Elmine and I both attended a workshop on making your Mac more secure.

The session was given by the Tactical Technology Collective, a group who’s work and website I can only recommend. Previously this week I wrote a blogpost about them already.

Here’s a quick checklist of basic things to make your Mac more secure:

  • Upgrade to OSX Mavericks as it contains additional safety measures
  • Use a password for your laptop
  • Use a password manager so you can have unique passwords for various things. Clean up the password list of those you no longer use.
  • Switch on Firewall
  • Switch on FileVault (because otherwise your HD can still be copied, without your password, through the firewire port e.g.) Do store your reactivation code away from your laptop, and don’t share it with Apple.
  • Use ’empty trash securely’ instead of ’empty trash’, so deleted files are not retrievable from your HD
  • Name your machine something innocuous, other than your own name (your machine name is being broadcast by your Mac on local networks)
  • Use an innocuous user name, not your own name, for the same reasons
  • Regularly remove items from the list of remembered wifi networks (your Mac broadcasts that list when searching for wifi, which is basically a list of places where you have been to), especially before and after traveling
  • Name your home / work wifi networks something innocuous
  • Switch of wifi and Bluetooth when not in use
  • Use a VPN service (this is helpful both for making surfing on open wifi more secure against listening in, to mask your true location, or mask your surfing patterns

From that list, Elmine and I already do some, but not all.

VPN was already in use by Elmine (to watch Dutch tv while traveling), and since the session I have also started using VPN from PrivateVPN.com, a Swedish service that seems widely recommended. It gives me a wide range of data centers to use as location, and allows me to connect up to 4 devices, and costs 66 Euro/yr. I also installed Viscosity (at $9) although you can do without. Viscosity gives me the option to switch between the various VPN locations available to me.

Filevault I didn’t use yet, as I did not know my HD could be copied without a password by connecting to one of the ports on the laptop. After returning home from Berlin, and doing a back-up, I’ve now switched it on. It means that when I am not logged in, all files on the laptop are encrypted.

I wasn’t aware of securely emptying trash before.

Cleaning up the list of wifi networks you’ve used I did every now and then already. But I wasn’t aware that my Mac actually broadcasts that list when trying to find a wifi network. The Tactical Tech people had a sniffer that showed us what info our machines were sending out. It was quite surprising to see info rolling across the screen I wasn’t aware of sharing.

All this stuff is of course not enough if you’re paranoid, but the things mentioned form a good list of basic common sense things to do, that help keep your machine safer and make it harder for others to violate your privacy.

Reclaim the Net, the area where, and motto of, the sessions took place