Connect with us

Technology

Mistakes to avoid if you just have to use public Wi-Fi

Published

on

Mistakes to avoid if you just have to use public Wi-Fi

Sometimes, we find ourselves in a situation where we urgently need an internet connection, but we are not at home or at work. We might want to do some online tasks, such as checking our email, browsing social media, or streaming our favorite show. However, what if the only available option is a public Wi-Fi network that we are not familiar with? How can we use it safely without exposing our privacy and security?

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

Free Wi-Fi sign (Kurt “CyberGuy” Knutsson)

This is a dilemma that many people face, even those who are experts in cybersecurity. Case in point, Blackhat, the world’s largest hacker conference held annually in Las Vegas, brings together thousands of cybersecurity professionals from all over the world. They attend the conference to learn about the latest cyberthreats and solutions. But even these skilled professionals can fall victim to the hazards of public Wi-Fi.

Blackhat convention (Blackhat) (Kurt “CyberGuy” Knutsson)

Advertisement

The event organizers have a playful way of exposing this vulnerability. They monitor the network traffic and display the names of those who have been tricked by a fake or compromised Wi-Fi hotspot. This is the notorious “Wall of Sheep.”

The Wall of Sheep showcases the unfortunate consequences of network security negligence. The people on this wall are not willing participants, but careless attendees whose private data was captured and revealed to everyone.

These stories should serve as a stark warning to anyone who is concerned about the potential pitfalls of using public Wi-Fi. Even the most experienced cybersecurity professionals can be vulnerable to unsecured networks.

Illustration of data and a hacker (Kurt “CyberGuy” Knutsson)

MORE: 5 WAYS TO SECURELY ACCESS WI-FI ON YOUR PHONE WHILE TRAVELING

Advertisement

Real-life examples of hackers’ victims at Blackhat

You may wonder what the big deal is about ending up on the Wall of Sheep, but it can be far worse. Some of the horror stories include:

The hotel hotspot trap

One attendee checked into a nearby hotel during Blackhat week and decided to catch up on work using the hotel’s open Wi-Fi network. Unbeknownst to them, a hacker had set up a rogue hotspot, mirroring the hotel’s official network. The hacker intercepted the attendee’s login credentials and gained access to sensitive work emails and confidential documents.

The overconfident developer

A seasoned developer known for his coding skills headed to Blackhat thinking he was invincible. He ignored warnings and connected to a rogue network named “SecureConferenceWiFi.” Confident in his skills, he used the same weak password for all his accounts. Little did he know that his email and social media accounts were compromised. This turned out to be an embarrassing leak of sensitive project data and personal conversations.

The crypto investor’s nightmare

There was also a crypto investor who attended to participate in discussions about blockchain technology. During the conference, he went to access his online wallet and entered his passphrase on an unsecured network. Within minutes, a hacker intercepted his credentials and emptied his wallet, leaving him penniless and devastated.

Illustration of Wi-Fi being used (Kurt “CyberGuy” Knutsson)

Advertisement

MORE: HOW TO CHECK IF SOMEONE IS STEALING YOUR WI-FI

You become sitting prey the moment you connect to a typical public Wi-Fi hotspot

Unless you’re using a VPN service, even locked or secured public Wi-Fi networks are not completely safe. Public Wi-Fi hotspots are usually free or secured Wi-Fi networks available in public spaces like shopping malls, libraries, coffee shops, airports and hotels, to name a few.

Scam hotspots are historically easily identified by generic names like “Free Wifi” to lure people to connect to their networks. Cybercriminals have gotten savvier by using similar names of popular legitimate hotspots. If you aren’t paying close attention, you will be the next victim.

Preventative tactics for avoiding bad public Wi-Fi hotspots

  • Most public Wi-Fi hotspots in the US don’t require payment information, so that’s a red flag that a hacker might be trying to steal personal and financial information from you.
  • Regardless of how it is named, most closed networks have a lock symbol indicating a Wi-Fi network that is more secure with the password available for patrons or provided by the establishment.
  • Usually, legitimate public networks have a prompt that shows up in your browser that asks you to agree to terms and conditions of use while on their network too.
  • Pay attention to the website address you’re going to:
    Most websites, especially those with sensitive data, usually employ their own encryption techniques, so they will likely have HTTPS in the web address so you can always check your URL before logging in.For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.

    Pay attention to the spelling of the website – there can be similar sites made to look like official sites. Could be ‘bannkofamerica’ instead of ‘bankofamerica.com’

  • Most websites, especially those with sensitive data, usually employ their own encryption techniques, so they will likely have HTTPS in the web address so you can always check your URL before logging in.For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.
  • For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.
  • Pay attention to the spelling of the website – there can be similar sites made to look like official sites. Could be ‘bannkofamerica’ instead of ‘bankofamerica.com’

Of course, you don’t have control over every scenario, and maybe using a public Wi-Fi hotspot is your last but necessary resort, especially while traveling. With a secure VPN service, you connect to a public Wi-Fi network without much worry. See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices.

A person using Wi-Fi on their laptop (Kurt “CyberGuy” Knutsson)

MORE: CLEVER TRICK TO MAKE A CONNECTION FASTER ON YOUR WI-FI NETWORK

Advertisement

5 common attacks on people using public Wi-Fi

1) ‘Evil twin’ attacks

Imagine being at your favorite coffee shop and connecting to what appears to be their free Wi-Fi network. When you begin to browse the web, you are completely unaware that you’ve fallen victim to an “evil twin attack” as hackers have set up a malicious hotspot with the same name as a legitimate network. The attacker is now able to intercept data, steal your login credentials, and launch further attacks.

Solution

When you use a VPN service, it establishes a level of encryption between the end-user and a website regardless of what network you join, so any intercepted data cannot be read by the hacker without a correct decryption key.

2) ‘Man-in-the-middle’ attacks (MITM)

“Man-in-the-middle” attackers position themselves between your device and the intended server. Unbeknownst to you, this allows them to intercept all data traffic, including every email, chat message, or login attempt. Your sensitive data, private conversations, and financial transactions are now all available to them.

Solution

Advertisement

Because VPN services encrypt your data, even if hackers intercept your data, it isn’t accessible to them. VPN services work both for your personal computer and mobile devices, which means the protection of a VPN service can travel anywhere you go.

3) The ‘packet sniffing’ hack (Software reads your data)

Whenever you connect to any network, your devices send data packets that can be read by free software, such as Wireshark. When you’re on an unencrypted network, hackers can use free software, such as Wireshark, to read those data packets. Ironically, with such software, you can analyze web traffic to find security problems and vulnerabilities that need to be fixed or exploited.

Solution

Even though hackers can still see that there are data packets being sent, if you’re using a VPN, your data is traveling through a secure and encrypted tunnel, protecting against exposure and use by hackers. Because your data is encrypted, it renders your information virtually useless to hackers. And because they can see that you’re connecting via a VPN service, hackers can see that you would be harder to hack.

4) The ‘sidejacking’ hack

When a hacker employs the sidejacking technique, they essentially take the information gleaned from packet sniffing to be used in real-time, usually on-location, to exploit its victim. Once intercepted, the data is then used to gain access to the original destination website or app.

Advertisement

The hacker uses packet sniffing to read network traffic and ‘steal cookies.’ Cookies are files that a website stores on your mobile phone, tablet, or computer as you browse the web. Cookies store a variety of information, from language preferences to personal data such as name, physical address, or email address.

This allows websites to customize your experience. Once hackers find nonsecure socket layer cookies (just HTTP:// not HTTPS://), the information sent to the website or app by you is then captured. This allows the hacker to use what is captured to exploit private information and gain access to this and other sites.

Solution

Hackers scan web traffic to spot unencrypted or exploitable encrypted data, so having a secure VPN service most likely takes your data ‘out of the running’ for most hackers as they can see it is encrypted. And even if they do try, information going from and to your device is encrypted, so they will likely be unable to access the information itself.

5) Malware infection

Public Wi-Fi networks are often secured poorly or entirely unsecured. This allows cybercriminals the ability to infect your device with various forms of malicious software, including spyware and ransomware. Once infected, your data is at risk of theft or encryption. Your device can also be turned into a puppet for remote control.

Advertisement

Solution

If you forget to turn on your VPN service while out and about, you might panic at the thought of all the potential compromises outlined above. If, however, you’re running an antivirus program in the background of your device, you’d still be protected should a hacker infiltrate your device. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links, which may install malware on your devices and allow hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.

A woman using a laptop (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

Understanding the risks and taking precautions while using public Wi-Fi can protect you and your data. Keep in mind that using your cell phone and its data network should be your preference if a login is required or if you will be sharing personal or financial data. Remember that unless you are in Las Vegas at Blackhat, you won’t find yourself on a “Wall of Sheep,” but it could be something much worse.

Have you ever encountered a risky situation while using public Wi-Fi? If so, how did you handle it? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

You need to listen to Sudan Archives’ violin opus for the club

Published

on

You need to listen to Sudan Archives’ violin opus for the club

My introduction to Sudan Archives was the song “Nont for Sale” from her first EP Sink in 2018. I’ve been a die-hard fan ever since. With each album, she finds new ways to sculpt the sound of her violin, contorting it in defiance of expectations.

Athena found her in conversation with it, leaving its timbre largely recognizable and organic, veering from experimental pop to more ambient passages. Natural Brown Prom Queen embraced the aesthetics of sound collage, samples, and modern R&B, blending her violin with more expressly electronic elements. The BPM has identifiable violin passages, but it fully embraces the more technological elements of Sudan Archives’ sound.

The album opens with “Dead,” which begins with gentle orchestral swells and a processed, but identifiable violin. Then, at the 1:30 mark, the beat drops — what sounds like high-pitched vocal chops dance around the stereo field, and an undulating synth bass drags he whole thing to the dance floor. The track serves as something of a mission statement, with multiple movements exploring the various incarnations of Archives’ sound as she asks, “Where my old self at? Where my nеw self at?” answering herself by chanting “right here, right hеre” in response to each.

What follows is a volatile tour of dance music, from the four-on-the-floor funk of “My Type,” to the trap-tinged tongue-in-cheek sex raps of “Ms. Pac Man” — there’s even an Irish jig in the middle of “She Got Pain.” Across the record, there are flashes of autotune, drum ’n’ bass breaks, house piano stabs, techno synth bass, and, of course, soaring violin flourishes. Often, there are multiple of these things in a single track as Archives eschews typical pop song structures, bouncing giddily from one style to the next.

Unsurprisingly, the tempo on The BPM is generally amped up compared to much of Archive’s previous records. But it’s not all club bangers. “Come and Find You,” winks at 80s and early 90s R&B of acts like Sade. And often the lyrics turn to matters of the heart, “I found a way to travel to you even when we’re not in sync, I’m gonna find my way back to you, Even when it’s really hard I like the push and pull,” she sings on “David & Goliath.”

Advertisement

The BPM is a dense, hectic record that revels in its unpredictability and sonic shrapnel. It’s also my favorite record of 2025. Despite only coming out in mid-October, it was my most listened to album according to my Apple Music Recap. Sudan Archives The BPM is available on Bandcamp and most streaming services, including Qobuz, Tidal, Apple Music, Deezer, YouTube Music, and Spotify.

Continue Reading

Technology

Smart home hacking fears: What’s real and what’s hype

Published

on

Smart home hacking fears: What’s real and what’s hype

NEWYou can now listen to Fox News articles!

News of more than 120,000 Korean home cameras being hacked recently can shake your confidence in connected devices. Stories like that make you picture cybercriminals breaking into homes with high-tech gadgets and spying on families through smart cams. That reaction is natural. But most of these headlines leave out important context that can help you breathe a little easier.

First, smart home hacking is rare. Most incidents stem from weak passwords or from someone you already know, rather than from a stranger with advanced tools. Today’s smart home brands push out updates to block intrusion attempts, including patches for new AI-related vulnerabilities that often make headlines.

Let’s break down what actually puts a smart home at risk and what you can do to stay safe.

Sign up for my FREE CyberGuy Report

Advertisement

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

SMART HOME DEVICE MAKER EXPOSES 2.7 BILLION RECORDS IN HUGE DATA BREACH

Smart home hacking headlines can look scary, but most threats come from weak passwords rather than targeted attacks. (Kurt “CyberGuy” Knutsson)

Why criminals are not circling your house with hacking gear

Many people imagine cybercriminals driving around neighborhoods with scanners that look for vulnerable devices. In reality, Wi-Fi ranges and technical limits make that nearly impossible. Even high-profile hacks of casinos and large companies do not translate to criminals trying to breach residential smart locks for petty theft.

Burglars still choose low-tech methods. They look for unlocked doors or easy entry points. They avoid complicated hacking tools because the payoff is too small to justify the work.

Advertisement

So how do smart homes get hacked? Here are the real attack paths and how they work.

Common ways smart homes get attacked

Smart homes face a handful of digital threats, but most come from broad automated attacks rather than someone targeting your house.

1) Automated online attacks

Bots constantly scan the internet for weak passwords and outdated logins. These brute force attacks throw billions of guesses at connected accounts. When one works, the device becomes part of a botnet used for future attacks. That doesn’t mean someone is targeting your home on purpose. Bots search for anything they can breach. A strong password stops them.

2) Phishing attempts

Some phishing emails impersonate smart home brands. Clicking a fake link or sharing login details can open the door for criminals to reach your network. Even a general phishing attack can expose your Wi-Fi info and lead to broader access.

3) Data breaches from IoT companies

Hackers often go after company servers, not individual homes. These breaches may expose account details or stored camera footage kept in the cloud. Criminals may sell that data to others who might try to use it. It rarely leads to direct smart home hacking, but it still puts your accounts at risk.

Advertisement

4) Attacks on device communications

Early IoT devices had vulnerabilities that allowed criminals to intercept the data they sent and received. (IoT stands for Internet of Things and includes everyday connected gadgets like smart plugs, smart thermostats or Wi-Fi cameras.) Modern products now use stronger encryption, making these attacks extremely rare in the real world.

5) Bluetooth malware

Bluetooth issues still pop up from time to time, but most modern smart home devices use stronger security than older models. When a new flaw is discovered, companies usually release fast patches, which is why it’s important to keep your apps and gadgets updated. Today, these Bluetooth risks rarely lead to real smart home problems.

ADT HACKED: IS YOUR HOME SECURITY SYSTEM REALLY SECURE?

Who actually tries to hack smart homes

When hacking happens, it usually involves someone with some level of access already. In many cases, no technical hack occurs at all.

Simple steps like stronger Wi-Fi security and regular updates go a long way toward protecting connected devices. ( Al Drago/Bloomberg via Getty Images)

Advertisement

A relation or acquaintance

Exes, former roommates or relatives often know login info. They may try to spy or cause trouble. Update all passwords if you suspect this.

Untrustworthy employees

There have been cases where employees at security companies snooped through camera feeds. This isn’t remote hacking. It’s a misuse of internal access.

Data thieves

They steal account lists and login details to sell. Others may buy those lists and try to log in using exposed credentials.

Blackmail scammers

Some send fake messages claiming they hacked your cameras and threaten you. Most of these scams rely on lies because they have no access at all.

Foreign governments

Some banned foreign manufacturers pose surveillance risks. The FCC maintains a list of companies that cannot sell security tech in the U.S. Always check that list before buying unfamiliar brands.

Advertisement

Smart home devices that can raise concerns

Some everyday gadgets create small but real entry points for trouble, especially when their settings or security features get overlooked.

Smart fridges

They often arrive with default passwords that owners forget to change. Older models may use outdated IoT protocols with weaker protections. Many do not get frequent security updates.

Wi-Fi baby monitors

Wi-Fi offers convenience but also adds risk. Weak routers and poor passwords can allow strangers to access a feed. Closed network monitors avoid Wi-Fi risks but still face basic signal interception attempts.

Smart bulbs

During setup, some bulbs broadcast an open temporary network. If a criminal joins at the exact right moment, they could reach the rest of your devices. These cases are rare but possible in theory.

Smart speakers

Voice ordering can be exploited by curious kids or guests. Set a purchase PIN so no one can order items with simple voice commands.

Advertisement

Steps to stay safe in your smart home

Strong habits and a few simple tools can block the most common threats that target connected homes.

1) Use strong passwords

Choose long, complex passwords for your Wi-Fi router and smart home apps. A password manager makes this simple. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

2) Turn on two-factor authentication

Brands like Ring and Blink already use it. Add two-factor authentication (2FA) to every account that supports it.

Advertisement

3) Use a reputable data removal service

Removing your personal details from data broker sites helps prevent criminals from using leaked or scraped information to access your accounts or identify your home.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

4) Add strong antivirus software on phones and computers

Strong antivirus protection blocks malware that could expose login details or give criminals a path into the devices that manage your smart home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Advertisement

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Choosing brands with clear privacy practices and local storage options helps keep your home and data in your control. (CyberGuy.com)

5) Choose brands with strong encryption

Pick smart home products from companies that explain how they protect your data and use modern encryption to lock down your footage and account details. Look for brands that publish clear security policies, offer regular updates and show how they keep your information private.

6) Store sensitive footage locally

Pick security cameras that let you save video directly to an SD card or a home hub, rather than uploading it to the cloud. This keeps your recordings under your control (and helps protect them if a company server is breached). Many cameras from trusted lines support local storage, so you do not have to rely on a company server.

7) Keep devices updated

Install firmware updates quickly. Enable automatic updates when possible. Replace older gadgets that no longer receive patches.

Advertisement

8) Secure your Wi-Fi

Your router is the front door to your smart home, so lock it down with a few simple tweaks. Use WPA3 encryption if your router supports it, rename the default network, and install firmware updates to patch security holes. For a full step-by-step guide on tightening your home network, check out our instructions in “How to set up a home network like a pro.”

Kurt’s key takeaways

Smart homes feel intimidating when scary headlines surface. But when you look at real-world data, you see far fewer risks than the stories suggest. Most attacks rely on weak passwords, poor router settings or old devices. With the right habits, your smart home can stay both convenient and secure.

What smart home risk concerns you most, and what part of your setup makes you nervous? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

A new old idea about video stores

Published

on

A new old idea about video stores

Hi, friends! Welcome to Installer No. 109, your guide to the best and Verge-iest stuff in the world. (If you’re new here, welcome, hope you’re staying warm, and also you can read all the old editions at the Installer homepage.)

This week, I’ve been reading about Google Maps and shopaganda and life as a pop star, finally getting to watch F1 now that it’s streaming, rewatching the first two Avatars ahead of the next one’s release, pretending the new Taylor Swift tour doc is a reasonable replacement for actually seeing the tour, buying a bunch of Ikea smart buttons now that they’re on sale in the US, playing with the excellent new Obsidian update for mobile devices, and spending altogether too much time trying to figure out why my house is so cold.

I also have for you a fun new source of movies to watch, a game to play this holiday season, a new speaker worth a listen, and much more.

And I have a question, looking ahead to the last Installer of the year: What’s your favorite new thing from this year? It doesn’t have to be new this year, just new to you. (And you don’t have to pick your one favorite forever, just hit me with something new you loved this year.) I want to hear about books you discovered, podcasts you’re into, decade-old games you’re loving, things that made your house or office or whatever better, anything and everything is fair game. I’ll share mine if you share yours — email me at installer@theverge.com, find me on Threads at @imdavidpierce, or message me on Signal at @davidpierce.11.

All right, lots of stuff this week! Let’s go.

Advertisement

(As always, the best part of Installer is your ideas and tips. What are you playing / reading / watching / listening to / cuddling up with by the fire this week? Tell me everything: installer@theverge.com. And if you know someone else who might enjoy Installer, forward it to them and tell them to subscribe here.)

  • The Letterboxd Video Store. A tightly curated set of movies to rent, filled with stuff Letterboxd knows people want to see but that you almost certainly won’t find anywhere else. Like all things Letterboxd, it’s all a bit high-minded, but I love this idea and suspect I will check it often. Perfect amount of stuff in there, too.
  • Skate Story. A late-breaking contender for the best game of 2025! You’re a demon, you skate. And skate. And skate. A lot of reviews say the controls take a little getting used to, but that they give way to something that feels great and looks spectacular.
  • The iFixit app. I can’t say I’m shocked that iFixit’s AI bot, FixBot, isn’t quite up to the task of automatically sussing out how to fix all your gadgets. But that’s fine; I’ll just be using this new iOS and Android app as a library of manuals and repair guides. Plus, the built-in battery monitor for your phone is extremely clever.
  • Darkroom 7.0. I totally forgot about Darkroom! It has long been one of the best photo editors for Apple devices, and the new version cleans up the user experience a bunch while also adding some retro-film effects and some high-end video features. Also: Being able to zoom all the way down to the individual pixel is pretty wild.
  • Google Photos. On the other end of the professional spectrum, the Google Photos app just got a bunch of CapCut-style video editing features along with some better tools for making highlight reels and slideshows. I’m suddenly tempted to make a lot of stupid year-in-review stuff to send to my friends.
  • Kill Bill: The Whole Bloody Affair. I’m a sucker for a weird re-edit of a movie, so this is extremely my jam: two Kill Bill movies turned into the single, 4.5-hour bloodfest they were apparently always supposed to be. Apparently it’s a totally different story now! This feels like the best possible use of a weekend afternoon in a movie theater.
  • The Wiim Sound Lite. From one of the Installerverse’s favorite audio brands comes a new $229 portable speaker that looks like a strong competitor to Sonos’ new gear. (Or a HomePod, I guess.) If I were starting a home audio system right now, I’d probably start with Wiim.
  • Google Disco. An experimental new browser based on a weird and novel idea: turning collections of tabs into AI-generated, one-off web apps. I don’t expect Disco itself to ever leave Google Labs, but there’s something awfully futuristic in here.

Raffi Chilingaryan’s Spotted in Prod has long been one of my favorite sites for finding cool design and product touches from around the web. (I feel like, if you’re an app developer, your goal should be to make something weird and cool enough to catch Raffi’s eye.) Raffi’s also a designer and developer. He says right now he’s working on two iOS apps, a Strava competitor called Runbuds and a super clever alarm app called Shift that is designed to help you wake up earlier.

That’s all well and good, but my personal favorite Raffi thing is his new personal website, which includes an actual interactive version of his phone, so you can click around his homescreen and see into his apps. Dude took the whole “show us your homescreen” and just put me to shame on it. (Also, it’s a .zip domain, which I kind of love for a personal site?)

Anyway, all I have for you is a humble screenshot, but here’s Raffi’s homescreen, plus some info on the apps he uses and why:

The phone: iPhone 15 Pro.

The wallpaper: Solid gray background.

Advertisement

The apps: Retro, (Not Boring) Camera, Google Maps, Photos, Claude, Safari, Apple Notes.

I have my apps organized into 4 folders (money, work, social, vibes), but that’s a bit boring so I’ll break it out like this:

  • TestFlights you should keep an eye on: Arena is a community of curious internet folks that I’ve long wanted to immerse myself into but only once the iOS build got to its current level did I find that easy to do. Net is a promising email startup that uses an AI card stack to make flipping through your emails a breeze with impeccable UX.
  • Apps that I will shill till I die: Retro is a weekly photo journal that inspires me to take more photos and lets you send POSTCARDS to your friends & family. (Not Boring) Camera is a gorgeous skeuomorphic camera with really nice presets. Bump is Find My Friends for Gen Z. Radio Garden lets you explore the world through local radio streams. Particle is an amazing AI native news app with super fluid UX. Mercury is the most lovely fintech product for both businesses and now personal banking — I hope they take over the world.

I also asked Raffi to share a few things he’s into right now. Here’s what he sent back:

  • TBPN & Stratechery podcasts.
  • Discovering creative developers and design engineers who showcase their work on tech Twitter.
  • Using Claude Code to ship iOS apps as someone without a formal background in software engineering.
  • The resurgence of Pokémon and the Trading Card Game app.

Here’s what the Installer community is into this week. I want to know what you’re into right now as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. For even more great recommendations, check out the replies to this post on Threads and this post on Bluesky.

“Now that finals are over I have been diving into Ghost of Yotei. Crazy beautiful game.” — Jeremy

“Finally reading “The Anthropocene Reviewed by John Green. Despite John living an entirely different life than me, his experiences and understanding of the world possess so many similarities to mine. I give it five stars.” — Christopher

“I feel like everyone is sleeping on Amazon Luna, the cloud stream gaming platform that Amazon includes with its yearly subscription. It consistently has A+ games on it. I’m currently addicted to the newest Bethesda Indiana Jones game… I hooked up my PS4 controller and am playing one of the greatest games of the past few years at no extra cost.” — Alex

Advertisement

Audible had an insane three months for $1 deal, so I’ve been getting back into audiobooks while I do chores and commute. Currently listening to / reading Alchemised by SenLinYu and it’s fantastic.” — Colin

“Got myself a Teenage Engineering PO-12 drum machine on a rare sale. What a glorious little device. Lovely design, and hours of music fun, even for a complete amateur like myself. Plus – it even has a headphone jack! That said – I kind of wish that I’d gotten the PO-20 instead.” —

StoneBlock 4, an amazing Minecraft modpack, is ruining all my productivity this week.” — Anne

“Yesterday I watched a badass Polish dude ski down Mt. Everest without oxygen. The feat is unbelievable, but I still think about the incredible footage.” — Denim

“I’m OBSESSED with the Xbloom robotic barista machine I’ve owned for a few weeks now. It’s basically like having a barista on demand 24/7 – if you love drip coffee this is an endgame coffee machine.” — Andrew

Advertisement

“+1 for Skate Story. Also, the OST… 👌” — Andy

I spent a bunch of time this week learning about Model Context Protocol, which is one of those things that most people will never think about but might be crucial to how technology works going forward. The MCP story is fascinating, but if you just want to quickly understand how the protocol works, and why it’s so important to the whole supposed AI-based future of everything, you should watch this 20-minute video. Greg Isenberg and Ras Mic walk through the whole stack at the perfect level of complexity, and with visuals that actually help (unlike so many videos I watched this week). If every educational video on YouTube were like this one, I’d be a much smarter person.

One more Installer to come this year. See you next week!

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading
Advertisement

Trending