Hi, friends! Welcome to Installer No. 109, your guide to the best and Verge-iest stuff in the world. (If you’re new here, welcome, hope you’re staying warm, and also you can read all the old editions at the Installer homepage.)
Technology
Stop these V-day scams before they break your heart and your bank account
valen
As Valentine’s Day approaches, many people have love on the brain. Online romance, however, has complicated courtships and coupling dynamics by adding a layer of potential deception to every connection. While we do want to keep romance alive, it’s important to enter the world of online dating with open eyes and ears as much as open hearts. It’s vital to stay vigilant this Valentine’s Day so you don’t become a victim of a scamming Casanova.
One of the most common risks of online dating is falling for a catfish, someone who pretends to be someone else online. This is why Patricia’s email to us felt particularly relevant.
“I need your help. I have met a guy online and have been chatting for months. At first I was able to chat through his email and also by phone. Recently, some things have been said that are making me feel uneasy. I have used Truthfinder, People Finder, and Been Verified and can’t get any information on this guy. When I asked him about that, he told me has been hacked several times, so he doesn’t put anything on the internet.
Someone suggested that it’s possible he is using a VPN. Could this be possible, and if you think it is, can you please tell me how I can get the information I am seeking about this guy? Until recently, I was beginning to think that we may have a lot of things in common, but now, I am not sure.”
—Patricia, Mt. Pleasant, WI
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
Someone holding a mobile phone showing an online dating match. (Kurt “CyberGuy” Knutsson )
The high stakes of romance scams
Patricia, you aren’t the only one who has concerns over a developing online relationship. According to the Federal Trade Commission (FTC), in the most recent data, about 70,000 people have reported being victims of a romantic scam with reported losses of up to $1.3 billion; there are high stakes involved beyond just experiencing potential heartbreak.
MORE: BEST VALENTINES DAY GIFTS 2024
Behind the virtual veil
It is certainly possible that the person you’ve been chatting with online could be using a virtual private network (VPN), which is a tool that encrypts your internet connection and routes it through a remote server. While the use of a VPN can make it hard to connect the online activity to a physical location, it would not be able to keep his information from being online.
There are, however, data removal services such as the ones we’ve covered here that can be used to limit his information online. Either he’s being proactive about his privacy and safety, or he’s a scammer with a well-thought-out strategy to scam you out of your money, personal information and identity.
MORE: DON’T EVER DO THIS ON A DATING APP
5 warning signs of online heart-breaking scammers
1) Quickly tell you they love you or try to create a strong emotional connection with you
2) Always have an excuse for not meeting you in person or video chatting with you
3) Ask you for money, gift cards or other favors, often for urgent or personal reasons
4) Send you links or attachments that may contain malware or phishing sites
5) Have inconsistent or vague details about themselves, their location or their work
Woman in front of laptop making a heart symbol with hands.
MORE: HOW TO PROTECT YOURSELF FROM SOCIAL MEDIA SCAMMERS
Top scams to look out for this Valentine’s Day
With a special eye toward Valentine’s Day, here are some top scams that are particularly rampant during this holiday.
Don’t click that Valentine: Scammers are sending out automated Valentine’s Day cards (usually through chatbots) made to look like they’re from friends and family, but once opened or link clicked (to retrieve the e-card), malicious software can be installed or your device hacked.
Be careful where you look for love: There has been an increase in new domains registered with romantic words around this time of year. Many of these websites have been flagged as potentially dangerous. Stick to established online dating services that include security measures. You can always do a separate search with the name of the dating site you want to check out with words like “scam” or “fake” to see if there has been any negative feedback or experiences.
Do practice good judgment about what you share: Sextortion is a technique where romantic scammers get you to send compromising photos or videos of yourself and then blackmail you for more compromising materials or money.
Sometimes, random scammers will bluff and claim they have a pornographic video of you that will be sent to all your contacts on your phone or computer if you don’t pay them, usually in Bitcoin. While this is an empty threat, shocked recipients of these types of emails have fallen victim to sending over money.
MORE: HOW TO PROTECT YOURSELF FROM & ‘VISHING’ SCAMS
3 steps to avoid romance scammers and stay safe
1) Go slow: Don’t rush into any action, whether it is giving away your personal information or paying for anything. Trust takes time, so it’s okay to build this relationship one interaction at a time. You wouldn’t give a stranger at the grocery store your Social Security number or hand over all your money in your wallet in exchange for a check with your fitness instructor.
2) Trust your instinct: If something doesn’t feel right, it’s OK to end the connection with or without “evidence.” Don’t do anything that feels unsafe or wrong.
3) Saying goodbye: If you don’t feel safe, it is okay to end the connection without a conversation, especially if you feel like you’ll be manipulated into further conversation. It is okay to cut off contact and sometimes even block this person online.
MORE: HOW TO AVOID THE WORST DATING APP SCAMMERS
What to do if you suspect someone is scamming you online?
Do not send money or personal information: If you receive unsolicited requests for money, bank account details or other personal information, do not comply. Scammers often use urgency and emotional manipulation to pressure victims into sharing sensitive data or making payments.
Stay skeptical: Be cautious when dealing with unknown individuals online. If something seems too good to be true (such as winning a lottery you never entered), it probably is. Trust your instincts and verify any claims independently.
Verify the source: Before taking any action, verify the legitimacy of the person or organization contacting you. Search for their name, email address or phone number online. Look for reviews, complaints or warnings related to their activities.
Check for red flags: Scammers often create a sense of urgency to rush victims into making decisions. Offers that promise huge rewards for minimal effort are often scams. Be cautious if someone asks for your Social Security number, credit card details or passwords. Scammers may ask for payment via gift cards, wire transfers or cryptocurrency.
Install good antivirus software on all your devices because while you may be swayed by sweet nothings, your antivirus software won’t be. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links which may install malware on your devices, allowing hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.
SCAMS ARE THE POLICY PROBLEM NO ONE IS TALKING ABOUT
Hands holding an iPhone with breakup texts. (Kurt “CyberGuy” Knutsson)
MORE: HOW CUNNING ROMANCE SCAMMERS DUPED FLORIDA MAN OF NEARLY A HALF MILLION DOLLARS
What to do if you suspect you’re a victim of a romantic scammer?
If, like Patricia, you suspect you may have fallen prey to a romantic scammer, check out some of the resources and action steps to take.
1. Log out of accounts
First, log out of all your accounts on every web browser on your computer. Once you’ve done that, you should clear your browser history.
2. Scan your device
Use a trusted antivirus program to run a comprehensive scan to detect and remove any lingering traces of malware. The best way to protect yourself from having your data breached by romance scammers is to have antivirus protection installed on all your devices. Find my review of Best Antivirus Protection here.
3. Change your passwords
If romance scammers expose your passwords, be sure to change them immediately. Be sure to create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.
4. Use 2-factor authentication
Implementing 2-factor authentication is just an extra shield that will prevent a romance scammer from getting into your accounts. This way, even if someone steals your password or if you gave your password to a scammer, they will not be able to access your account without the second factor, such as a code sent to your phone or email.
5. Report the romance scammer
If you encounter a suspicious profile or communication on social media, online marketplaces or dating apps, report it to the platform. Also, report scams to your local police and file a complaint with the FTC at ftc.gov/complaint or to the Internet Crimes Complaint Center.
6. Search BBB’s scam tracker
Another tool to use is the BBB’s Scam Tracker. You can use it to search keywords or by category to see if your specific scenario or person is being mentioned in any scams posted.
7. Contact your financial institutions
Contact your bank, credit card company or other financial institutions if you suspect any fraudulent activity on your accounts.
8. Monitor credit reports
Monitor your credit reports and scores for any signs of identity theft or unauthorized inquiries.
9. Invest in Identity theft software
You’ll also want to invest in identity theft software to protect your identity and financial accounts. Theft protection companies can monitor personal information like your home title, Social Security number (SSN), phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.
Kurt’s key takeaways
New scams, romantic or otherwise, seem to multiply, especially during the holidays, as these scammers prey on tender heartstrings. There are many dos and don’ts when it comes to online dating and cyber safety, but nothing replaces your instinct and common sense.
What’s the worst romantic scam you or someone you know has experienced? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most-asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
You need to listen to Sudan Archives’ violin opus for the club
My introduction to Sudan Archives was the song “Nont for Sale” from her first EP Sink in 2018. I’ve been a die-hard fan ever since. With each album, she finds new ways to sculpt the sound of her violin, contorting it in defiance of expectations.
Athena found her in conversation with it, leaving its timbre largely recognizable and organic, veering from experimental pop to more ambient passages. Natural Brown Prom Queen embraced the aesthetics of sound collage, samples, and modern R&B, blending her violin with more expressly electronic elements. The BPM has identifiable violin passages, but it fully embraces the more technological elements of Sudan Archives’ sound.
The album opens with “Dead,” which begins with gentle orchestral swells and a processed, but identifiable violin. Then, at the 1:30 mark, the beat drops — what sounds like high-pitched vocal chops dance around the stereo field, and an undulating synth bass drags he whole thing to the dance floor. The track serves as something of a mission statement, with multiple movements exploring the various incarnations of Archives’ sound as she asks, “Where my old self at? Where my nеw self at?” answering herself by chanting “right here, right hеre” in response to each.
What follows is a volatile tour of dance music, from the four-on-the-floor funk of “My Type,” to the trap-tinged tongue-in-cheek sex raps of “Ms. Pac Man” — there’s even an Irish jig in the middle of “She Got Pain.” Across the record, there are flashes of autotune, drum ’n’ bass breaks, house piano stabs, techno synth bass, and, of course, soaring violin flourishes. Often, there are multiple of these things in a single track as Archives eschews typical pop song structures, bouncing giddily from one style to the next.
Unsurprisingly, the tempo on The BPM is generally amped up compared to much of Archive’s previous records. But it’s not all club bangers. “Come and Find You,” winks at 80s and early 90s R&B of acts like Sade. And often the lyrics turn to matters of the heart, “I found a way to travel to you even when we’re not in sync, I’m gonna find my way back to you, Even when it’s really hard I like the push and pull,” she sings on “David & Goliath.”
The BPM is a dense, hectic record that revels in its unpredictability and sonic shrapnel. It’s also my favorite record of 2025. Despite only coming out in mid-October, it was my most listened to album according to my Apple Music Recap. Sudan Archives The BPM is available on Bandcamp and most streaming services, including Qobuz, Tidal, Apple Music, Deezer, YouTube Music, and Spotify.
Technology
Smart home hacking fears: What’s real and what’s hype
NEWYou can now listen to Fox News articles!
News of more than 120,000 Korean home cameras being hacked recently can shake your confidence in connected devices. Stories like that make you picture cybercriminals breaking into homes with high-tech gadgets and spying on families through smart cams. That reaction is natural. But most of these headlines leave out important context that can help you breathe a little easier.
First, smart home hacking is rare. Most incidents stem from weak passwords or from someone you already know, rather than from a stranger with advanced tools. Today’s smart home brands push out updates to block intrusion attempts, including patches for new AI-related vulnerabilities that often make headlines.
Let’s break down what actually puts a smart home at risk and what you can do to stay safe.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
SMART HOME DEVICE MAKER EXPOSES 2.7 BILLION RECORDS IN HUGE DATA BREACH
Smart home hacking headlines can look scary, but most threats come from weak passwords rather than targeted attacks. (Kurt “CyberGuy” Knutsson)
Why criminals are not circling your house with hacking gear
Many people imagine cybercriminals driving around neighborhoods with scanners that look for vulnerable devices. In reality, Wi-Fi ranges and technical limits make that nearly impossible. Even high-profile hacks of casinos and large companies do not translate to criminals trying to breach residential smart locks for petty theft.
Burglars still choose low-tech methods. They look for unlocked doors or easy entry points. They avoid complicated hacking tools because the payoff is too small to justify the work.
So how do smart homes get hacked? Here are the real attack paths and how they work.
Common ways smart homes get attacked
Smart homes face a handful of digital threats, but most come from broad automated attacks rather than someone targeting your house.
1) Automated online attacks
Bots constantly scan the internet for weak passwords and outdated logins. These brute force attacks throw billions of guesses at connected accounts. When one works, the device becomes part of a botnet used for future attacks. That doesn’t mean someone is targeting your home on purpose. Bots search for anything they can breach. A strong password stops them.
2) Phishing attempts
Some phishing emails impersonate smart home brands. Clicking a fake link or sharing login details can open the door for criminals to reach your network. Even a general phishing attack can expose your Wi-Fi info and lead to broader access.
3) Data breaches from IoT companies
Hackers often go after company servers, not individual homes. These breaches may expose account details or stored camera footage kept in the cloud. Criminals may sell that data to others who might try to use it. It rarely leads to direct smart home hacking, but it still puts your accounts at risk.
4) Attacks on device communications
Early IoT devices had vulnerabilities that allowed criminals to intercept the data they sent and received. (IoT stands for Internet of Things and includes everyday connected gadgets like smart plugs, smart thermostats or Wi-Fi cameras.) Modern products now use stronger encryption, making these attacks extremely rare in the real world.
5) Bluetooth malware
Bluetooth issues still pop up from time to time, but most modern smart home devices use stronger security than older models. When a new flaw is discovered, companies usually release fast patches, which is why it’s important to keep your apps and gadgets updated. Today, these Bluetooth risks rarely lead to real smart home problems.
ADT HACKED: IS YOUR HOME SECURITY SYSTEM REALLY SECURE?
Who actually tries to hack smart homes
When hacking happens, it usually involves someone with some level of access already. In many cases, no technical hack occurs at all.
Simple steps like stronger Wi-Fi security and regular updates go a long way toward protecting connected devices. ( Al Drago/Bloomberg via Getty Images)
A relation or acquaintance
Exes, former roommates or relatives often know login info. They may try to spy or cause trouble. Update all passwords if you suspect this.
Untrustworthy employees
There have been cases where employees at security companies snooped through camera feeds. This isn’t remote hacking. It’s a misuse of internal access.
Data thieves
They steal account lists and login details to sell. Others may buy those lists and try to log in using exposed credentials.
Blackmail scammers
Some send fake messages claiming they hacked your cameras and threaten you. Most of these scams rely on lies because they have no access at all.
Foreign governments
Some banned foreign manufacturers pose surveillance risks. The FCC maintains a list of companies that cannot sell security tech in the U.S. Always check that list before buying unfamiliar brands.
Smart home devices that can raise concerns
Some everyday gadgets create small but real entry points for trouble, especially when their settings or security features get overlooked.
Smart fridges
They often arrive with default passwords that owners forget to change. Older models may use outdated IoT protocols with weaker protections. Many do not get frequent security updates.
Wi-Fi baby monitors
Wi-Fi offers convenience but also adds risk. Weak routers and poor passwords can allow strangers to access a feed. Closed network monitors avoid Wi-Fi risks but still face basic signal interception attempts.
Smart bulbs
During setup, some bulbs broadcast an open temporary network. If a criminal joins at the exact right moment, they could reach the rest of your devices. These cases are rare but possible in theory.
Smart speakers
Voice ordering can be exploited by curious kids or guests. Set a purchase PIN so no one can order items with simple voice commands.
Steps to stay safe in your smart home
Strong habits and a few simple tools can block the most common threats that target connected homes.
1) Use strong passwords
Choose long, complex passwords for your Wi-Fi router and smart home apps. A password manager makes this simple. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com
2) Turn on two-factor authentication
Brands like Ring and Blink already use it. Add two-factor authentication (2FA) to every account that supports it.
3) Use a reputable data removal service
Removing your personal details from data broker sites helps prevent criminals from using leaked or scraped information to access your accounts or identify your home.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
4) Add strong antivirus software on phones and computers
Strong antivirus protection blocks malware that could expose login details or give criminals a path into the devices that manage your smart home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
Choosing brands with clear privacy practices and local storage options helps keep your home and data in your control. (CyberGuy.com)
5) Choose brands with strong encryption
Pick smart home products from companies that explain how they protect your data and use modern encryption to lock down your footage and account details. Look for brands that publish clear security policies, offer regular updates and show how they keep your information private.
6) Store sensitive footage locally
Pick security cameras that let you save video directly to an SD card or a home hub, rather than uploading it to the cloud. This keeps your recordings under your control (and helps protect them if a company server is breached). Many cameras from trusted lines support local storage, so you do not have to rely on a company server.
7) Keep devices updated
Install firmware updates quickly. Enable automatic updates when possible. Replace older gadgets that no longer receive patches.
8) Secure your Wi-Fi
Your router is the front door to your smart home, so lock it down with a few simple tweaks. Use WPA3 encryption if your router supports it, rename the default network, and install firmware updates to patch security holes. For a full step-by-step guide on tightening your home network, check out our instructions in “How to set up a home network like a pro.”
Kurt’s key takeaways
Smart homes feel intimidating when scary headlines surface. But when you look at real-world data, you see far fewer risks than the stories suggest. Most attacks rely on weak passwords, poor router settings or old devices. With the right habits, your smart home can stay both convenient and secure.
What smart home risk concerns you most, and what part of your setup makes you nervous? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
A new old idea about video stores
This week, I’ve been reading about Google Maps and shopaganda and life as a pop star, finally getting to watch F1 now that it’s streaming, rewatching the first two Avatars ahead of the next one’s release, pretending the new Taylor Swift tour doc is a reasonable replacement for actually seeing the tour, buying a bunch of Ikea smart buttons now that they’re on sale in the US, playing with the excellent new Obsidian update for mobile devices, and spending altogether too much time trying to figure out why my house is so cold.
I also have for you a fun new source of movies to watch, a game to play this holiday season, a new speaker worth a listen, and much more.
And I have a question, looking ahead to the last Installer of the year: What’s your favorite new thing from this year? It doesn’t have to be new this year, just new to you. (And you don’t have to pick your one favorite forever, just hit me with something new you loved this year.) I want to hear about books you discovered, podcasts you’re into, decade-old games you’re loving, things that made your house or office or whatever better, anything and everything is fair game. I’ll share mine if you share yours — email me at installer@theverge.com, find me on Threads at @imdavidpierce, or message me on Signal at @davidpierce.11.
All right, lots of stuff this week! Let’s go.
(As always, the best part of Installer is your ideas and tips. What are you playing / reading / watching / listening to / cuddling up with by the fire this week? Tell me everything: installer@theverge.com. And if you know someone else who might enjoy Installer, forward it to them and tell them to subscribe here.)
- The Letterboxd Video Store. A tightly curated set of movies to rent, filled with stuff Letterboxd knows people want to see but that you almost certainly won’t find anywhere else. Like all things Letterboxd, it’s all a bit high-minded, but I love this idea and suspect I will check it often. Perfect amount of stuff in there, too.
- Skate Story. A late-breaking contender for the best game of 2025! You’re a demon, you skate. And skate. And skate. A lot of reviews say the controls take a little getting used to, but that they give way to something that feels great and looks spectacular.
- The iFixit app. I can’t say I’m shocked that iFixit’s AI bot, FixBot, isn’t quite up to the task of automatically sussing out how to fix all your gadgets. But that’s fine; I’ll just be using this new iOS and Android app as a library of manuals and repair guides. Plus, the built-in battery monitor for your phone is extremely clever.
- Darkroom 7.0. I totally forgot about Darkroom! It has long been one of the best photo editors for Apple devices, and the new version cleans up the user experience a bunch while also adding some retro-film effects and some high-end video features. Also: Being able to zoom all the way down to the individual pixel is pretty wild.
- Google Photos. On the other end of the professional spectrum, the Google Photos app just got a bunch of CapCut-style video editing features along with some better tools for making highlight reels and slideshows. I’m suddenly tempted to make a lot of stupid year-in-review stuff to send to my friends.
- Kill Bill: The Whole Bloody Affair. I’m a sucker for a weird re-edit of a movie, so this is extremely my jam: two Kill Bill movies turned into the single, 4.5-hour bloodfest they were apparently always supposed to be. Apparently it’s a totally different story now! This feels like the best possible use of a weekend afternoon in a movie theater.
- The Wiim Sound Lite. From one of the Installerverse’s favorite audio brands comes a new $229 portable speaker that looks like a strong competitor to Sonos’ new gear. (Or a HomePod, I guess.) If I were starting a home audio system right now, I’d probably start with Wiim.
- Google Disco. An experimental new browser based on a weird and novel idea: turning collections of tabs into AI-generated, one-off web apps. I don’t expect Disco itself to ever leave Google Labs, but there’s something awfully futuristic in here.
Raffi Chilingaryan’s Spotted in Prod has long been one of my favorite sites for finding cool design and product touches from around the web. (I feel like, if you’re an app developer, your goal should be to make something weird and cool enough to catch Raffi’s eye.) Raffi’s also a designer and developer. He says right now he’s working on two iOS apps, a Strava competitor called Runbuds and a super clever alarm app called Shift that is designed to help you wake up earlier.
That’s all well and good, but my personal favorite Raffi thing is his new personal website, which includes an actual interactive version of his phone, so you can click around his homescreen and see into his apps. Dude took the whole “show us your homescreen” and just put me to shame on it. (Also, it’s a .zip domain, which I kind of love for a personal site?)
Anyway, all I have for you is a humble screenshot, but here’s Raffi’s homescreen, plus some info on the apps he uses and why:
The phone: iPhone 15 Pro.
The wallpaper: Solid gray background.
The apps: Retro, (Not Boring) Camera, Google Maps, Photos, Claude, Safari, Apple Notes.
I have my apps organized into 4 folders (money, work, social, vibes), but that’s a bit boring so I’ll break it out like this:
- TestFlights you should keep an eye on: Arena is a community of curious internet folks that I’ve long wanted to immerse myself into but only once the iOS build got to its current level did I find that easy to do. Net is a promising email startup that uses an AI card stack to make flipping through your emails a breeze with impeccable UX.
- Apps that I will shill till I die: Retro is a weekly photo journal that inspires me to take more photos and lets you send POSTCARDS to your friends & family. (Not Boring) Camera is a gorgeous skeuomorphic camera with really nice presets. Bump is Find My Friends for Gen Z. Radio Garden lets you explore the world through local radio streams. Particle is an amazing AI native news app with super fluid UX. Mercury is the most lovely fintech product for both businesses and now personal banking — I hope they take over the world.
I also asked Raffi to share a few things he’s into right now. Here’s what he sent back:
- TBPN & Stratechery podcasts.
- Discovering creative developers and design engineers who showcase their work on tech Twitter.
- Using Claude Code to ship iOS apps as someone without a formal background in software engineering.
- The resurgence of Pokémon and the Trading Card Game app.
Here’s what the Installer community is into this week. I want to know what you’re into right now as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. For even more great recommendations, check out the replies to this post on Threads and this post on Bluesky.
“Now that finals are over I have been diving into Ghost of Yotei. Crazy beautiful game.” — Jeremy
“Finally reading “The Anthropocene Reviewed by John Green. Despite John living an entirely different life than me, his experiences and understanding of the world possess so many similarities to mine. I give it five stars.” — Christopher
“I feel like everyone is sleeping on Amazon Luna, the cloud stream gaming platform that Amazon includes with its yearly subscription. It consistently has A+ games on it. I’m currently addicted to the newest Bethesda Indiana Jones game… I hooked up my PS4 controller and am playing one of the greatest games of the past few years at no extra cost.” — Alex
“Audible had an insane three months for $1 deal, so I’ve been getting back into audiobooks while I do chores and commute. Currently listening to / reading Alchemised by SenLinYu and it’s fantastic.” — Colin
“Got myself a Teenage Engineering PO-12 drum machine on a rare sale. What a glorious little device. Lovely design, and hours of music fun, even for a complete amateur like myself. Plus – it even has a headphone jack! That said – I kind of wish that I’d gotten the PO-20 instead.” —
“StoneBlock 4, an amazing Minecraft modpack, is ruining all my productivity this week.” — Anne
“Yesterday I watched a badass Polish dude ski down Mt. Everest without oxygen. The feat is unbelievable, but I still think about the incredible footage.” — Denim
“I’m OBSESSED with the Xbloom robotic barista machine I’ve owned for a few weeks now. It’s basically like having a barista on demand 24/7 – if you love drip coffee this is an endgame coffee machine.” — Andrew
“+1 for Skate Story. Also, the OST… 👌” — Andy
I spent a bunch of time this week learning about Model Context Protocol, which is one of those things that most people will never think about but might be crucial to how technology works going forward. The MCP story is fascinating, but if you just want to quickly understand how the protocol works, and why it’s so important to the whole supposed AI-based future of everything, you should watch this 20-minute video. Greg Isenberg and Ras Mic walk through the whole stack at the perfect level of complexity, and with visuals that actually help (unlike so many videos I watched this week). If every educational video on YouTube were like this one, I’d be a much smarter person.
One more Installer to come this year. See you next week!
-
Alaska1 week agoHowling Mat-Su winds leave thousands without power
-
Texas1 week agoTexas Tech football vs BYU live updates, start time, TV channel for Big 12 title
-
Washington6 days agoLIVE UPDATES: Mudslide, road closures across Western Washington
-
Iowa1 week agoMatt Campbell reportedly bringing longtime Iowa State staffer to Penn State as 1st hire
-
Miami, FL1 week agoUrban Meyer, Brady Quinn get in heated exchange during Alabama, Notre Dame, Miami CFP discussion
-
Iowa1 day agoHow much snow did Iowa get? See Iowa’s latest snowfall totals
-
Cleveland, OH1 week agoMan shot, killed at downtown Cleveland nightclub: EMS
-
World1 week ago
Chiefs’ offensive line woes deepen as Wanya Morris exits with knee injury against Texans