MITE RADIO 0492 906 469
  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN
Picture
​

click here to listen
​to Mite radio (then click the red play arrow)
An initiative of ​The Stairway Project Inc
Picture

App Privacy Settings

20/6/2025

0 Comments

 
Our smartphones are extensions of ourselves, holding a vast amount of personal data. From our photos and contacts to our location history and even our health metrics, these devices are treasure troves of information. But with every new app we download, we're asked to grant various permissions – often with a quick tap of "Allow" without a second thought. The critical question is: are these apps truly respecting our privacy, or are they quietly collecting more data than they need, potentially exposing us to unseen risks?
Picture

Just as we've come to accept that our voice assistants might be listening for commands and pushing ads our way, it's time to extend that scrutiny to every app on our phone. Many apps, even seemingly innocuous ones, can demand excessive access to your device's features and data.


The Hidden Dangers of Over-Permissive Apps

When you grant an app permission to access your microphone, camera, contacts, or location, you're opening a door. While some permissions are essential for an app's core functionality (e.g., a camera app needs camera access), many others are not. Granting unnecessary permissions can lead to:

  • Data Leakage: Sensitive information, from your messages to your financial details, could be accessed, stored, or even transmitted without your knowledge or consent.
  • Unwanted Surveillance and Tracking: Apps with access to your location, microphone, or camera can potentially monitor your movements, conversations, or surroundings. This data can then be used for targeted advertising, behavioural tracking, or worse.
  • Identity Theft and Fraud: Apps with access to contacts, photos, or emails can make you vulnerable if their security is breached, potentially leading to identity theft or unauthorized transactions.
  • Battery Drain and Performance Issues: Apps constantly running in the background, collecting data, can significantly impact your phone's battery life and overall performance.

Cybersecurity experts frequently find that many apps request far more permissions than they actually need. It's a common practice for developers to cast a wide net, and for users to click "Allow" without fully understanding the implications


Check Settings
-> Security and Privacy (Android and Apple) -> Permission Manager.


You can then tap
Camera and see what apps have access and change/update.


Also check Location, Microphone, Contacts, Calendar, etc…


Ep344
Image created by AI
0 Comments

My Phone Didn’t Ring

20/6/2025

0 Comments

 
A bit of an air crash investigation:

We've all been there: staring at our phone, willing it to ring for that crucial call – from a job offer to urgent family news – only to be met with a frustrating "missed call" notification, despite no audible ring. That sinking feeling is all too familiar. But why does this happen? Is your phone secretly betraying you? We delve into the complex world of mobile calls to uncover the culprits and offer some potential solutions.
Picture

How does it all work?

​If your phone and the caller’s phone are connected to the phone network via 4G or 5G, then your phone will receive an “invite” from the caller and it should ring.

Why would it not ring?

  • 4G and 5G networks are slightly different. The system tries to use the fastest system then falls back to slower systems if there’s a connection problem, so 5G to 4G to 3G (now gone) to voicemail… 
  • Sometimes your phone might not be registered on the network correctly so might not receive the call invite. Maybe a SIM error or software glitch,
  • Network Handover problems can happen when moving between towers.
  • Battery saver settings might cause a problem.
  • You might be in a dead zone or have poor reception.
​
Ep344
Image created by AI
0 Comments

Smart Device Listening

20/6/2025

0 Comments

 
We've all had that unsettling experience: a casual conversation about a new appliance, a holiday destination, or a fleeting interest, only for eerily specific ads to start popping up on our phones minutes later. It’s a common, if unnerving, understanding that our digital companions – whether it's Google's ever-present assistant or Apple's Siri – are, in some capacity, always listening, seemingly translating our spoken words into targeted advertising. But what about the other "smart" devices infiltrating our homes, from air fryers to smartwatches? Are they also silently gathering data, pushing the boundaries of what's acceptable when it comes to our most private spaces?
Picture

In a significant move to safeguard consumer privacy, the Information Commissioner's Office (ICO) has released new guidance for manufacturers of smart home appliances, aiming to rein in what some describe as "disproportionate surveillance" by everyday gadgets. The guidance comes after an investigation by consumer champion Which? uncovered alarming data collection practices by certain smart devices, including air fryers, smart TVs, and smartwatches.

With an estimated four out of five people in the UK owning at least one smart appliance, the new rules are designed to protect a vast segment of the population from potentially intrusive data collection.


The Which? investigation highlighted several concerning instances. Three air fryers, manufactured in China were found to record audio on owners' phones without a specified reason and some were observed sending personal data to Chinese servers, although this was noted in their respective privacy notices.


The new guidance mandates that manufacturers and developers adopt a "data protection by design and default" approach. 

Smartwatches and fitness trackers are also explicitly covered by the new guidance, with the ICO advising extra caution for "special category data" like a user's BMI or fertility information. The Which? study found that the Huawei Ultimate smartwatch requested nine "risky" phone permissions, more than any other device in the investigation. These risky permissions typically include access to precise location, audio recording capabilities, stored files, or the ability to view all other installed apps. Huawei has stated that all requested permissions have a justified need, and there is no suggestion of illegal behavior by any of the companies mentioned in the study.

Australian Context: A Similar Path Towards Stronger Protections

The UK's proactive stance on smart device privacy resonates strongly in Australia, where similar concerns about data collection and security have been growing. While Australia does not have an identical regulatory body to the ICO, the Office of the Australian Information Commissioner (OAIC) plays a key role in upholding privacy rights under the Privacy Act 1988 (Cth).

Significantly, Australia has recently introduced its own legislative measures to address these issues. The
Cyber Security Act 2024 (Cth), which received Royal Assent in November 2024, is a landmark piece of legislation that includes provisions for mandatory minimum cyber security standards for smart devices. These "Cyber Security (security standards for smart devices) Rules 2025" are set to come into effect on March 4, 2026.


These Australian rules will require manufacturers and suppliers of internet-connectable products intended for consumer use to comply with specified security standards. Key requirements include:
​
  • No universal default passwords: Each device must have a unique password or allow the user to define their own.
  • Vulnerability reporting mechanisms: Manufacturers must have a public policy for reporting security issues and provide contact information for doing so.
  • Minimum security update periods: Manufacturers must disclose the duration of security support for their products' software or hardware.
  • Statement of compliance: Both manufacturers and suppliers will be required to provide a statement confirming their device meets these standards.

The OAIC has also been actively engaged in promoting "privacy by design" for all digital products, including AI systems, and has issued guidance emphasizing transparency, accuracy, and the need for informed consent, particularly for sensitive personal information collected by IoT devices.


Ep344
Image created by AI
0 Comments

Hand Warmers

19/6/2025

0 Comments

 
Welcome back to our weekly dip into the wonderfully weird world of "The Tech Absurd"! As we Aussies brace ourselves for those crisp (okay, maybe just slightly less scorching) winter evenings, we've stumbled upon a gadget that promises to keep your mitts toasty, even if your fashion choices lean more "singlet and shorts" year-round: the Dnaleao Rechargeable Hand Warmers.
​

Now, we get it. Winter camping in your backyard can have a certain rugged appeal... right after you've wrestled with the mozzie net and remembered where you stashed the extra blankets. But for those who truly embrace the chill, or perhaps just suffer from perpetually icy fingers (maybe you work in a particularly enthusiastic air-conditioned office?), Dnaleao offers a solution that's less "crackling campfire" and more "pocket-sized personal sun."
Picture

Resembling a rather chunky portable battery pack – because apparently, the pinnacle of hand-warming tech involves looking like you're charging your phone in your palm – these little gadgets pack a surprising punch. With three temperature modes ranging from a mild "slightly less chilly" 95°F to a "feels like you're gently cradling a freshly baked potato" 130°F, you can customize your hand-warming experience. And with a claimed 12-hour battery life from their 4,000mAh cells, you could theoretically keep your hands warm from sunrise to sunset... or at least until you inevitably misplace one in the depths of your backpack.

​The real absurdity, however, lies in the sheer convenience. Simply
grip the warmer to use it. That's it. No frantic rubbing, no awkward glove adjustments, just instant, rechargeable warmth. And when you're done feeling like you've captured a tiny piece of the Outback sun in your hand, just tuck it into your trouser pocket. Because nothing says "stylish adventurer" quite like having two slightly oblong bulges radiating heat from your lower half.


So, whether you're battling the frosty air on your morning commute, braving a chilly Bunnings snag sizzle, or just determined to master the art of typing with fingers that haven't turned completely blue, the Dnaleao Rechargeable Hand Warmers offer a techy, if slightly peculiar, way to say "not today, frostbite!"


Ep343
Image Source: https://amazon.com
0 Comments

Free Password Managers

19/6/2025

0 Comments

 
In our tech-world, every online service demands a unique login, managing passwords has become a cybersecurity tightrope walk. Thankfully, major tech giants like Apple, Google, and Microsoft have stepped up, offering free, built-in password managers as part of their ecosystems. But as with all things free, the question for us here and across Australia, is: are they good enough, or are you compromising security for convenience?
Picture

These platform-based password management tools have come a long way from being simple browser autofill features. They've evolved into surprisingly capable, often cross-platform, solutions designed to simplify our digital lives.

The Upside: Convenience and Integration

For many users, the appeal of these free options is undeniable. They come with several compelling advantages:

  • No Extra Downloads: They're already integrated into your operating system or browser, meaning no additional software to download or install. This "set and forget" simplicity is a major draw.
  • Automatic Syncing: Passwords automatically sync across all your devices linked to your Apple ID, Google Account, or Microsoft Account. Log in once on your phone, and it's there on your laptop.
  • Integrated Security: Their security features are deeply embedded within the respective platforms, leveraging existing account security measures like two-factor authentication.
  • Cost-Free: The price is right – free!

The Downside: Limitations and Niche Use

Despite their growing capabilities, these built-in managers do come with certain limitations, particularly when compared to dedicated, paid password management services:

  • Platform Lock-in: While they are becoming more cross-platform, their seamlessness often shines brightest within their native ecosystem. If you frequently switch between, say, an iPhone, an Android tablet, and a Windows PC, you might encounter usability quirks or reduced functionality.
  • Basic Feature Set: They typically offer a more fundamental set of features. Dedicated password managers often include advanced capabilities like secure sharing, dark web monitoring, emergency access, and more robust auditing tools that these free options lack.
  • Usability Across Divides: While Google's password manager, for example, is becoming quite versatile across platforms, users deeply entrenched in one ecosystem might find others less intuitive when using a rival's password manager.

So, Should You Use Them?

The verdict largely depends on your digital habits. For users who are not particularly tech-savvy, or those with relatively simple online needs and a strong preference for staying within a single ecosystem (e.g., an all-Apple household or someone who lives entirely in Google's cloud), these platform-based password managers are a perfectly viable and secure solution. They offer a significant upgrade over reusing simple passwords or writing them down.

However, for individuals who frequently switch between different operating systems or browsers, manage a high volume of complex online accounts, or require advanced features like secure sharing or password auditing, a dedicated, paid password manager might offer a more robust, versatile, and ultimately more secure experience. Ultimately, the best password manager is the one you actually use consistently to generate and store strong, unique passwords.

Ep343
Image created by AI
0 Comments

Microwaving E-Waste

19/6/2025

0 Comments

 
When you think of a microwave, heating last night's leftovers probably comes to mind. But what if this ubiquitous kitchen appliance held the key to turbo charging global recycling, turning vast mountains of trash into valuable treasure? Research is proving just that, as microwaves emerge as a surprisingly efficient and clean solution for recovering critical materials from electronic waste (e-waste) and even breaking down plastics.
Picture

The conventional methods for recycling e-waste, which contains valuable yet hard-to-recover elements like tantalum, gallium, and indium, are often costly, hazardous, and environmentally taxing. These critical minerals, vital for our smartphones, laptops, and advanced electronics, frequently end up in landfills or are processed using methods that pose serious health risks.

​Enter the humble microwave, repurposed for a much grander task. Researchers, notably a team at West Virginia University with support from DARPA (the U.S. Department of Defense's advanced research agency), are developing a method that uses microwaves to selectively heat specific components within shredded e-waste. By mixing the waste with a carbon-based material, microwaves can precisely activate a chemical reaction that transforms compounds into pure, reusable metals. This process boasts impressive purity levels (over 97% for tantalum) and significantly reduces the need for harsh chemicals, energy consumption, and waste generation. The implications are vast, not just for environmental sustainability but also for national security by ensuring a domestic supply of vital materials.


Beyond metals, microwaves are also showing promise in plastic recycling. New techniques are employing microwave irradiation to pretreat tough plastics like PET (polyethylene terephthalate) bottles, making them far more accessible to enzymes. This combination dramatically accelerates the breakdown of plastics into their base components, allowing for more efficient and higher-yield recycling.


Furthermore, this innovative microwave technology extends to solar panel recycling. Microwaves can selectively heat silicon components within solar panels, softening the protective plastic coating and allowing for easier de-lamination and recovery of valuable materials without high temperatures or corrosive chemicals.


These advancements represent a significant leap forward in our quest for a circular economy. By harnessing the power of microwaves, we're not just finding cleaner ways to recycle; we're unlocking valuable resources from what was once considered waste, paving the way for a more sustainable and resource-independent future. 


I guess we just need to find a way to sustainably power it!


Ep342
Image created by AI
0 Comments

Camera Privacy

19/6/2025

0 Comments

 
A significant and disturbing cybersecurity vulnerability has come to light, revealing that over 40,000 security cameras across the globe are live-streaming footage completely unsecured and exposed to the internet. This alarming revelation poses a massive privacy concern for individuals and organizations alike.
Picture

According to cybersecurity firm Bitsight, these cameras are broadcasting video feeds that can be accessed without any form of authentication, encryption, or even the most basic password protection. This means anyone with the right tools or knowledge can potentially view private spaces and activities.
The United States appears to be a major hub for this vulnerability, with nearly 14,000 potentially exposed cameras. The states with the highest concentrations of these unsecured devices include California, Texas, Georgia, and New York.

​Bitsight's Cyber Threat Intelligence team has unearthed evidence suggesting that these unsecured feeds are a hot topic in dark web forums. Cybercriminals are reportedly discussing and sharing methods, tools, and techniques to gain unauthorized access to these video streams. Worse still, access to these unprotected cameras is being bought and sold, highlighting the lucrative nature of exploiting such privacy breaches.


Australia is not immune to this widespread issue. Cybersecurity experts and government bodies here frequently warn that many Internet of Things (IoT) devices, including security cameras in Australian homes and businesses, are deployed with inadequate security, often relying on weak or default passwords. This leaves them wide open to exploitation.


Actual instances of unsecured camera footage being accessed in Australia have been reported. For example, a rug shop in Cairns was found to be live-streaming its camera footage to a site linked to Russian hackers. Similarly, a mechanic was alerted that his activities were being streamed live online to a compromised website during a home service call. These incidents underscore the tangible risk to privacy and security posed by unsecure camera setups.


This incident serves as a stark reminder of the critical importance of cybersecurity best practices, particularly when setting up internet-connected devices. Users of security cameras, whether for personal or business use, must ensure their devices are properly secured with strong, unique passwords, encryption where available, and limited external access to prevent becoming part of this widespread privacy nightmare.


Ep342
Image created by AI
0 Comments

Tosy Flying Disc

19/6/2025

0 Comments

 
Ahh "The Tech Absurd," celebrating gadgets that might not change the world, but might just add a splash of unexpected fun! Remember the Frisbee? Well, move over my plastic, because today, we're casting our spotlight on a device that takes a classic outdoor pastime and injects it with a vibrant, dazzling twist: enter the Tosy RGB Flying Disc.
Picture
While it might not enhance the way you throw, the Tosy RGB flying disc is undeniably a feast for the eyes. At its core, it's a familiar flying disc, perfect for those backyard games and camping adventures with friends and family. However, its secret weapon is a dazzling array of 108 RGB LEDs, capable of emitting a staggering 16.7 million colors. Yes, you read that right – 16.7 million. Because apparently, your backyard frisbee toss just wasn't doing enough to prepare you for a rave.

The beauty of the Tosy disc isn't just aesthetic; it brings new possibilities to your outdoor play. Traditional flying disc games, especially those requiring precise throws and catches like Ultimate Frisbee, are often limited to daylight hours because, well, you need to see the disc! But with the Tosy flying disc, the darkness becomes your arena. Its brilliant illumination allows you to keep the game going long after the sun has set, turning your backyard into a dynamic, glowing playground. No more frantic searches for a lost disc in the bushes – unless it's gone
really far, in which case, at least it'll look cool while it's missing.


So, if you're looking to add a truly unique, visually spectacular element to your outdoor recreation, or just want to make sure your frisbee stands out in a crowd (and in the dark), the Tosy RGB Flying Disc might just be the "absurd" tech gadget you never knew you needed. After all, why just throw a disc when you can throw a disco?
​

Ep342
Image created by AI
0 Comments

Infostealer Sting

19/6/2025

0 Comments

 
An extensive international law enforcement effort, dubbed "Operation Secure," has successfully disrupted major infostealer malware infrastructure across 26 countries between January and April 2025. The operation, spearheaded by Interpol, aimed to dismantle sophisticated criminal groups responsible for stealing vast amounts of financial and personal data from victims worldwide.
Picture

The coordinated sting resulted in the arrest of 32 individuals globally. Authorities also seized significant data, including over 100 GB of information, and took down more than 20,000 malicious IP addresses and domains linked to infostealer activities. Furthermore, 41 servers supporting these illicit operations were confiscated.

"Operation Secure" has been instrumental in protecting countless individuals from financial fraud and identity theft. As a direct result of the operation, 216,000 victims have been notified that their data was compromised, enabling them to take protective measures.

Infostealer malware poses a significant threat, covertly infiltrating systems to siphon off sensitive information such as banking credentials, passwords, browser history, and even cryptocurrency wallet information. This global threat has a tangible impact in regions like Australia, where recent reports indicate over 30,000 Australian banking passwords were harvested by infostealers between 2021 and 2025, affecting customers of major banks and even superannuation funds. Cybersecurity experts note that these modern infostealers are increasingly capable of bypassing multi-factor authentication (MFA) by stealing session cookies, presenting a critical challenge for both individuals and organisations. The Australian Signals Directorate (ASD) has repeatedly warned of this "silent heist" accelerating into 2024, emphasizing its role as a precursor to more significant cyber incidents.

The success of "Operation Secure" highlights the critical importance of international cooperation in combating cybercrime and safeguarding digital security on a global scale.

Perhaps we can breathe a tad easier now… at least for a little while. 

Ep342
Image created by AI
0 Comments

Basic Battery Checker

12/6/2025

0 Comments

 
Few things are more frustrating than a device going dead when you least expect it, especially when you're rummaging through a bag of old batteries, unsure which ones still hold a charge. But what if there was a simple, instant way to tell a live battery from a dead one without needing a tester? According to PCWorld's Australian Editor Dominic Bayley, there is – and it's a neat trick involving a quick drop.
Picture

Bayley, like many of us, recounts the common struggle of cycling through partially used batteries, often storing them for recycling or "just in case." The real headache, he notes, comes when a device unexpectedly dies, forcing a frustrating trial-and-error search for a viable replacement. His solution? A surprisingly effective "bounce test."

Here's how to perform this quick test at home:
​
  1. Find Your Surface: Locate a flat, firm surface. A sturdy table or even a thick book will work as your test platform.
  2. The Drop: Hold the battery (typically an AA or AAA, though the principle applies to others) vertically above the surface.
  3. Release and Observe: Drop the battery straight down onto the surface from a height of approximately 8 inches (about 20cm).

The Key Observation:

The magic lies in how the battery reacts upon impact:
  • A fully charged battery will tend to fall with a duller thud, tipping over and staying put on the surface, or bouncing minimally before settling.
  • A flat or dead battery, however, will often bounce back up a few centimeters or more, indicating it's no longer worth using.

This simple physical reaction provides a quick and clear indicator of a battery's remaining charge, saving precious time and effort. It's a handy piece of everyday science that can help anyone quickly sort through their battery stash, ensuring you grab a good one when you're in a pinch. So next time you're unsure, just drop it and watch.


Ep341
Image created by AI
0 Comments

Bulb Cam

12/6/2025

0 Comments

 
In the ever-expanding universe of smart home security, Wyze has consistently aimed to disrupt the market with affordable, innovative gadgets. Their latest offering, the Wyze Bulb Cam, continues this trend, proposing a remarkably simple yet ingenious concept: transforming any standard light socket into a 2K security camera. Priced at just $50, it certainly catches the eye, but how well does this dual-purpose device truly perform?
Picture

The core appeal of the Wyze Bulb Cam lies in its discreet design and ease of installation. It screws directly into any existing light fixture, instantly providing both illumination and surveillance without the need for additional wiring or complex setups. The camera itself, cleverly positioned below the lightbulb, boasts a 2K resolution and a 160-degree field of view, offering a wide perspective of your chosen space. Even in low-light conditions, the Bulb Cam features color night vision, a significant upgrade from traditional black-and-white infrared, allowing for clearer identification of subjects after dark.

As a smart light, the Bulb Cam is no slouch either, capable of reaching up to 800 lumens and offering customizable dimming options through the Wyze mobile app. This dual functionality means you're not just adding a camera; you're also upgrading your lighting.

​Sounds good, but it is manually adjusted only and will not track movement. There is no AI to distinguish between people, pets and objects, but for $50 it will give you basic camera and local recording so not too bad in my book.

Ep341
Image Source: wyze.com.au
0 Comments

Passkeys Database

12/6/2025

0 Comments

 
Are you ready to try passkeys?

Not heard of them? Where have you been?

For decades, passwords have been the shaky foundation of our digital lives. They're too weak, easily stolen in data breaches, frequently forgotten, and a constant source of online frustration. We've endured endless password resets, complex strength requirements, and the nagging fear of phishing attacks. There is a better way and they’re called Passkeys.
Picture

The benefits are simple: 
​

Phishing Resistant: Passkeys are inherently resistant to phishing. Since you're not typing a password, there's nothing for a fake website to steal. The authentication happens directly between your device and the legitimate service.
Simpler Login: No more typing complicated passwords or struggling with autofill. A quick glance or touch is all it takes.
More Secure: Cryptographic keys are far more robust than even the strongest human-created passwords.
Device-Linked Convenience: Your passkeys are often synced across your devices, making it easy to log in from anywhere you trust.

While passkeys are rapidly gaining traction, they're still a relatively new technology, and not every website or service has implemented them yet. This can leave users wondering: "Where can I actually start ditching my passwords?"

This is where passkeys.directory steps in.

This site helps: 

Discover compatible services: Easily find out which of your favorite apps and websites now offer passkey login.
Learn how to enable passkeys: Many entries on the directory might include quick guides on setting up passkeys for specific services.
Stay updated: As more companies roll out passkey support, the directory will provide a live overview of the expanding ecosystem.

Ep341
Image created by AI
0 Comments

ANZ Plus

12/6/2025

0 Comments

 
Australia and New Zealand Banking Group (ANZ) is set to undergo a significant digital transformation, with an accelerated plan to migrate the bank's 7 million retail customers onto its modern digital platform, ANZ Plus. 

Picture

Launched in 2022, ANZ Plus has already onboarded over one million customers, steadily building out new features and products. A key upcoming innovation for the platform is the rollout of fully password-less web banking, promising a more secure and streamlined online experience.

The ambitious long-term goal is to run the entire retail bank on Plus by 2029, a move that will encompass not only the six million existing ANZ customers but also the 1.2 million customers recently acquired from Suncorp Bank.

For existing ANZ customers, the migration to the Plus platform will be a gradual process over the coming years, though a precise timeline for individual customers has not yet been provided. However, ANZ has reassured customers that vital details such as existing BSB and account numbers, credit card numbers, and direct debits will be retained, aiming for an experience akin to a seamless app upgrade.

ANZ Plus offers a suite of modern banking tools designed to help customers manage their finances more effectively. These include smart saving features like "roundups" (where spare change from transactions is saved) and predictions for upcoming bills, moving towards a more proactive and digitally-driven banking experience.

So if you’re an ANZ customer, be ready for the change.

Ep341
Image created by AI
0 Comments

Portable Airbags

12/6/2025

0 Comments

 
Remember the days when safety gear meant a bicycle helmet or, for the truly daring, elbow pads? Well, move over, humble foam, because the future of personal protection has arrived, and it's… inflatable. We're talking about wearable airbags for humans, a concept that sounds more like a discarded prop from a slapstick comedy.

​
Picture

​Yes, they exist. No, they're not just for stunt performers anymore. Companies are now marketing these sartorial safety bubbles to the general public, promising to cushion your every fall, trip, and potentially, your dignity. Imagine strolling down the street, enjoying a leisurely afternoon, when suddenly, you stumble on a rogue pebble. WHUMPFF! Your stylish new vest (or belt, or even, dare we say, a full-body suit?) instantly inflates, transforming you into a human marshmallow, mid-air.

The official spiel touts "advanced sensors" and "milliseconds-fast deployment," detecting everything from a gentle wobble to a full-blown face-plant. They're primarily aimed at the elderly for fall prevention, or extreme sports enthusiasts who apparently view broken bones as an inconvenient interruption to their adrenaline fixes. But the logical conclusion, as always at
The Tech Absurd, is a world where everyone, from toddlers to octogenarians, is perpetually encased in a pre-inflated cocoon of caution.


Picture this: your morning commute. The bus comes to a sudden stop. Instantly, the entire carriage becomes a sea of rapidly expanding nylon, passengers gently bouncing off each other like human bumper cars. Or a bustling supermarket, where a misplaced banana peel triggers a chain reaction of spontaneous inflation, turning aisle five into an impromptu bouncy castle. The sheer logistics of everyday life become a comedy of errors.


And what about the re-inflation process? Do we carry spare CO2 cartridges in our pockets, ready to re-arm ourselves after every minor mishap? Is there a roadside assistance service for prematurely deployed airbags? The thought of awkwardly waddling to the nearest "re-inflation station" after a minor trip over your own feet is enough to induce a collective sigh of existential defeat.


While the intent is undeniably noble – reducing injuries is a worthy goal – the practical absurdity of ubiquitous wearable airbags is undeniable. We're hurtling towards a future where the fear of a scraped knee or a bruised hip might just outweigh the desire for spontaneous movement. Soon, perhaps, walking will require a pre-flight checklist, and every public space will resemble a giant, human-sized ball pit.


So, the next time you see someone waddling around in what appears to be a personal cloud of inflated fabric, remember: it’s not just about safety. It’s about the hilariously over-protective, utterly absurd direction our technology is taking us. Just try not to laugh too hard; you wouldn't want to trigger their shoulder pads.


Ep340
Image created by AI
0 Comments

Search Google Photos with Words

12/6/2025

0 Comments

 
For anyone (like me) who's ever scrolled endlessly through thousands of digital memories, desperately searching for that one specific photo containing a street name, a recipe, or a crucial piece of information, Google Photos has just delivered a new solution: the ability to search for specific words within their photos using quotation marks.
Picture

This update significantly enhances Google Photos' already powerful search capabilities. While the platform has long used AI to recognize objects and faces, this new functionality allows for much more precise textual searches embedded within the images themselves.

Here's how it works: If you're looking for a photo that contains a particular word, you can now simply type that word enclosed in quotation marks into the Google Photos search bar. For instance, a search for
"passport" will now specifically show you only those photos in your library that visibly contain the word "passport" in them. This cuts down dramatically on irrelevant results, helping you pinpoint exactly what you're looking for with unprecedented speed.


Imagine trying to find a snapshot of a business card, a Wi-Fi password written on a coffee shop wall, or a handwritten note with a specific term. This new exact text search feature turns your photo library into a searchable document, making it far more practical and efficient.


It's important to note that while incredibly powerful, the feature performs best with clear, legible text. It might encounter challenges with highly stylized fonts, words that are partially obscured, or text in certain less common languages. However, for everyday use with clear text, it stands to change how we interact with our vast digital archives.

NOTE: This precise text search feature is rolling out gradually to Google Photos users, so keep checking.

Ep340
Image created by AI
0 Comments

Lock Your Phone

12/6/2025

0 Comments

 
In our hyper-connected world, our smartphones and other personal devices are veritable treasure troves of sensitive information. From banking apps and personal photos to work emails and social media accounts, these gadgets hold the keys to our digital lives. Yet, despite their immense value, a surprisingly high number of people forgo one of the most basic, yet crucial, security measures: a screen lock.
Picture

Whether it's a PIN, password, pattern, fingerprint, or facial recognition, enabling a screen lock on your phone, tablet, or laptop is your first and most essential line of defense against unauthorized access. It’s the digital equivalent of locking your front door; without it, anyone can simply walk in.

The Risks of an Unlocked Device:
​
  • Data Theft and Identity Theft: If your device falls into the wrong hands, whether lost or stolen, an unlocked screen grants immediate access to your entire digital world. This includes personal messages, photos, financial apps, saved passwords, and contact lists. A thief could quickly extract enough information to commit identity theft, access your bank accounts, or impersonate you online.
  • Privacy Compromise: Even if a malicious actor isn't looking for financial gain, an unlocked device exposes your private conversations, Browse history, and personal media to anyone who picks it up. This can lead to embarrassment, blackmail, or simply a profound invasion of privacy.
  • Unauthorized Use: A child could accidentally (or intentionally) make in-app purchases, send inappropriate messages, or access content they shouldn't. In a professional context, sensitive company data could be viewed or even leaked if an unlocked work device is compromised.
  • Malware Installation: With direct access to your device, an attacker could quickly install malicious software, spyware, or ransomware, further compromising your data and device functionality.
  • "Find My Device" Feature Blocked: If your phone is stolen and unlocked, a thief can easily disable features like "Find My Device" or "Erase Device," making it impossible for you to locate or wipe your data remotely.

Choosing the Right Screen Lock:

Modern devices offer various options, each with its own balance of convenience and security:

  • PIN (Personal Identification Number): A classic and reliable choice. Opt for at least 6 digits and avoid obvious sequences like birthdays or "1234."
  • Password: The most secure option, especially if it's long and complex (combining letters, numbers, and symbols). This is ideal for devices that store highly sensitive information.
  • Pattern: While convenient, patterns can sometimes be guessed by observing smudges on the screen. If you use one, make it complex and avoid common shapes.
  • Fingerprint Recognition: Fast and secure, leveraging your unique biometric data. Most modern smartphones offer this.
  • Facial Recognition: Increasingly common, offering quick access. Ensure your device's facial recognition is robust and not easily fooled by photos.

So, make it a habit:


Enabling a screen lock takes mere seconds to set up in your device's security settings. Most devices allow you to choose how quickly the screen locks after inactivity (e.g., immediately, after 30 seconds, 1 minute). For optimal security, set it to lock almost instantly.


In an age where our devices are extensions of ourselves, protecting them is paramount. A simple screen lock isn't just a recommendation; it's a fundamental pillar of personal cybersecurity. Don't leave your digital life exposed – lock it down.


Ep340
Image created by AI
0 Comments

Updated Microsoft Store

12/6/2025

0 Comments

 
Microsoft is rolling out significant updates to its Microsoft Store on Windows, promising a dramatically improved experience for users. You know that little shopping bag icon on the taskbar. The enhancements focus on greater personalization, smarter search capabilities, boosted performance, and a host of new features designed to make discovering and installing apps and games smoother than ever before.

​
Picture

The most noticeable change for many will be the personalised homepage, tailoring content to individual user preferences and habits. Complementing this, the Store's search function has become far more intelligent and intent-aware, leveraging signals like app updates and ratings to deliver more relevant results and better address language-specific nuances. For users in the United States, (and soon to be released everywhere) a standout addition is the integration of Copilot, now accessible directly from product pages to answer questions as you browse.

​Discovery is also getting a major uplift. A new
“Discover More” section on product pages will surface related content, helping users find complementary apps and games. Furthermore, new product page badges will clearly indicate apps boasting AI features and those specifically optimized for the new generation of Copilot+ PCs, making it easier to identify cutting-edge software.


Beyond new features, Microsoft has made substantial strides in
performance and reliability. The Store now launches an impressive two times faster than it did just six months ago, and installation reliability and speed have seen significant improvements. Gamers will particularly appreciate the new ability to install individual components for games, offering greater control over downloads. Everyday conveniences include faster in-app rating dialogs and a new field on product pages indicating when an app or game was last updated, providing crucial transparency for users.


Perhaps one of the most streamlined features is the ability to
install apps directly from Windows Search. Users can now search for an app or game from the Windows search bar, and if available in the Store, quickly initiate the installation without needing to fully open the Store application.


These comprehensive updates underscore Microsoft's ongoing commitment to refining the Windows experience, making the Microsoft Store a faster, more intuitive, and more secure hub for digital content.


Ep340
Image created by AI
0 Comments

Wiki for Extensions

12/6/2025

0 Comments

 
Your web browser is your gateway to the internet, and while extensions can be incredibly useful, they also pose a significant security risk. In case you’re wondering: an extension is a small software program that you can install into your web browser (like Chrome, Firefox, or Edge) to add new features, customize its behavior, or integrate with other services - Think of it like an "app" for your browser.

​
Picture

Many users unknowingly install extensions that can track their data, display unwanted ads, or even contain malicious code. The problem? App stores often provide only a superficial review of these add-ons, leaving a dangerous gap in your online protection.

​But now, a new tool is here to help you navigate this digital minefield. Cybersecurity company LayerX has launched
ExtensionPedia, a platform being dubbed the "Wikipedia for extensions." Its mission is simple: to make your web browser far more secure by exposing dangerous browser extensions and providing transparent, in-depth risk assessments.


What is ExtensionPedia and How Does it Help You?

ExtensionPedia offers a comprehensive database of over 200,000 browser extensions across popular platforms like Chrome, Firefox, and Edge. Unlike basic app store descriptions, this free-to-use tool gives you crucial insights into the security posture of any extension you're considering or already have installed.

Here’s what ExtensionPedia provides:

  • In-depth Risk Assessments: Get a clear understanding of the potential dangers an extension might pose.
  • Unified Risk Scores: A simple score helps you quickly gauge the overall security risk.
  • Granular Permission Breakdowns: See exactly what permissions an extension requests (e.g., access to your Browse history, ability to read all website data). This helps you understand if an extension is asking for more access than it truly needs.
  • Detailed Reputation Analyses: Learn about the developer's history and any reported issues or vulnerabilities associated with the extension.

ExtensionPedia achieves this by pulling anonymous data from millions of browser sessions, aggregating it into a searchable, public-facing tool. This means you can quickly look up an extension and get a clear picture of its security profile.


Your Simple Tip for a More Secure Browser:

Before you install any new extension, or to audit your existing ones, make it a habit to check it on ExtensionPedia. Simply visit the platform, search for the extension by name, and review its risk assessment. If an extension demands excessive permissions or has a low reputation score, it's a strong indicator that it might be a privacy risk or worse.

By leveraging tools like ExtensionPedia, you can take a proactive step in safeguarding your online activity and ensuring your browser remains a secure environment for all your digital tasks. Don't let a convenient extension become a backdoor for cyber threats.


​https://layerxsecurity.com/extensions/
​
Ep339
Image created by AI
0 Comments

Location Sharing

12/6/2025

0 Comments

 
It's a common scene in modern families: a quick glance at a smartphone app confirms a child has arrived safely at school, or a partner is on their way home. For many, location-sharing apps offer invaluable peace of mind, providing real-time updates on loved ones' whereabouts. But beneath this comforting surface lies a complex web of data collection, one that can create an invisible digital trail far wider than most users realise.
Picture

Cybersecurity experts are increasingly sounding the alarm, highlighting the inherent cyber risks that come with such highly sensitive data, particularly the danger of this collected information falling into the wrong hands through data breaches or misuse. This raises a crucial question: are we trading too much privacy for the convenience of knowing exactly where everyone is?

​For many families, apps like
Life360 embody the promise of constant connection and safety – real-time location tracking, crash detection, and emergency alerts. The idea of always knowing where your loved ones are can be incredibly reassuring. However, cybersecurity experts are increasingly highlighting the inherent cyber risks that come with such highly sensitive data, citing past incidents and persistent privacy concerns surrounding these omnipresent tools.


These "family safety" applications typically operate by continuously monitoring GPS signals, often enhancing accuracy with Wi-Fi and Bluetooth data. Users form "Circles" to share their whereabouts with chosen contacts, receiving automatic notifications for arrivals and departures from designated locations. While some premium features even extend to identity theft protection and dark web monitoring, the core function—constant location data collection—creates significant vulnerabilities.

Reports and analyses have consistently pointed to several critical areas of concern:

  • Data Selling and Sharing: Perhaps the most unsettling aspect revealed about certain location-sharing apps, including Life360, is their past practices of allegedly selling precise location data of their millions of users to third-party data brokers. While companies might claim to anonymize this data, experts caution that it can often be re-identified, potentially exposing sensitive routines and exact whereabouts to unknown entities. This raises the serious risk that your personal movements could be used for targeted advertising, or even worse, for less legitimate purposes by unknown parties. Although Life360 has publicly committed to ceasing the sale of precise location data, the history of such practices underscores the inherent risks.
  • Data Breaches and API Vulnerabilities: The Threat of Exposure: No digital system is perfectly impervious to attack. A notable incident involving Tile, a company acquired by Life360, saw a hacker exploit outdated login credentials of a former employee to gain unauthorized access to users' personal data. This included names, addresses, emails, and phone numbers, raising the specter of phishing attacks, smishing, or even physical threats based on leaked daily routines. Cybersecurity analysts have also identified API (Application Programming Interface) vulnerabilities, where a deeper dive into an app's underlying data requests could potentially expose sensitive information not visible on the user interface. When such personal and location data is breached, it can lead to identity theft, stalking, or other forms of targeted crime.
  • Gaps in Fundamental Security Practices: Some analyses suggest that specific location-sharing apps may fall short on crucial cybersecurity safeguards. This can include a lack of mandatory two-factor authentication (2FA) – a vital barrier against account takeovers – and insufficient measures to deter brute-force login attempts. The absence of email validation during signup can further simplify the creation of fraudulent accounts by malicious actors, increasing the likelihood of unauthorized access to sensitive user data.
  • The Extent of Data Collection: Beyond just geographical coordinates, these applications can gather an extensive amount of personal data. This can include driving behaviors (like speed and braking patterns), phone usage while driving, specific device information, and even in-app communications. While some of this data serves the stated safety features, the sheer volume of personal information centralized in one location significantly magnifies the potential consequences if a breach or misuse occurs, providing a rich target for cybercriminals.

While location-sharing apps undoubtedly offer a sense of security, users must critically evaluate the privacy trade-offs and cybersecurity risks involved. It is paramount to meticulously review an app's privacy policy, configure permissions to the absolute minimum required, employ robust and unique passwords, enable multi-factor authentication whenever possible, and remain perpetually vigilant for any suspicious activity linked to your accounts. For families weighing the benefits against the potential perils, exploring alternatives with stronger privacy guarantees or engaging in transparent conversations about data sharing boundaries is crucial.


Ep339
Image created by AI
0 Comments

Linnaco Water Blaster

12/6/2025

0 Comments

 
Just when you thought the humble water pistol had reached peak squirt, along comes the "Ultimate Water Battle Blaster" from Linnaco, promising to sort out aquatic skirmishes once and for all. But as we explore this supposed marvel, one question drenches our minds: Have we, as a species, simply run out of sensible things to invent?
Picture

Behold, the Blaster. It’s not merely a child’s toy; it’s a tactical, battery-powered liquid assault system that feels less like fun and more like a preparatory drill for a highly specialized fire department. The product page, a veritable shrine to over-engineering, boasts of its “powerful motor” and a design that makes it "the most technologically advanced water gun on the market." Because, apparently, our backyard water fights were suffering from a severe lack of cutting-edge innovation.

Gone are the days of manual pumping, the satisfying
thwack-thwack that built anticipation. Now, the future of hydration-based combat is automated. Press a button, and a relentless stream of H2O erupts, likely leaving your opponent drenched before they can even comprehend the sheer absurdity of your firepower. 


This thing boasts a level of precision and power usually reserved for pressure washers, making you wonder if it's meant for soaking siblings or power-washing stubborn patio stains.


While the "Ultimate Water Battle Blaster" proudly proclaims its battery-powered might, one can't help but envision the frantic scramble for AAAs mid-battle, or the existential dread of a low-battery indicator during a critical ambush. What happens when your ultra-advanced blaster dies, and your foe is armed with a simple, reliable bucket? The shame. The absolute, unadulterated shame.


In an age where technology aims to solve increasingly complex problems – climate change, disease, sending tourists into space – Linnaco has bravely tackled the most pressing issue of our time: the inefficient drenching of loved ones. It’s a testament to humanity’s boundless creativity, or perhaps, its boundless capacity for inventing things nobody truly asked for.


​So, if your summer water fights feel too primitive, too
manual, or simply lack the cold, unfeeling efficiency of a precision-engineered liquid delivery system, then the Ultimate Water Battle Blaster is your absurd solution. Just don't accidentally power-wash your pet or trigger an international incident with its unforeseen aquatic might. The future, it seems, is surprisingly wet and wonderfully ridiculous.
​
Ep339
This image is used under the Fair Use provision for the purpose of review and commentary.
​Source: https://linnaco.com/products/ultimate-water-battle-blaster

0 Comments

Word and Excel Chat

12/6/2025

0 Comments

 
A new, low-tech, yet highly effective method of clandestine communication is quietly spreading through school campuses, allowing students to bypass traditional messaging restrictions. Educators and IT administrators are discovering that the seemingly innocuous chat features built into Microsoft Word and Excel are being repurposed by students to send secret notes to one another, right under the nose of school monitoring systems.
Picture

While schools commonly deploy robust firewalls and content filters to block social media, chat apps, and unauthorized websites, the integrated collaboration tools within popular productivity suites like Microsoft 365 often slip through the cracks. These features, designed for legitimate co-editing and project work, allow users to chat in real-time within a shared document or spreadsheet.

"We first noticed it when a teacher caught two students giggling while 'working' on a shared history project," explained one school IT administrator, who requested anonymity due to the sensitive nature of the discovery. "On closer inspection, their 'edits' were minimal, but the chat pane was filled with rapid-fire messages discussing everything from weekend plans to exam answers. Our usual filters don't flag internal chat within a Word document as 'social media' traffic."

The technique is simple yet ingenious. Students create a new, often meaningless, Word document or Excel spreadsheet, then share it with their intended recipient(s) within the school's network. Once the document is open, they use the built-in chat function (often found in the top right corner, usually with a speech bubble icon) to exchange messages. Because the communication is embedded within a Microsoft application and routed through the school's legitimate network traffic for Microsoft 365 services, it largely goes undetected by standard web filters looking for external chat applications.
​

The messages are typically ephemeral, as the chat history might only persist as long as the document is open or within a recent activity log. However, for quick, real-time exchanges during class, it proves to be a surprisingly effective loophole.

Ep339
Image created by AI
0 Comments

Bunnings App

7/6/2025

0 Comments

 
Do you shop at Bunnings?

There is an app specific for Bunnings that has some pretty cool options including whether they have stock, finding items located in specific isles and at specific stores.
Picture
Picture
Ep338
This image is used under the Fair Use provision for the purpose of review and commentary. Source: Bunnings website
0 Comments

Cryllic Alphabet

7/6/2025

0 Comments

 
The Cyrillic alphabet has significant relevance for hackers, primarily because of a tactic known as homoglyph attacks (also sometimes called homograph attacks or script spoofing).
Picture

Here's why it's a valuable tool for cybercriminals:

  • Visual Similarity to Latin Characters: Many characters in the Cyrillic alphabet (used in languages like Russian, Ukrainian, and Serbian) look identical or extremely similar to characters in the Latin alphabet (used in English and many other Western languages).

    • For example, the Latin "a" (U+0061) and the Cyrillic "а" (U+0430) appear indistinguishable to the human eye in many fonts. The Latin "o" and the Cyrillic "о" are another common pair.
    • This visual trickery is the core of the attack.
  • Deceiving Users in URLs and Email Addresses: Hackers exploit this visual similarity to create fake website addresses (URLs) or email addresses that look exactly like legitimate ones.
​
So basically, in the past the links were obvious to detect as they go to unexpected addresses. Now they actually look correct but the changes font for particular letters can completely change the destination.

How to Protect Yourself

  • Hover Before Clicking: Before clicking on any link in an email or message, hover your mouse cursor over it. This will reveal the actual URL in your browser's status bar (usually at the bottom of the screen). Carefully inspect the URL for any unusual characters, especially if it looks slightly "off."
  • Look for xn--: If the URL in the status bar starts with xn--, it's an Internationalized Domain Name. While not all IDNs are malicious, this is a major red flag and warrants extra scrutiny.
  • Type URLs Manually or Use Bookmarks: For sensitive websites (like banking, email, or shopping), always type the URL directly into your browser or use a trusted bookmark. Never click on links from emails or messages to access these sites.
  • Use Multi-Factor Authentication (MFA): Even if an attacker manages to steal your password through a homoglyph attack, MFA adds an extra layer of security. This requires a second verification step (like a code from your phone) before access is granted.
  • Keep Software Updated: Modern web browsers, email clients, and operating systems often include built-in protections against homoglyph attacks. Regularly updating your software ensures you have the latest defenses.
  • Be Vigilant and Educated: User awareness is paramount. Understand what homoglyph attacks are and how they work. Share this knowledge with others. If something feels suspicious, err on the side of caution.
​
Ep338
This image is used under the Fair Use provision for the purpose of review and commentary. Source: Facebook
0 Comments

I Have a New Mac

7/6/2025

0 Comments

 
If you’re a Mac user and you want to upgrade to a new iMac or MacBook, you can use several methods to get your data across and basically pick up where you left off and keep working.

The easiest method is to use Migration Assistant.
​

Transfer to a new Mac with Migration Assistant
​

Use Migration Assistant to copy some or all of your content from one Mac to another Mac.

What does Migration Assistant do?

Migration Assistant transfers documents, apps, user accounts and settings from one Mac to another. It doesn’t delete information from your old Mac or replace the operating system (macOS) on your new Mac.
Picture

Migration Assistant can also transfer from a Time Machine backup or transfer from a Windows PC.

  • Connect both old and new devices to the same WiFi.
  • Run Migration assistant on the Old
  • Go through the setup process on your new and tell it to get data from your old Mac device.
  • Create a new User Account and password and hit go

This may take some time depending on how much data you need to transfer.

Ep338
Image Source: Screenshot taken by MITE Radio
0 Comments

Telstra Goes Starlink

7/6/2025

0 Comments

 
For millions of Australians living or travelling beyond major urban and regional centres, the frustration of patchy or non-existent mobile coverage has long been a harsh reality. That has finally changed dramatically, as Telstra has officially launched "Telstra Satellite Messaging," enabling its customers to send SMS messages from virtually anywhere across the continent, provided they have a clear view of the sky.
Picture

This service leverages the advanced "direct to cell" capabilities of new SpaceX Starlink satellites. While only 25-30 percent of Australia currently boasts traditional mobile coverage, Telstra's new offering aims to bridge this vast communication gap.

How do you turn it on?..."As long as your phone has a direct line of sight to the sky, your phone will show 'Telstra SpaceX' as the mobile network, with a Satellite icon in the signal strength area" 

This seamless connection allows Telstra customers on an upfront plan to send text messages to any Australian mobile number, regardless of their location, from the remotest outback to the most isolated coastal stretches.

The service's initial rollout is exclusively for the latest Samsung Galaxy S25 with the newest software update. However, hints from testing in the USA suggest broader device compatibility is on the horizon, with older Samsung phones, recent iPhones (from the last 3-4 years), Google devices, and Motorola's foldable Razr potentially gaining access via future software updates and Telstra network validation.

Telstra's move places it ahead in the satellite-to-phone race in Australia. While Optus had an earlier deal with SpaceX, certification delays allowed Telstra to swiftly capitalize on the technology. Vodafone is also reportedly testing similar capabilities with an alternative satellite provider (I think Lynk Global and AST SpaceMobile)

While the service is currently limited to SMS, making it unsuitable for Triple Zero emergency calls, its implications for safety and connectivity are immense. Users can now communicate with friends and family from previously unreachable areas, offering peace of mind for adventurers, remote workers, and residents alike. Looking ahead, Telstra plans to introduce voice calling capabilities in 2026, with slow data access for messaging applications also on the roadmap.

​For a nation defined by its vast and often uninhabited landscapes, Telstra Satellite Messaging represents a revolutionary leap forward, fundamentally altering how Australians connect in the bush, on remote roads, and in any location far from traditional mobile towers.

Ep338
Image created by AI
0 Comments
<<Previous

    Author

    Delve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today!

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    June 2023
    May 2023
    April 2023

    Categories

    All
    AI
    App Of The Day
    Bytes & Beats
    Cyber Security
    Discussion
    Gadgets & Gizmos
    Game
    Innovation Hub
    Listener Question
    News
    Other
    Somethin' For Nothin'
    The Tech Absurd
    Tips & Tricks

    RSS Feed



  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN