<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Florian Einfalt – Developer</title>
    <link>https://drafts.florianeinfalt.de/</link>
    <description>Recent content on Florian Einfalt – Developer</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <copyright>&amp;copy; 2018-2020 Florian Einfalt</copyright>
    <lastBuildDate>Wed, 24 Jun 2020 11:03:51 +0100</lastBuildDate>
    
	<atom:link href="https://drafts.florianeinfalt.de/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>Privacy Policy</title>
      <link>https://drafts.florianeinfalt.de/privacy/</link>
      <pubDate>Wed, 24 Jun 2020 11:03:51 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/privacy/</guid>
      <description>I do not use third-party analytics or ads in my products. I do not collect any user data nor cookies. I am committed to making sure that this remains the case.  Your settings &amp;amp; data are stored securely on your own devices, and, where appropriate, you may choose to back-up or sync through iCloud.
This policy is effective as of June 24th 2020.</description>
    </item>
    
    <item>
      <title>Introducing: Aphasia Speech Assistant</title>
      <link>https://drafts.florianeinfalt.de/posts/introducing-speech-assistant/</link>
      <pubDate>Tue, 16 Jun 2020 12:00:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/introducing-speech-assistant/</guid>
      <description>This article is available in English and German.
Introducing: Aphasia Speech Assistant In December 2013, my Dad suffered a series of strokes and a brain haemorrhage. After a months-long recovery period, my family was introduced to our new reality: Aphasia. If, like me in 2014, you have no idea what that means, this is how Wikipedia summarises the condition in a couple of sentences:
 Aphasia is an inability to comprehend or formulate language because of damage to specific brain regions.</description>
    </item>
    
    <item>
      <title>Running small businesses on iOS</title>
      <link>https://drafts.florianeinfalt.de/posts/running-small-businesses-on-ios/</link>
      <pubDate>Tue, 06 Aug 2019 16:45:00 +0000</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/running-small-businesses-on-ios/</guid>
      <description>&lt;p&gt;As I have mentioned on previous workflow posts, I run two small businesses, a freelance business through which I offer Python development services and a start-up, &lt;a href=&#34;https://getflowstudio.com&#34;&gt;flow.studio&lt;/a&gt;, which is a project management platform that specifically targets the fashion industry. Managing my time, invoicing as well as bookkeeping and taxes can be a time sink especially if you do not have specialist employees or partners to fall back on. I do work with an accountant who deals with my taxes, but all other admin is part of my daily workload.&lt;/p&gt;

&lt;p&gt;Efficiency is crucial in this regard as the amount of time I spend on admin obviously comes off the time I can sell to my clients or make progress on our product. In this post, I will explain how I integrate different services for banking, bookkeeping, time management and how all of this is glued together with Shortcuts on iOS.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Fluent interfaces in Python</title>
      <link>https://drafts.florianeinfalt.de/posts/fluent-interfaces-in-python/</link>
      <pubDate>Tue, 02 Jul 2019 16:00:00 +0000</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/fluent-interfaces-in-python/</guid>
      <description>&lt;p&gt;One of the lesser known techniques when designing APIs in Python is the concept of the fluent interface. Fluent interfaces help the user of your API to work with an object and it’s methods in a more concise manner and can therefore make your API simpler and more desirable to use.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Accessing my home server with Secure ShellFish (Beta)</title>
      <link>https://drafts.florianeinfalt.de/posts/accessing-my-home-server-with-secure-shellfish-beta/</link>
      <pubDate>Thu, 06 Jun 2019 11:00:00 +0000</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/accessing-my-home-server-with-secure-shellfish-beta/</guid>
      <description>&lt;p&gt;Ever since setting up my Mac mini home server as a companion to my existing Synology NAS, I have been looking to streamline my workflow for accessing the data on my NAS when working on iOS. My goal was to make file access as straight forward and secure as possible: security in this context means not exposing any services to the public internet and to incorporate strong authentication protocols. Ease of use requires the workflow to include modern iOS features such as drag and drop and support for the iOS Files app. When I heard about &lt;a href=&#34;https://secureshellfish.app&#34;&gt;Secure ShellFish&lt;/a&gt;, a new app by Working Copy developer &lt;a href=&#34;https://twitter.com/palmin&#34;&gt;Anders Borum&lt;/a&gt;, which is currently in Beta, I had to become part of the TestFlight to see whether it could simplify my workflow. (Spoiler alert: It did.)&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Automating Hugo blog post creation using Shortcuts</title>
      <link>https://drafts.florianeinfalt.de/posts/automating-hugo-blog-post-creation-using-shortcuts/</link>
      <pubDate>Mon, 27 May 2019 11:00:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/automating-hugo-blog-post-creation-using-shortcuts/</guid>
      <description>&lt;p&gt;One of the true advantages of using the static site generator Hugo on macOS is the &lt;code&gt;hugo new&lt;/code&gt; command which creates a new Markdown file that has all the relevant metadata fields pre-created so that you only have to add a little bit of information and you’re ready to start writing a new blog post. Today, I ventured to replicate this functionality with Siri Shortcuts, so here’s how that went.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>A mere-mortal&#39;s guide to security and privacy online – Part 5: Instant messaging</title>
      <link>https://drafts.florianeinfalt.de/posts/sec-5-instant-messaging/</link>
      <pubDate>Fri, 24 May 2019 12:45:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/sec-5-instant-messaging/</guid>
      <description>&lt;p&gt;I‘m often being asked two questions when it comes to instant messaging (IM): „Why are you not on Facebook Messenger?“ and „Why are you not on WhatsApp?“ My usual answer is that I will never join a messaging service or social network that is owned in-part or fully by Facebook because their commercial incentives are 180 degrees opposed to what is good for me as their potential user. Usually, I will earn a „take off your tin-foil hat“ kind of stare and we move on, but rarely people will ask what to use instead and why, this post is for these people.&lt;/p&gt;

&lt;p&gt;So in the second part of my series about online privacy, I will have a look at instant messengers, how to choose them wisely and why „It’s what my friends use.“ should not be the only deciding factor in a privacy-conscious choice.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>A mere-mortal&#39;s guide to security and privacy online – Part 4: Advertising and tracking blockers</title>
      <link>https://drafts.florianeinfalt.de/posts/sec-4-ad-tracking-blocking/</link>
      <pubDate>Wed, 22 May 2019 12:45:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/sec-4-ad-tracking-blocking/</guid>
      <description>&lt;p&gt;Every computer user is familiar with the following scenario: you are planning to make a purchase of, say, an electric toothbrush or a similar consumer good. Because there are hundreds of options from different manufacturers you go on to do some research on various websites and finally search Amazon for the option with the best price. So far so good. However, when you go to check the news on the Guardian, the New York Times or a similar publication, all advertising spots are full of electric toothbrushes. Coincidence? Far from it! In this article I’ll describe how tracking works and how you can protect yourself from the most egregious methods of social and advertising networks.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Moving workflows from macOS to iOS</title>
      <link>https://drafts.florianeinfalt.de/posts/workflows-macos-ios/</link>
      <pubDate>Tue, 19 Mar 2019 16:00:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/workflows-macos-ios/</guid>
      <description>&lt;p&gt;At the beginning of 2019 I embarked on a little experiment. I had been an avid and happy user of Mac OS X (now macOS) since the early 2000s when I bought my first white plastic iBook and made the switch from Windows. Inspired by the articles of Federico Viticci on &lt;a href=&#34;http://macstories.net&#34;&gt;Macstories&lt;/a&gt;, I set out to explore how much of my entrenched Mac-based workflows for photography, development, business and writing this blog could be converted to iOS on the 10.5-inch iPad Pro.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>A mere-mortal&#39;s guide to security and privacy online – Part 3: Encrypted file transfers</title>
      <link>https://drafts.florianeinfalt.de/posts/sec-3-encrypted-file-transfers/</link>
      <pubDate>Tue, 19 Feb 2019 12:45:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/sec-3-encrypted-file-transfers/</guid>
      <description>&lt;p&gt;Now that we have discussed securing access to vital online services in parts &lt;a href=&#34;https://florianeinfalt.de/posts/sec-1-password-managers/&#34;&gt;1&lt;/a&gt; and &lt;a href=&#34;https://florianeinfalt.de/posts/sec-2-multi-factor-auth/&#34;&gt;2&lt;/a&gt; of this series, I will turn to another common activity that does not have a straight forward security and privacy story: file transfers.&lt;/p&gt;

&lt;p&gt;Most of us need to send files that contain confidential information. These could be invoice scans that we need to send to our accountant, property or legal documents that we exchange with our lawyer or market research and sales data that we would like to share with our business partners. But how can you ensure the confidentiality of these important documents in transit and how can we minimise the risk of them being stolen whilst stored on a third party service’s servers? Let’s dive in.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>A mere-mortal&#39;s guide to security and privacy online – Part 2: Multi-factor authentication</title>
      <link>https://drafts.florianeinfalt.de/posts/sec-2-multi-factor-auth/</link>
      <pubDate>Sat, 16 Feb 2019 12:00:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/sec-2-multi-factor-auth/</guid>
      <description>&lt;p&gt;In the &lt;a href=&#34;https://florianeinfalt.de/posts/sec-1-password-managers/&#34;&gt;first part&lt;/a&gt; of this mini-series I talked about how password managers can protect you from the most common random attacks. In this post, I&amp;rsquo;ll be looking at what you can do beyond password managers to further harden the security of your data: multi-factor authentication.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>A mere-mortal&#39;s guide to security and privacy online – Part 1: Password managers</title>
      <link>https://drafts.florianeinfalt.de/posts/sec-1-password-managers/</link>
      <pubDate>Tue, 11 Dec 2018 16:00:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/sec-1-password-managers/</guid>
      <description>&lt;p&gt;Adobe, LinkedIn, Dropbox. In the last few years, these well-known companies suffered from compromised systems, exposed user data and joined an ever-growing list of information security and privacy &lt;a href=&#34;https://haveibeenpwned.com&#34;&gt;nightmares&lt;/a&gt;. Chances are your email address and password along with other personal data is part of the database dumps stolen and is easily accessible in certain corners of the internet. What can we do to mitigate the real-life effects of having our personal data exposed on the internet? In the first part of my series on personal information security, I&amp;rsquo;ll have a look at password managers.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Bitesize: socket.getsockname</title>
      <link>https://drafts.florianeinfalt.de/posts/socket-getsockname/</link>
      <pubDate>Thu, 23 Aug 2018 17:30:00 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/socket-getsockname/</guid>
      <description>&lt;p&gt;Whilst looking at some old code of mine, I discovered a quick way to
programmatically retrieve a hosts local IP address, the
&lt;code&gt;socket.getsockname()&lt;/code&gt; function.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Bitesize: dict.setdefault</title>
      <link>https://drafts.florianeinfalt.de/posts/dict-setdefault/</link>
      <pubDate>Thu, 16 Aug 2018 20:13:17 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/dict-setdefault/</guid>
      <description>&lt;p&gt;Today, I discovered a little-used feature on Python&amp;rsquo;s &lt;code&gt;dict&lt;/code&gt; type that I
thought was worth talking about briefly: the &lt;code&gt;setdefault&lt;/code&gt; method.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Captain Hook</title>
      <link>https://drafts.florianeinfalt.de/posts/cpt-hook/</link>
      <pubDate>Wed, 15 Aug 2018 21:45:17 +0100</pubDate>
      
      <guid>https://drafts.florianeinfalt.de/posts/cpt-hook/</guid>
      <description>&lt;p&gt;Pondering over the Shotgun hook framework at work today, I wrote a simple
hook decorator handling pre-function execution and post-function execution
events.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>