On this episode Matthew and Gareth take the time to explain in simple English, using real examples, USB advancements, Wifi changes, 2 Factor Authentication, Cloud systems like iCloud, Australian Free To Air changes affecting older TV's, VPN's and what major computer parts do.
Matthew explained the evolution of USB connectors, noting that USB-C is now widely used but can be confusing due to different standards like Thunderbolt 3, which allows faster data transfer and more power through the same connector. Gareth asked about using a USB-C cable with Apple devices, and Matthew clarified that while the iPhone Pro Max supports USB 3 speeds, other Apple devices use USB 2, making cables compatible but with varying speeds and power capabilities.
USB and Wi-Fi Technology Evolution
Matthew explained the differences between USB cable versions, noting that USB 4 cables are backward compatible with USB 2 devices but offer faster speeds and more power. He advised Gareth to look for cables labeled USB 3 or USB 4 for compatibility with various devices. They also discussed the evolution of Wi-Fi standards, with Matthew explaining that different versions like 802.11b, 802.11a, and Wi-Fi 5 represent distinct technologies with varying capabilities.
NBN Fiber and Wi-Fi Updates
Matthew explained that most NBN connections can now support fiber-to-the-home, which would require changing the modem to achieve full speed benefits. He clarified that while higher Wi-Fi standards like Wi-Fi 7 and 8 offer faster speeds, Wi-Fi 6 is sufficient for most home internet usage, as most users don't require the high speeds these newer standards provide. Matthew also discussed two-factor authentication, explaining that it adds an extra layer of security beyond just passwords and usernames.
Two-Factor Authentication Challenges
Matthew and Gareth discussed two-factor authentication methods, highlighting the challenges and security implications. Matthew explained that while two-factor authentication adds an extra layer of security, it can be cumbersome, especially when switching devices or losing the primary device. Gareth raised concerns about the process of transferring authentication apps to new phones, emphasizing the need for careful setup or professional assistance. They agreed to address this topic in future sessions, and Gareth also planned to explore cloud-based data transfer options for new phones.
Cloud Storage and Digital TV Basics
Matthew explained the basics of cloud storage, emphasizing that it involves using the internet to store data on websites like iCloud or Google Photos. He advised against relying solely on cloud storage and recommended backing up data on USB hard drives for control and security. Matthew also discussed the transition from MPEG-2 to MPEG-4 in digital TV broadcasting, noting that older TVs may struggle to receive certain channels, prompting the need for new TVs or set-top boxes. Finally, Matthew defined an IP address as an internet equivalent of a street address and explained how it can be used to track internet activity.
Understanding VPNs and Computer Components
Matthew explained how VPNs can help hide a user's IP address and location, but noted that law enforcement can still track users through VPNs by accessing logs kept by VPN providers. He also discussed the Darknet and Tor browser, which can further obscure a user's online activities. The conversation concluded with Matthew providing a basic overview of computer components, explaining the roles of the CPU, RAM, and storage devices in a computer system.