Dual Monitors

Now that the girls are in school full time when the opportunity arises unable to work from home more often. Sometimes it’s a necessity because of the girls being in school and the need to drop off and pick them up in the same day if MC cannot for some reason. Other times it’s just general convenience. Being able to do that has posed new challenges for me. I used to have to hide in my bedroom with a laptop so no matter what I did I was not comfortable. Now I can go to my desk however I don’t like sitting in front of the laptop screen all day. It was a big production to reconfigure my monitor so I can plug my laptop into it to work. My solution was second 27″ monitor so I can have two computers running at the same time.

This configuration solves another challenge I had since I wanted to run a Linux desktop in tandem with my Mac mini. Or sometimes plug raspberry pi into monitoring my desk and work on. With my Apple Cinema Display I’m unable to do any of that since it has the thunderbolt display adapter that limits what computers I can use on it. Amazon had a good deal on a 27 inch Dell monitor. It’s basically the 27 inch variant of the 24 inch monitors I have at work. They’re pretty good so I was confident in buying a larger 27 inch.

Even I measured before I bought it that both 27 inch displays will fit I have very little room on my desk  with both computers set up. Functionally speaking the set up does exactly what I wanted it to. I put my desktop and the cable run for the laptop to a shelf on my desk so I save surface area. When I’m not using my work laptop I can plug my MacBook or a Lenox computer into the second set up. I’m contemplating buying and building a Lenox desktop however  I don’t have the time for that project just yet with a few other projects I have still going on at home.

Inbound Network Lockdown With an SSH Proxy

Ever since I started working on building my backup network using raspberry pi’s and BitTorrent Sync I’ve started a list of other home projects I want to do with technology. One of the things that’s been in my head however not high on the list actually do was create a VPN endpoint with my home router so I could VPN in while remote. I tried to play around with open VPN and ran into some pickups. Didn’t have all the time I really needed to sit down and figure it out so I gave up on the project. Even while I was trying to set up an inbound VPN friends of mine at work were saying it was probably overkill anyway.

At least one if not more people recommended that I set up a SSH proxy on one machine and use that to connect to all the other resources. I like the idea but never gave it much focus until recently. I have a Zotac ZBox C Series Mini Computer that I have been running Ubuntu Linux on for a while. I’ve been baking it in as a next-generation BitTorrent Sync machine for my network. I hadn’t deployed it yet and figured I would try using that as my SSH proxy.

The proxy itself was trivial to initiate to the box. Deciding how I would configure my computer was not difficult however it took some thought so I could be connected to the proxy in one web browser and not affect all other Internet traffic. I opted to try FoxyProxy in Firefox. I do not normally use Firefox on a day-to-day basis so being able to dedicate that browser for direct proxy connections to my home network seemed reasonable.

The setup worked with less than 30 minutes of configuration. Once I was able to prove to myself that I can do this and maintain I needed to figure out what my permanent solution would look like. The Zotac likely won’t stay at my house and I’m using it for other things. If ongoing have a proxy I use often I want isolated and basically have it do one thing only. I opted to set up one raspberry pi as a dedicated SSH box. At the moment I have enough spare pi’s to dedicate one. I initially had concerns about the 100 Mb limit on the network card however I doubt I’ll be doing anything of high traffic that I should worry.

My set up for now is simple enough. I have a plain-vanilla Rasbian install on a Raspberry Pi 2 with a 16 gig SD card. I have the pi plugged into an ethernet jack on my router. Besides SSH I installed Fail2ban to protect myself from potential attacks on the Internet. I also used a password of significant complexity for the login details. I have a dynamic DNS entry set up so it’s easy to connect from anywhere.

This setup works well on my laptop however I am not sure if I could get it working using my iPad. That’s one trade-off with this configuration however most if not all of the services that I previously exposed to the Internet should be fine with this limitation. If anything I can use remote desktop software from an iPad to connect to a local machine and then bring up those services.

The next thing I want to do involve making it easier to access my home network while on my laptop remotely. That mainly involves configuring Royal TSX sessions to use my proxy details. I also would need to set up the proxy connection within royalty TSX. I also need to finish creating localhost entries for my home network services as well as bookmarks within Firefox to make accessing everything easier. As much as I want to do that all up front it’s a little bit of effort that I will probably just take care of as I need it.

An additional enhancement I would like to make is to go beyond having Fail2ban and a strong password to enabling to factor authentication. That will require A bit more skill for me to learn and at least one hardware USP token. For now I consider that a reach goal.

I still want to find some time to play with inbound VPN configuration. Even if it’s just to show myself I can do it. For now however the SSH proxy more than meets my needs and is working today. There are other projects on my “Technical Maker Board” that I set up that I’d like to get to next.

The Apple Event

By many I am considered a fan of Apple products. I guess I am however that’s only because they make good stuff. When they stop making goods product I’ll stop buying them. That’s an old argument since many don’t realize I’ve owned many an android device so I have my opinion of Apple-based first-hand experience between both platforms.

I have mixed opinions on the product updates that Apple recently announced. For the Apple Watch I am very curious if the series 2 watches are fast enough that there is no lag when I lift the watch to my face to look at the time. That was a huge annoyance for me and one primary reason why I sold my original Apple watch. I will wait until the series 2 watches are available in the store to test it myself. Until then I  am still happy with a nice classic analog watch.

When I first saw the specifications for the iPhone seven I realized there was no compelling reason for me to upgrade. I have a success plus as my personal phone and there was virtually nothing that stood out and said who I need to have that. Last year forced touch was compelling enough for me to try it however afterwards I realized it wasn’t a worthwhile upgrade. I had several conversations with friends about the same topic. Then I spoke to someone I met via the parent meet up groups. I think even admitted wasn’t much of an upgrade however he was upgrading anyway. It got me thinking why he would do that. It turns out you might be right. I buy my phone out right when i get one. I have for doing that because I set aside money every month for my “tech fund”. Why sell something on eBay I put it back into the fund. When I buy a new iPhone I typically sell the old one on eBay and put it that sale amount towards buying the new phone. I usually get about 30 to 50% of my money back depending on the condition of the phone. What this friend said was that you could do the same thing with apples purchasing plan and still get a new phone every 12 months. I did the math last year and for some reason didn’t think it was compelling. Looking back I think it was because I didn’t want to be locked into something and also because apples purchasing plan includes the extra cost of AppleCare. Thinking about it now I want AppleCare anyway and the price of the phone is no different than me buying it unlocked. The fact that it’s still an unlocked phone even though I’m in a purchase agreement doesn’t matter either.

After weighing all the options using apples purchase plan in essence you can’t get a new phone every year. Now if I was a different person  this might not make sense. If you upgrade annually you’re constantly in an agreement to pay for phone. If you want to upgrade every three or four years then upgrading constantly is not for you since you wouldn’t want to be continuing to make payments. For me however buying the phone every year or two anyway. Even if I did an upgrade to the iPhone seven this year I would definitely be upgrading next year. I amortize the price out over two years that means I’m always paying a fee for my phone anyway. By buying into the Apple purchase plan it just makes it easier to get a new phone every year.

An Update on The Disembodied Female Voice Called Alexa That My Kids Always Hear Me Talking To

When I last wrote about my Amazon echo I said I would be trying to teach it some smart things commands. Yeah, so I didn’t do that. Since setting up my Logitech Harmony with my echo to turn my TV on and off I haven’t really spent much time with the echo teaching it anything new. I’ve continue to use the echo. Apparently not as much as other people who are very vocal about how awesome it is however I am using it. My use case has become listening to music and checking the weather. Of course the main reason I bought the echo in the first place was I wanted to use voice commands to listen to music and my phone paired with a Bose Bluetooth speaker wasn’t doing that very well. With that fact in mind the echo is extremely successful at what I originally purchased it for

I did have hopes of using it for more than just music. I’m not sure if it’s usefulness hasn’t improved for me because I do not use Google for contacts, calendars, tasks. I also do not currently get my news from the radio or TV. I could see using an echo in my bedroom to listen to news stories as in getting ready in the morning however I don’t see the cost benefit of buying another device to do that specific task. The current echo I have is in our living room and suits its primary function very well in that location.

I could see over time having another device in different rooms however I’m holding back on that partly due to curiosity if Apple will release something to compete against the echo. They likely will however what the product turns out to be is anyone’s guess. And plenty of people are guessing, so I’m not going to. Until Apple makes an announcement I keep reading the weekly updates I get from Amazon on what new tricks the echo can perform to see if there’s any new features that will peak my interest. So far I’m still waiting.

One thing I do want to find time to focus on is ;to see if I can integrate my smart things with the echo a bit. That project however is not on the top of my hobby project list. Of course there’s a lot of specific things I want to do with my smart things that I haven’t done in over a year. Since we want to get a house at some point in the near term investing in any fixed devices such as power or light switches in this apartment doesn’t seem worth the value or time. All this extra integration might just wait until after we move.

Securing Email Isn’t Only For Spies, Dissidents, & Journalists, Right?

Over the past year and a half I have been taking lots of steps to secure my digital life. I’ve written a lot about the different aspects of that. My migration from Google mail and other services to more secured options.

One thing I’ve known has been a concern that I’ve not yet addressed the quantity of data online. For example even though I moved my mail to a Swiss based provider I still had my entire email archive available. I have mail going back as far as 1997 I believe. I have been wanting to take that archive off-line and out my email provider’s servers. Over the years I’ve had the packrat mentality where I want to keep all of my messages. Recently I’ve grown to not want many of the messages I received. I’ve been deleting stuff that are unnecessary however there are still things that I get a do want to keep. In general I would like to keep the archive, especially my personal correspondence.

The challenge that I have is that I’m growing less trustworthy of any service provider. Even though my email hosting company is in Switzerland they take no extraordinary security precaution so the system is just as susceptible to hacking as most. That means my mail at rest is in the clear, unencrypted. But I want to do is take my mail and store it off-line so I have more control over it. I currently plan on keeping it in a local archive on my Mac at home. I will also have it backed up on my bit torrent sync network.

The first step in this process was for me to copy all of my mail to a local application. For my purposes I found the built-in Mac mail application to work the best. Once I had a downloaded copy of all the mail I was able to export it to an mBox formatted archive. At the same time I took the opportunity to recategorized how I organized my mail. In the past when I was using Google I had been using tags extensively. When I exported out of Google I went back to a folder structure where each high-level tag was its own folder where I put received mail. When I exported the mail to a local folder I put all sent mail in one folder and all received mail and another. Using mail tags I was able to continue to tag and make smart queries of the male if I ever needed to get a hold of the categories that I used in the past.

Once I had the off-line mBox files I put them in an archive on my BitTorrent Sync network. I kept the live copy in my Mac mail on my computer in case I need to search for and email in the archive. Over the past few weeks after I’ve done this I’m surprised how often I do go back and reference old emails for things like key codes or when did I buy something. After I was satisfied that the mail was backed up I deleted it from my hosting provider.I did leave this calendar year’s mail on my hosting provider. I figured that was a good round number to keep online. I can annually do an archive. Having to be at home or to remote into my home computer to perform mail queries has become a slight inconvenience however it hasn’t been the end of the world.

In addition to moving my entire mail archive off-line I want go further and start using a secured email provider like proton mail that takes extraordinary steps to encrypt the data at rest.I do not need that level of security for all my mail however does come in handy for some of it. There’s been several messages I’ve been hesitant to send or had no choice but to send that contain sensitive information such as bank information or Social Security numbers in the past that I would prefer not to use via email. And of course that’s not my paranoia security experts say never do that. Having a secured provider that encrypts the mail at rest and also has mechanism for sending secured mail to others could be useful. Really what he secure mail is doing is it sending email to the recipient with a link back to the website that secured that contains the actual message. I need to provide a password hint in the body of the mail I send. It’s not perfect however in most cases it will solve the problem of sending outbound secured man.

One of the challenges in a system such as proton mail is that at present there is no mechanism to import or export mail. That means anything I receive is locked into that system. On day one that’s not a problem however I like to have data portability. Protonmail says they are working on that function however who knows when or if it will ever come to pass. I may still use them for some correspondence only and in essence had two private email addresses one for security and one for unsecured messages. That way I can route one I want secured to the encrypted system.

I’ve also been looking at Tutanota as an alternative to proton mail. It appears to have the same import and export limitations however otherwise seems like a very similar and comparable option. Both systems offer a free tier.I signed up for both services to play around with them. I’ve since signed up for a month-to-month service with both of them and them in the process of pointing in unused email domain to Mutant, while I’ve already completed setting up proton mail. Protonmail so far seems like a slightly better option in terms of usability however it is significantly more money per month than Tutanota. The only reason I signed up for the paid version of Tutanota after I signed up for Protonmail was because it was less than two dollars a month.I hope to give both services try for a month or two before settling on one or the other.

For now the combination of moving my mail off-line and having a encrypted provider as needed suits my needs. These changes are all still pretty new so I will see how things pan out over the next month or two before I decide to make any tweaks or to let the situation be as is for the time being.

That Time Were My Security Paranoi Might Pay Off in a Real World personal Scenario

In a recent post I wrote about how I had to wipe my Mac Mini at home due to a potential compromise in my chrome browser. The ironic thing with that issue was for months I’ve already started taking steps to minimize the chance of such an exploit. The problem likely began months earlier and didn’t present itself until recently however the damage was already done. It just justifies the extreme measures I am taking taking in regards to securing my web browsing.

At a high-level my approach is isolating some but not yet all of my browser traffic to Linux virtual machine. I know that theoretically a virtual machine is not 100% isolated. I’m willing to chance using the virtual machine over booting into TAILS using a USB key. That level of inconvenience is not something I typically want to be bothered with and I feel that my current solution will be good enough.

Within the virtual machine I installed Firefox and chrome browsers as well as the TOR browser. I also configured open VPN to use my VPN provider. I then set up a visual cue i.e. a distinct background of the virtual machine to note that when I am using it I am in a semi-isolated system.

To protect the virtual machine from most exploits I take a snapshot about every month that includes the latest patch level for all the applications in the operating system. I do not ever use the virtual machine prior to that snapshot to do anything other thank update software or make base OS and application configuration changes I want to be persistent. Once a snapshot is taken I will use the virtual machine and then when I’m done I will revert back to that clean snapshot. I might not revert back to the clean snapshot after each use however I try to do it as often as possible. At minimum when I go to update the virtual machine I will revert back to the last known good “clean” snapshot and upgrade that. Then I’ll take another snapshot.

Late last year I implemented this solution using an Ubuntu 14.04 virtual machine. In April I built new ones using Ubuntu 16.04. Because I own a copy of VMware Fusion for personal use and a work copy of Parallels I have both virtual machine flavors of the operating system image. Other than a few minor tweaks with the new image the 16.04 version is mainly an operating system upgrade. I now have a “secured virtual machine” on all the main computers that I use day-to-day.

The solution isn’t perfect however as a first pass at this I feel that it gives me the best trade-off between additional security and ease of use. The VPN gives me some anonymity. TOR And VPN gives me more. The snapshot of the virtual machine decreases the chance that the system can be infected.

Longer term I want to build a dedicated machine for TAILS or Quibs. That solution would only work at home since I need a dedicated computer setup for it.  For now I will settle for the VM solution I have implemented until I am comfortable using it and able to accept the extra effort involved in a dedicated machine configuration.
What’s interesting or disturbing to me is some corporate executives and even government representatives (NSA labels Linux Journal readers and Tor and Tails users as extremists

I Played iOS 10 Beta Roulette and I Lost

When Apple announced that the public betas for iOS was available I thought about trying it out. I then remembered Beta one of iOS and how I had to quickly remove it from my phone even though it wasn’t a phone I relied on day-to-day. This year I waited. Last year around now I felt it was safe enough to try the beta on a phone and generally was okay playing with it through the official launch of the operating system.

Since as of this writing it is late August (22-August and not sure when this post will be scheduled to post) and the launch date for the final version of iOS 10 is close enough I finally installed the latest public beta of iOS 10 on my iPhone 6S Sunday. So far I haven’t noticed much difference. It feels like all his bedding features I was looking for a not yet enabled class apps are written to support them. I am talking about features like unified call log and chat messages in messages from my VOIP applications. Or Siri application integration.

One function that does work is facial identification in photos.I was able to tag some photos with the correct names of people however when I miss tagged one photo I was not able to remove the linkage. There’s definitely some work that needs to be done however so far it looked pretty cool.

Other than the notification pop-ups looking different I haven’t really experienced much change so far. Our plus side most of the apps I’ve tried to use including my dictation app seemed to work without problem. I was concerned about the beta breaking stuff. That is why I waited until late August to try a beta. I am also only testing on one phone that if I ran into a problem I don’t have to rely on.

UPDATE

I wrote the initial part of this post over the weekend and scheduled it to publish on Friday, 26 August. Between the time I wrote it and Wednesday night I had a change of heart. There did not seem to be anything fundamentally wrong with iOS 10. I’m eager to see some of the new functions working when applications are updated to support them however feature wise the beta was just not that compelling to keep using it. The trade-off to using it was flaky network connections where I would have to put the phone in airplane mode and then turn it off every time I came out of the subway. To my dictation app, Dragon Anywhere not syncing correctly even know it mostly worked. I don’t rely on this phone that’s running the beta however it was more nuisance than it was worth.

In the end there wasn’t anything majorly compelling to use the beta or to get rid of it. I took the short term hit of time to do a full restore last night and will eagerly upgrade when the final version comes out.

It’s A Microphone Not A Speaker, That’s Why I Talk Into It

Say hi to Snowball. Pretty much everyone that sits near me believes that this is a speaker. They are usually pretty surprised when I tell them that it is in fact a microphone. I would think the people that immediately sit near me here my dictation however maybe I’m more self-conscious then I should be.

What’s cool about the snowball is that with a keyboard command I can turn on my Dragon Dictate app and dictate something pretty clearly and then turn off the listening mode of DragonDictate. I was hoping for and what ended up happening is that this microphone enables me to use the Dragon software more often throughout the day. Before that I would have to put a headset on and take it off every time I wanted to dictate. That was annoying. I also couldn’t listen to music at the same time I want to dictate anything because I couldn’t have two headsets on at the same time.

A guy at work who was dabbled in blogging owns a better model microphone by the same company recommended it. The reviews on Amazon were also pretty good so I splurged a little bit and picked this mic up a few months ago. I’m glad that I did. It is not as accurate as My headset mic right up against to my face however it gets the job done a lot better than any other alternative.

Anything that allows me to decrease the amount of typing I do, the happier I am. I do find however that for longer documents or messages I need to write I prefer to take my laptop and headset and go into huddle room to dictate. I think that is more around being self-conscious then performance of the snowball.

Overall this was a great purchase.

The Time I Had To Nuke The Site From Orbit

Back in mid July I noticed something odd with my Mac Mini.  It turned out that At some point in the past few months my chrome browser on my Mac Mini at home was compromised. I’m not sure if it was malware or a configuration hack on the browser.

The problem may have existed for some time. I do not normally use chrome on my home Mac. What I noticed that was odd behavior  after I launched chrome to log into my Google account. Whenever I use my Google account I always login via chrome. Call me paranoid but I do not want Google possibly tracking activities via my login on Safari that I use as my daily browser. When I attempted to log in I noticed that after clicking on login from Google.com  I got some fake message about my Google account being compromised. The funny thing was I never actually gave it my login credentials and the screen that was displayed didn’t look at all like standard page on any Google site I have been on.

My first reaction was to clear all the settings on the browser like it was a brand-new set up. I then tried again however the problem persisted. That was concerning to me.

My next step was to completely delete the Chrome browser from my Mac and download a fresh copy from Google.com using a different browser. That worked and once I installed the new version everything seemed okay. The lingering question I had was how contained was the problem I had? I some confidence but not enough that  issue was purely within chrome.   I had no definitive evidence to back myself up. 

To be safe in the immortal words of Riply from the movie Aliens  “nuked the site from orbit”. I created a carbon copy cloner image of my OS drive and then deregistered any application I needed to associated with this computer and wiped it. That was the only way to be sure that there was no ongoing compromise to my system.

The rebuild process was slightly challenging and took more time than I’d hoped. As I was trying to reformat the drive in recovery mode the computer kept crashing. I am not sure why.  That forced me to start to do a network boot and download the original operating system that came with this Mac bypassing the step on my local hard drive that was crashing. The machine is from 2012 so that meant at least three OS upgrades to get me to the latest. By the time I completed the original OS install I was able to download El Capitan on my MacBook Pro and create a boot USB key. The USB key worked so I was able to save a significant amount of time and jump right to El Capitan.  I was handful I did not need to complete several more upgrades. The parallel efforts paid off of trying to create the sub key boot disk from my laptop paid off.

Once I had my base install done I was able to patch the system and install the standard applications that I typically use. Because I use Bittorrent Sync for replicating my data restoring most of the system was as simple as reseeding my data on this machine. It took several days for the data to replicate however when it was done everything was fine.

Weeks later there are still some applications I haven’t finished setting up yet. Of course that means I don’t use them that often so it’s a minor inconvenience. The main applications I use already set up and working perfectly fine.

For me the moral of this story is my data replication set up works. I also confirmed what I already knew that no matter how diligent I am I can still be compromised. I think the problem is existed for a while however have no way to prove it. Recently I have started compartmentalizing some of my web browser to prevent such exploits. That I hope will mitigate risk for the future however nothing is 100% safe. That Compartmentalizing effort in and of itself is a blog entry I’m working on.

My New Mechanical Keyboard

I am finding it pretty funny that society in many cases has conditioned us to think new and shiny stuff is better. A few years ago I started reading about getting shaves the old-fashioned soap and a brush. That led me to buying old school one blade safety razors for a time. Since then I’ve evolved to a more expensive and more modern twin blade. My point though is the technology from the middle of last century for me works better than any of the modern stuff. Today I get a better experience with the twin blade and shaving soap and a brush then I ever did with a fancy Mach 3,4, or 5.

Taking that lesson learned I should have come to the same realization on certain technologies. About 9 or 10 years ago Apple released their new style keyboards. It mimics for had a similar movement to keyboards on their laptops. At the time I thought that was the coolest idea that we give me seem typing experience when I work directly on my laptop or when I worked at my desk. The new keyboards were nice and shiny white. The best part was they had a small wireless version was pretty nice size compared to previous wireless keyboards.

At that time I had been using a White Apple Keyboard 109 Keys A1048.  I wasn’t that impressed with those keyboards and I’m not really sure why I got rid of my prior keyboard the Apple Pro Keyboard (M7803). Those were really good. I think it was related to the fact that at the time I was using an iMac and they came with the white 109 key keyboard. I likely would’ve sold the Pro keyboard when getting rid of a PowerBook. Looking back that was probably a huge mistake. At the time I thought the upgrade to the laptop like sleek mobile keyboard would be a smart move for me.  Even after I had the new keyboards for years I was relatively happy with them.  Flash forward nine years and I saw an article talking about the highlights of a Bluetooth wireless mechanical keyboard that also muffles mechanical movement sound (the Matias Laptop Pro Keyboard for Mac). Even though I was interested, I thought that at the time that I was generally happy with what I had so it wasn’t worth the money.

The idea of the keyboard was still pretty cool yet I was still interested in trying to help my hands make it through the day of typing. I have had repetitive stress issues with my hands on and off for a while. Well I think that’s what it is. Let’s be honest the one Tyler brought up to my doctor he said just rushed her hands and you’ll be fine since the issue seemed very mild.  That being said on some days towards the end of the day my hands feel really tired from the typing. That has been a major driving factor for me to use the dictation.

A few weeks ago the topic came up with someone at work. I think we were either discussing wrist pain or that he was building a vintage computer that the discussion on old-school mechanical keyboards came up. As it turns out he had done a lot of research on the topic and was able to geek out with me on the different mechanical movements of old-school keyboards. I showed him the link to the Matias and we did some basic research on it. Turns out the Matias is based on the same Alpine mechanism that the Apple Pro keyboards were that I liked so much. With that knowledge and a renewed focus on my typing comfort I splurged on the keyboard.

When I first got it I was concerned that it would take me some time to adjust. I’m always worried that during that adjustment. I’ll get set up and just not like it. That leads to returning or not using the device in question. With the Matias keyboard however within an hour or so I realized its value. It felt that I could type faster with it then I was on my old one. It also immediately felt comfortable to use. On both counts I was extremely pleased.

The only drawback I’ve noticed is that I have to tell it to connect to my laptop every morning. It’s more of a minor inconvenience than anything else. There were one or two days in the past month where it didn’t connect and I needed to go into Bluetooth settings and reset it. The only other issue I’ve had is only once or twice there was some lag from when I typed something to when it went on the computer screen. Reviews of the Bluetooth keyboard reported similar issues however it’s not a major problem for me at this point. I like a wireless keyboard over a wired one however if I need to buy another one might pick up the wired version.

Since I do most of my typing at work this keyboard home at present is in my office. It is so much nicer to use this mechanical keyboard versus the new Apple rechargeable wireless keyboard that I have at my desk at home. I bought one of the rechargeable keyboards and it came out since using or chargeable batteries in the old blue two keyboards were pain. They weren’t keeping charges. I was also curious at the time if the new keyboards would be more comfortable to use then the old ones. It wasn’t. I was surprised at how much worse the new one felt to type on. At this point I think I’m gonna save and buy another one for home.

If this was a product review I would likely give it five stars.