This is our Twitter link for this article
- Ever feel like your personal information is being violated by others? Well, iSecure is a new app for kids as young as elementary to adults who have everyday jobs. This app can be downloaded on your smartphone. iSecure provides a useful means to share documents under tight security. To get started, new members will need to click the the sign up button. Complete the registration and your profile information.
- To download this app, go to the app store on your smartphone. DeVoss and Porter states that “ they want a “free net.” The Internet of course is not free” Well, The app is totally free.Once it’s downloaded, this screen will appear and you will be ready to secure your files! (DeVoss and Porter, pg. 192).
- To begin, fill out the iSecure registration information which includes your full name, username, password, email, and other personal information. Also, it is important to make sure you agree with the Terms and conditions of iSecure. According to DeVoss and Porter, “Think of it as a set of guidelines governing the relationship between writers, readers, and publishers.” So, You can’t move on without agreeing!(DeVoss and Porter,pg.185).
- Once you are registered for the app, you are then able to use your username and password that you created from the start. “Critics accuse the computer of promoting homogeneity…” says Bolter. So, your username and password will help keep all of your files and other things safe from being copied by someone else. Click the Sign Up button and begin! (Bolter,pg.11)
- The iSecure set up is a simple and easy process. The first step to setting up your profile for iSecure is filling out personal information you want to share with others. This includes your birthday, interests, education, and many more.
- The second step to setting up your iSecure app is creating a profile picture for your account for you and your friends to see. You will be asked to either upload a saved photo from your phone or take a new photo on your smartphones camera. However, if you chose to not upload a picture to your profile, that is ok too. In a previously read article by Danielle Devoss and James Porter, these two authors discuss the idea that came out after Napster’s death, such as “We thus use the term ‘post-Napster’ to symbolize the death of Napster as it was originally conceived: a space for free file-sharing and for consumption not framed by costs and fees but by an ethic of open distribution and collaboration” (Devoss, Porter 182).
- The next step is a fun way to get connected with your friends securely! You can search friends through your contacts on your smartphone or by email, it’s your choice. Simply add your friend by clicking the + button. They will get the request notification in the inbox and then chose to confirm.
- This last and final step is creating your secret password for iSecure. (probably the most important step) This password is confidential only between you and your friends. An important thing about this step is to not forget to inform your friends through messaging the confirmation of the password. And remember; you now have two passwords! One to log on, and one between your friends.
- Congratulations! This screen will appear when you have completed the registration process. You are officially a member of iSecure! By clicking on the Get Started button, you will be transferred to the Home Page. As Bolter expresses in his article ‘Writing in the Late Age of Print,’ Word processors already demonstrate the flexibility of electronic writing and allowing writers to copy, compare and discard texts with the touch of a few buttons (Bolter, J.D. 9).
- This leads me to presenting the homepage. This page offers different links to test and try out. You will see icons that show the features that the app provides. You can then click the profile icon to be transferred to your profile. This will allow you to be able to edit certain features and begin your writing! Electronic technology provides a range of new possibilities, where as the possibilities of print seem to have been played out. (Bolter, J.D. 2)
- This profile page is just like any other one either on another app, a website, or blog. This includes your picture, personal information, interests, and many more.
- From your home page, you can also have access to different sites by linking to sites such as Google, Twitter, Facebook, and even WordPress to your friends. Click on the site of your choice to begin linking. This takes the idea of the building of the Open access network (free worldwide file sharing) as mentioned in Devoss & Porters article on Napster (Devoss & Porters 196)
- You can now start sharing and linking files from the site. You will be taken to that site through iSecure. Then you would select the file from your computer or smartphone by clicking the “Add File” button. These overwhelming features are similar to idea of how humanity was dealing with the rise of the computer, in today’s case the smart phone (Bolter 23-26)
- iSecure can also send live messages while your friends are using the app with you. First you select a friend, then type your message just like a regular text message, allowing communication solely through the app. This form of messaging is a product of the early PC in the 1970’s, particularly the multi-user domains, used by authors to improvise scenes for stories (Turkle 1, 4).
- This app not only allows you to communicate with others, but share media such as pictures and videos. Simply click the icon to open your “camera roll” to select pictures and videos from your phone. Then drag the select image/video into your friends box to share.
16.When you receive messages, pictures, videos, or links from your iSecure friends, they will go directly to your inbox which can be accessed through your home page strictly on the app, this feature still follows proper ethics of delivery hi-lighted by Danielle Devoss and James Porter by still being able to identify original authors and senders, just in a more secretive and secure way (Devoss Porter 197).
- iSecure serves as another one of “semi-closed platforms” termed Chris Anderson and Michael Wolff. Another App that separates the internet from the web. You can navigate through iSecure and it’s features through the “Settings” option which can be found on your homepage. It’s here you can log off and deactivate your account if need be (Anderson, Wolff, 1).
- One unique feature about this app that makes it more secure is there is no home screen icon that appears on the home page of your phone’s screen to access it. To open the app, you simply go to make a phone call, type in the numbers that coordinate to your password used to sign up for the app followed by the pound key, simply go to place the call, and the app will automatically open.
- Since there is no icon for this app, when someone sends something through iSecure, to be notified, the numbers to your collaborating password will show up as a missed call making you aware that you need to check your App. This allows you to be able to have full privacy so no ones of your secret messages.
- The final unique feature iSecure offers, is the quick and easy way to close out of the app. To close out of iSecure, simply wave or give your phone a quick shake. The motion censors on your smartphone will know to immediately quit the app and return you to your phones home screen. It’s the small security features such as this that as Bolter would say “refashion” or “remediate” the types of security features we are typically used too on our phones today (Bolter 23).
- Anderson, C. and Wolff, M. (2010, September). The web is dead. Long live the Internet. Wired.
- Bolter, J.D. (2001). Introduction: Writing in the late age of print. Writing space: Computers, hypertext, and the remediation of print. Mahwah, NJ: LEA. 1-13. [pdf]
- Bolter, J.D. (2001). Writing as technology. Writing space: Computers, hypertext, and the remediation of print. Mahwah, NJ: LEA. 14 – 26. [pdf]
- DeVoss, D.N., and Porter, J.E. (2006). Why Napster matters to writing: Filesharing as a new ethic of digital delivery. Computers & Composition, 23, 178– 210. [PDF]
- Turkle, S. (Jan 1996). Who Am We?Wired