Whenever I think of a note or a piece of knowledge that I want to preserve, I immediately go to one special place on my laptop or iPhone: Evernote. It’s the bomb. Check it out at…
Just create one single entity per piece of knowledge and you’ll have your own knowledgebase created in no time at all. And now that the apps are so good for our PDA’s and phones, we can ALWAYS take our knowledge with us, even if we’re out of cell phone reach! And the most amazing part of all — the core [fantastic] program is free and available for any device you own. OK — maybe they don’t make a KayPro version. :-)
One Brigada participant wrote this past week to recommend a new notebook that they’ve developed (the paper kind). Check it out at…
http://blog.evernote.com/2012/08/24/the-new-evernote-smart-notebook-by-moleskine/
Okay, Doug… we get the idea that you absolutely LOVE Evernote!
Thanks for keeping it in our faces…. I just may try it again someday but it will probably take a while to get used to it and become the fan you are of this app.
Doug,
for Android, perhaps “ticking bomb” may be a better descriptor. Granted that Evernote doesn’t do the ‘bad stuff’ but it does open the door for other apps to do them. Do a search on Evernote Android Permissions.
The permissions include:
This application has access to the following:
take pictures and videos
Allows the app to take pictures and videos with the camera. This allows the app at any time to collect images the camera is seeing.
Your location
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate tablet location, where available. Malicious apps may use this to determine approximately where you are. Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious apps may use this to determine approximately where you are.
fine (GPS) location
Access fine location sources such as the Global Positioning System on the tablet, where available. Malicious apps may use this to determine where you are, and may consume additional battery power. Access fine location sources such as the Global Positioning System on the phone, where available. Malicious apps may use this to determine where you are, and may consume additional battery power.
Your personal information
read contact data
Allows the app to read all of the contact (address) data stored on your tablet. Malicious apps may use this to send your data to other people. Allows the app to read all of the contact (address) data stored on your phone. Malicious apps may use this to send your data to other people.
read sensitive log data
Allows the app to read from the system’s various log files. This allows it to discover general information about what you are doing with the tablet, potentially including personal or private information. Allows the app to read from the system’s various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
read calendar events plus confidential information
Allows the app to read all calendar events stored on your tablet, including those of friends or coworkers. Malicious apps may extract personal information from these calendars without the owners’ knowledge. Allows the app to read all calendar events stored on your phone, including those of friends or coworkers. Malicious apps may extract personal information from these calendars without the owners’ knowledge.
Phone calls
read phone state and identity
Allows the app to access the phone features of the device. An app with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like.
Hi Eric. You raise a great point. The addition of the phrase, “at any time,” is spooky. I don’t see any indication that they wrote it that way for iPhone. Can’t figure why they would do it that way for Android. There’s a great thread on this at…
http://discussion.evernote.com/topic/26167-request-intrusive-permissions/
But note that if Evernote ever DID do anything dark with the capability, it would be counter to its own privacy p0licy:
http://evernote.com/privacy/
and their “Three Laws,”
http://blog.evernote.com/2011/03/24/evernote%E2%80%99s-three-laws-of-data-protection/
But either way, it just seems odd that they would write the code in that way. Thanks again for pointing it out for our Android users.
Doug