March 28, 2025 Technology

Setting Up a CNICK Payment Ring with FIDESMO Pay and CURVE

CNICK RingCNICK Ring

Recently, I explored the exciting world of wearable payment technology by setting up a CNICK payment ring. I chose this path for several compelling reasons:

Why I Chose a Payment Ring:

  1. Enhanced Security of Transactions:
    One of my primary motivations was to enhance transaction security by minimising exposure of my actual credit card numbers. When connecting a payment card to a wearable device via FIDESMO Pay, the actual card number is not used. Instead, a secure reference, known as a token, is generated. It is this token that facilitates transactions, effectively protecting my real card details from potential fraud or theft.

  2. Personal Item Security:
    Modern smartphones are increasingly costly and a frequent target for theft, which not only represents a loss of valuable hardware but poses risks to personal data security. By using a payment ring, I significantly reduce the need to publicly display or handle my phone, thus decreasing the likelihood of theft and unauthorised access to sensitive banking information. Unlocked phones are a theft target which may expose critical information.

  3. Rapid Cancellation:
    Another significant advantage is that a payment ring can be swiftly deactivated if lost or stolen, preventing fraudulent use instantly. This provides peace of mind not afforded by conventional payment methods.

  4. Convenience:
    Lastly, the convenience factor cannot be overstated. The payment ring eliminates the hassle of searching for wallets, cards, or phones. A simple tap at a contactless terminal is all that is needed.

  5. No Charging:
    I didn’t want the hassle of charging a ring, as is required with some of the smart” rings. I wanted to be able to use it without being concerned about whether it was charged and without having my phone with me.

Selecting a Payment Ring

After some research, I opted for a CNICK ring. CNICK rings have received positive reviews and are particularly recommended for compatibility with FIDESMO Pay. Furthermore, CNICK offers an appealing variety of wearables, catering to different styles and preferences.

Once I had placed my order I was a bit disappointed when I received the shipping notification to learn that the ring was having to be shipped from Tbilisi in Georgia, I had wrongly assumed that the ring would be shipped from the UK. The concern I have with this is around how long it might take to resolve issues, should I encounter any.

Very early in this process I dismissed the idea of preloaded” card options, preferring instead a system that allowed me to dynamically switch between multiple cards. The solution was straightforward: CURVE.

Preloaded cards have their place and may be the best choice in certain situations but I definitely wanted the flexibility of being able to use the ring to pay for items from several cards and I didn’t want the hassle of having to check a card balance and to keep having to reload a card.

Integrating CURVE for Versatile Card Management

I chose a CURVE account because it allows me to link several debit and credit cards under one single debit card number. I’m currently using the free version of CURVE, which allows me to select which of my cards is charged by default at any given moment. This selection is easily adjustable through the CURVE application.

It’s important to note that transactions made using CURVE are not protected under Section 75 of the Consumer Credit Act. This limitation isn’t an issue for me, as I primarily use my ring for daily expenditures like food, groceries, and coffee, saving larger purchases requiring consumer protection for other direct payment methods.

Understanding App Requirements

Initially, I was uncertain about the necessity of downloading the CNICK app, as the information seemed somewhat confusing. Upon contacting CNICK, they informed me that their app was currently undergoing updates and recommended using FIDESMO Pay instead to ensure seamless setup and connectivity.

Further assistance came from Johan Ekelund at FIDESMO who was extremely helpful. He clarified that the FIDESMO app alone was sufficient, simplifying the overall setup process significantly. I have not downloaded the CNICK application and I do not intend to do so.

Step-by-Step Setup Guide:

Here is a simplified step-by-step summary of the exact process I followed:

  1. Sign up for a free CURVE account.

  2. Add your preferred cards to the CURVE account. (Initially, I added the two cards I regularly use.)

  3. Purchase your wearable (ring or alternative device) from CNICK, or elsewhere.

  4. Download the FIDESMO application.

  5. Connect the CNICK ring to the FIDESMO app following the app’s instructions.

  6. Select your CURVE digital card within the FIDESMO app.

  7. Set your preferred primary card within the CURVE app (this can easily be changed anytime).

  8. Your CNICK ring is now ready for contactless payments, automatically charging whichever card is set as primary in the CURVE app.

Although the initial impression might suggest complexity, the entire process is straightforward and user-friendly once you know precisely what you need and how the different services integrate.

My CNICK ring finally arrived and I added it to the FIDESMO application which links it to the CURVE digital card. Adding the ring in the FIDESMO application was simple, just following the prompts within the application, it took just a couple of minutes.

With the CNICK ring added to the FIDESMO application and the CURVE card also added to the FIDESMO application I couldn’t wait to go to the shops and try it!

I was delighted with the performance of the CNICK ring in Sainsbury’s, my local supermarket. It was just like magic holding it up to the payment terminal, listening for the beep and away I went. No fishing for cards or mobile phone and no expensive technology (phone, watch, etc.) on view to be snatched.

Payment terminals are a target for snatch thefts because frequently a phone can be stolen unlocked.

I think this payment approach is going to just make things even more convenient and also of course more secure. Definitely a positive development which I am going to extend further.

One negative that I feel that I must mention was the very extended delivery time of the CNICK ring from Tbilisi in Georgia. Had I known about this beforehand I would have ordered from elsewhere, probably a TAPSTER (Swedish based) wearable, the setup process would have been identical.

I hope this guide makes your transition to a convenient, secure, wearable, payments system smooth and enjoyable!


March 26, 2025 Technology

DeadboltEdit: Secure, Simple, and Effective Text Encryption

DeadboltEdit - Simple & SecureDeadboltEdit - Simple & Secure

In today’s digital age, maintaining the privacy and security of sensitive information has become increasingly critical. If you have any doubts about this simply read up about the recent incident involving the misuse of the Signal messaging app by U.S. officials, several high-ranking members of the Trump administration were implicated:

Michael Waltz, National Security Advisor, who reportedly created the Signal group chat and inadvertently added journalist Jeffrey Goldberg.

Pete Hegseth, Secretary of Defense, who shared detailed operational information about planned military strikes in Yemen within the group chat.

Tulsi Gabbard, Director of National Intelligence, who was a participant in the chat and faced scrutiny during congressional hearings regarding the incident.

John Ratcliffe, CIA Director, who also participated in the chat and was questioned about the nature of the information shared.

Marco Rubio, Secretary of State, who was included in the group chat discussing the military operations.

JD Vance, Vice President, who was part of the Signal group and engaged in discussions about the timing and political implications of the military action.

Steve Witkoff, U.S. Special Envoy to the Middle East, whose inclusion in the chat raised additional concerns due to his travel to Russia during the period of the discussions.

This unauthorized sharing of sensitive military plans has led to significant controversy and calls for accountability among these officials, it could easily have been avoided by using more appropriate/authorised tools.

DeadboltEdit is an excellent solution that addresses security needs by offering a simple, secure, and efficient text editor designed explicitly for safely editing and storing encrypted files.

DeadboltEdit is a cross-platform application available for macOS, Windows, and Linux, making it accessible to a broad user base. This compatibility ensures you can create, edit, and share encrypted files effortlessly across different operating systems without compatibility concerns.

At the core of DeadboltEdit’s impressive security is its robust use of the Blowfish encryption algorithm, a widely respected and trusted standard within the cryptographic community. Blowfish encryption ensures that your data remains secure from unauthorised access, providing users with peace of mind when storing sensitive details, such as passwords, login credentials, financial data, or personal notes.

One of the most appealing features of DeadboltEdit is its straightforward usability. Designed with simplicity in mind, the editor closely resembles standard text editors like Windows Notepad, which makes it intuitive for users of all skill levels. Encryption and decryption happen seamlessly, meaning users only need to set a password when saving an encrypted file. This ease of use ensures minimal disruption to your workflow while providing powerful security.

Encrypted files created with DeadboltEdit bear the extension .ctxt”, distinguishing them clearly from standard plaintext .txt” files. This clarity helps users manage their encrypted and non-encrypted files efficiently. Moreover, DeadboltEdit can also effortlessly handle standard plaintext files, giving users the flexibility to choose between encrypted or plaintext formats based on their specific needs.

DeadboltEdit files can be securely shared via email attachments. Files are UTF-8 encoded and MIME compliant, ensuring seamless interoperability and communication between DeadboltEdit users.

A crucial security feature of DeadboltEdit is that passwords and encryption keys are never stored. When you create or open an encrypted file, you must provide the correct password each time. Passwords are encrypted internally while temporarily held in memory, further enhancing security and reducing vulnerabilities. It is important to note, however, that if a password is lost or forgotten, data recovery is impossible due to the absence of backdoors or master keys—a deliberate and reassuring choice for users concerned about maximum data security.

DeadboltEdit’s encryption processes occur entirely within the application memory, leveraging the OpenSSL encryption library. Unlike many other encryption tools, DeadboltEdit does not rely on temporary files or external encryption programs, significantly increasing its resistance to potential security breaches.

The application is provided completely free of charge and is permitted for use in all sectors, including commercial, governmental, educational, and personal contexts. This unrestricted access ensures that security can be universally available without cost concerns.

Users should remain aware of potential vulnerabilities from external factors. For instance, malicious software such as keyloggers can compromise security by recording keystrokes, including passwords. Therefore, users are advised to use DeadboltEdit on trustworthy, secure computers only, not public computers. DeadboltEdit does not include an autosave feature, which further enhances security by preventing unwanted data from inadvertently being stored. Users explicitly save files, ensuring data remains secure and controlled.

In addition to local storage, DeadboltEdit can manage files directly on external devices, including flash drives and cloud storage solutions, by using familiar file dialogues like File Open” and File Save.” This flexibility enhances portability and convenience, allowing secure editing and access to sensitive information regardless of your location.

Overall, DeadboltEdit stands out as a simple and potentially invaluable tool for anyone who values their digital privacy. Its simplicity, security, cross-platform compatibility, and flexible file management make it a highly recommended choice for securely handling sensitive textual information. Whether you’re safeguarding personal data or sharing confidential details securely with others, DeadboltEdit provides a powerful, user-friendly and cost effective solution.


March 22, 2025 Technology

AIKO: Revolutionising Transcription with Accuracy and Privacy

Hello AIKOHello AIKO

In today’s world, accurate and efficient transcription is more critical than ever. Whether it’s converting meeting discussions, lecture notes, personal journals, or general thoughts into text, users need a reliable and secure solution. AIKO, an innovative speech-to-text transcription application, emerges as a robust and versatile tool, catering precisely to these requirements with remarkable ease and efficiency.

At its core, AIKO employs OpenAI’s acclaimed Whisper model, which operates locally on your device. The Whisper model is renowned for its high precision and multilingual capabilities, providing reliable transcription in an impressive range of 100 languages.

Privacy is one of AIKOs standout features. Unlike cloud-based transcription services that upload and potentially store audio indefinitely on remote servers, AIKO processes transcriptions directly on your device. This on-device approach guarantees complete confidentiality, ideal for sensitive recordings such as medical consultations, confidential business discussions, or private journal entries. Users concerned about privacy will appreciate the secure, self-contained environment provided by AIKO.

The application is versatile in handling diverse file formats, both audio and video. It seamlessly supports any media format compatible with macOS and iOS, including widely-used formats such as .m4a, .wav, .mp3, .mp4, and .mov. Although it does not support .ogg files, the extensive range of supported formats sufficiently meets the requirements of most users. Significantly, AIKO places no restrictions on the length of recordings, allowing uninterrupted transcription regardless of duration, a clear advantage over many competing services.

One particularly beneficial use case is the transcription of video files. Users who regularly need text versions of video content will find AIKOs video transcription capability invaluable. Furthermore, for situations where a direct video download is unavailable, such as YouTube or broadcast material you don’t own, users can simply record the audio separately using an external microphone and import the recording into AIKO for seamless transcription.

The export functionality of AIKO is also exceptional. Users can export transcriptions in a variety of formats, including JSON, CSV, and subtitles, allowing easy integration with other platforms and text processing tools. Although the app does not support direct text editing, users typically prefer to export the generated text to external editors for final polishing. This design choice simplifies AIKOs interface, focusing on high-quality transcription rather than unnecessary additional features.

Personal use of AIKO illustrates its practical advantages beautifully. For instance, journaling enthusiasts can benefit immensely from this application. By making concise prompt notes throughout the day and then expanding on them via voice recordings in the evening, users can effortlessly generate detailed journal entries. For example, an 8-10 minute audio recording can produce approximately 1000 words of accurate text, capturing the entirety of the day’s events. The resulting text is easily searchable, vastly improving accessibility and retrieval of past information compared to traditional audio recordings alone.

The transcription accuracy provided by AIKO is outstanding. Users often find minimal need for post-transcription editing, a testament to the high accuracy of the Whisper model. In practice, the speed and accuracy of transcription stand out when compared to other solutions I’ve personally tried. The combination of precision, speed, and privacy makes AIKO an unmatched tool for most speech-to-text needs.

Users have flexibility in their recording methods. Some prefer the convenience of recording directly into AIKO using mobile devices, while others opt for external recording devices such as the SONY ICD-SX712 voice memo recorder I use. Using an external recorder can offer additional functionality, and importing audio into AIKO remains a simple drag-and-drop task, providing transcription almost instantaneously.

AIKOs cost-effectiveness further distinguishes it from competitors. Unlike many transcription services that require subscription models, AIKO provides greater accuracy, stronger privacy assurances, and unrestricted transcription length—all at a significantly lower cost. When combined with powerful text-generating technologies such as ChatGPT, AIKO offers an exceptional integrated solution for a wide range of users, from professionals and students to personal users seeking to simplify their documentation processes.

In summary, AIKO is an extremely capable solution in speech-to-text transcription technology. Its blend of cutting-edge accuracy, robust privacy measures, extensive language support, and format compatibility, alongside its flexibility in recording methods and export options, makes it a standout choice. Whether you’re capturing detailed meeting minutes, documenting lectures, maintaining personal journals, or handling confidential conversations, AIKO offers a comprehensive, reliable, and cost-effective solution tailored to modern transcription needs.



Older Entries →