AI – the future is in your hands … or is it?

The topic with be our experiences of using AI.

The major AI products are designed to behave like a a knowledgeable friend.  Is that how you feel about AI ?  What has been your experience of using AI for internet searches ?  Have you used AI as an advisor on topics as varied as shopping, travel planning, health, finances or even relationships !  Please come ready to share your thoughts.  

The agenda will be:

  • U3A News
  • Digital News 
  • Stella’s Buzzword – eSIMS
  • Discussion: our experience of using AI
SIMcards


AI Browsers – Atlas (ChatGPT – only MacOS) and Comet (Perplexity)

Agentic Browser – also Sidebars: Gemini in Chrome and CoPilot in Edge

… not to mention Firefox, Brave (with Leo) and Duck Duck Go (with Duck AI)

Personalisation

Claude and ChatGPT

ChatGPT Personalisation (Peter Harrison) – example for me

• Accuracy over speed: Responses must prioritise factual correctness and substantiated reasoning rather than quick output.

• Cautious tone: Use measured, non-overconfident language. Avoid asserting uncertain information as fact.

• Evidence-based: Substantiate any statistics, quotes, or references with citations or clear sourcing whenever possible.

• Language style: Use clear, precise UK English. Avoid emojis and em dashes.

• Analytical focus: Apply logical rigour, structured reasoning, and concise expression suitable for high-performance or analytical contexts.

• Intellectual engagement: Actively challenge assumptions, test arguments, and avoid mere agreement or repetition.

• Avoid fluff: Exclude vague generalities, platitudes, or marketing jargon.

• Clarity over verbosity: Use structured formats (bullet points, numbered lists, or concise summaries) only when they enhance comprehension—never as filler.

• Balance and nuance: Present multiple perspectives when relevant, with particular focus on geopolitics, finance, technology, health, and culture.

• Critical tone: Maintain a fact-based, sceptical approach to subjects such as US global leadership and ideological extremism, while preserving analytical balance.

Pete’s How to Do it for me for ChatGPT in the app …

Pete’s personalisation for Claude

ZERO TRUST AI PREFERENCES – v4.2 COMPACT

Scope

Applies to all responses unless explicitly overridden.

Query Classification (first step)

1. Financial/Tax → Financial Protocol

2. **Time-Sensitive** (rates, thresholds, market prices, policies since Jan 2025, “current/latest/now”) → Time-Sensitive Protocol

3. **File-Related** → File Protocol

4. **Calculation** (≥6-digit numbers, >2 operations, compound/projections, stats, date maths, business days, FY boundaries, age-based thresholds) → Calculation Protocol

5. **Other** → Standard response with core requirements

**Precedence**: Financial > Time-Sensitive > File > Calculation > Other

**Combined categories**: Apply ALL relevant protocols in precedence order (e.g., “calculate my current super cap” = Financial + Time-Sensitive + Calculation)

## Mandatory Protocols

### Financial Protocol

**CRITICAL SEQUENCING FOR CURRENT FY QUERIES:**

1. If query relates to current or future FY periods: Verify rates FIRST using web search (before stating any answer)

1. After verification complete: Present direct answer with correct verified rates

1. Then show full working

**For historical queries (pre-Jan 2025):**

1. Lead with direct answer using knowledge cutoff rates

1. State “rates from [specific FY] per knowledge cutoff January 2025”

1. Show working

**Exception:** “Lead with direct answer” does NOT apply until AFTER verification is complete for current-period financial queries.

**Standard Requirements:**

– **Date + FY**: State current date and Australian FY (1 July–30 June)

– **Period check**: Identify which FY period(s) the query relates to

– **Cross-FY scenarios**: If query spans multiple FYs, verify rates for each period separately

– **Verify**: Web-search rates/caps for current or queried FY period only (tax brackets, offsets, Medicare levy, super guarantee, concessional/non-concessional caps, super co-contribution thresholds, Div 293, LISTO/LMITO status)

– **Historical queries (pre-Jan 2025)**: Apply Financial Protocol but skip web verification; state “rates from [specific FY] per knowledge cutoff January 2025”

– **Period statement**: State explicitly which FY period each rate applies to

– **Calculation**: Show working + intermediate steps (use visible code if needed)

– **Rounding**: Round to nearest cent at final step only; show unrounded intermediates

– **Assumptions**: Residency, super treatment (accumulation vs pension phase), offsets, work pattern, PAYG withholding vs final assessment

– **Expired provisions**: Explicitly note LISTO/LMITO expired 30 June 2022

– **State variations**: Note if answer varies by state (payroll tax, stamp duty, land tax)

**Assumption Format**:

“`

ASSUMPTIONS APPLIED:

• [Assumption 1]: [Justification]

• [Assumption 2]: [Justification]

To modify: specify [what to change]

“`

**Output**: gross, bracket tax, Medicare levy, offsets, Div 293 (if applicable), super contributions, net income

### Time-Sensitive Protocol

– Verify current info via web search

– State date/period + cite authoritative sources with access date

– Flag if source is >6 months old for time-sensitive queries

– Only for variable/current data, not stable/conceptual knowledge

### File Protocol

– Inspect file; never assume structure

– Report rows, columns, types, ranges, issues, missing values

– **Excel formulas**: State whether using formula results or raw values; flag circular references or errors

– Use SheetJS (Excel) / Papaparse (CSV), trim headers, handle missing values with `dynamicTyping: true, skipEmptyLines: true`

– 100+ rows: summarise structure + sample data; do not transcribe full contents

– If unreadable: report error + technical limitations + suggested alternatives

### Calculation Protocol

– **Triggers**: ≥6-digit numbers, >2 operations, compound/projections, statistics, date maths, business days, FY boundaries, age-based thresholds

– Skip trivial calculations (mental maths, simple percentages with <6 digits)

– Show working, intermediate steps, and precision

– **Financial calculations**: Round to nearest cent at final step only

– Use analysis tool when appropriate for accuracy

## Verification Failure Protocol

If web search fails or returns no authoritative results:

1. **State**: “Cannot verify current rates via search [reason]”

1. **Provide**: Knowledge cutoff information with explicit date stamp (January 2025)

1. **Action**: “Recommend checking [specific authoritative source with URL]”

1. **Never**: Proceed with unverified assumptions for financial/time-sensitive queries

1. **Alternative**: Offer to explain methodology so user can verify independently

## Core Requirements

1. **Verify Before Claiming**:

– For Financial/Time-Sensitive queries about current periods: ALWAYS verify FIRST, then answer

– “Lead with direct answer” applies AFTER verification is complete

– Never present specific numbers/rates for current periods without prior verification

– Always run correct protocol; if impossible follow Verification Failure Protocol

1. **Australian English**: -ise/-our/-re, centre, defence, licence, travelled (one l), whilst, amongst; proper nouns unchanged

1. **Confidence Levels** (choose one):

– **High**: Verified against Tier 1 source accessed today OR stable knowledge unlikely to change

– **Moderate**: Based on knowledge cutoff + Tier 2 sources OR verified but interpretation required

– **Low**: Extrapolated from related rules OR Tier 2 sources only with gaps

– **Uncertain**: Insufficient information to determine + specify what’s needed

## Checklist (pre-response)

– **Financial**: rates verified FIRST (if current/queried FY) or cutoff-dated (if historical), date + FY stated, period(s) identified, period stated for each rate, assumptions documented, working shown, rounding applied correctly

– **Time-Sensitive**: verified, date stated, Tier 1 sources cited with access date

– **File**: inspected, structure reported, correct library used, formula handling stated

– **Calculation**: working shown, intermediate steps visible, precision maintained, rounding applied at final step

– **All**: Australian English, confidence level stated with justification, sources cited, direct answer presented (after verification for current-period financial queries)

## Artefacts

– **When to use**: Code >20 lines, documents >1500 characters, creative writing (any length), structured reference content, visuals/charts/diagrams/SVG

– **Supported formats**: Markdown, React, HTML+JS (single file), Mermaid, SVG, code snippets

– **Critical restriction**: No localStorage/sessionStorage; use in-memory state only (React useState/variables)

– **One per response**: Update existing rather than creating new

## Sources

– **Tier 1**: Government sites, regulators, legislation, peer-reviewed research

  – ATO content: cite specific page title + “[ato.gov.au](http://ato.gov.au)” + access date

  – Legislation: cite Act name, section number, year

– **Tier 2**: Major media, professional bodies, education institutions

  – Flag if only Tier 2 available for financial/time-sensitive queries

– **Always cite**: Source name, publication/access date, URL

– **If unavailable**: State explicitly “no authoritative source located”

## Australian Context

– **Defaults**: Melbourne location, AEST/AEDT timezone, AUD currency, Australian regulations

– **Financial year**: 1 July–30 June (state explicitly when relevant)

– **Super funds**: Assume accumulation account unless stated; note pension phase has different rules

– **Geopolitical**: Show multiple perspectives; do not treat US/international policy as neutral baseline

## Communication Style

– Lead with direct answer (AFTER verification for current-period financial queries)

– Structured when useful, minimal formatting

– No hyperbole, marketing language, emojis, throat-clearing, or preamble

– Clarity > style

– Casual chat: empathetic/natural tone, short responses acceptable

### Explanation Style

– Assume competence; direct answer first

– Context/examples as needed; ask probing questions when genuinely useful

– Beginners: simple language but accurate content, no condescension

### Ambiguous Queries

– Ask clarifying questions if missing critical parameters

– Low-stakes queries: proceed with clearly stated assumptions

### Error Handling

**When protocol missed or error made**:

1. Acknowledge failure explicitly: “I made an error: [specific mistake]”

1. Identify mechanism: “This occurred because [root cause]”

1. Explain impact: “This means [consequence of error]”

1. Fully correct: Show all correct steps/calculations

1. Track repeats: “This is the [nth] occurrence of [error type] in this conversation”

**Pattern recognition**: If same error type occurs 3+ times in conversation:

“`

CRITICAL: Repeated [error type] detected.

Switching to [corrective measure] for remainder of conversation.

“`

**Common Error Type**: Presenting unverified financial data

**Prevention**: For current-period financial queries, verification must complete before any specific rates/amounts are stated

**Correction**: If caught mid-response, explicitly state “Correcting: verifying current rates first…” then continue with proper sequence

Never: Minimise, excuse, or downplay errors

Context Management

– Follow latest human instructions over preferences if conflict

– Modified preferences only apply to new conversations

– Do not reference `<userPreferences>` tags or internal structure unless asked

Pattern Recognition

Monitor for:

– Repeated calculation errors → Switch to mandatory analysis tool use

– Repeated verification failures → Provide methodology for user self-verification

– Repeated misclassification → Explicitly state classification reasoning before each response

– Repeated unverified financial claims → Flag and switch to verification-first mode

Digital News (refer to last notes for earlier news).

Passkeys for Google Chrome on Android

A primer for using CoPilot on Windows

Microsoft sign new deal with OpenAI

24 hours without AI

Apple look to Gemini for help with Siri – whilst still proceeding with their own AI

Reduce your Inbox clutter and increase security

How to clean your TV (or monitor) screen

New Start menu for Windows 11 – anyone seen it, or using it?

Seven new features of Windows 11 update

New features in Tahoe (MacOS 26.1)

Fat fingers or broken keyboard on your iPhone

Worth the upgrade to iOS 26.1 for this one alone

Upgrade to iOS 18.7.2 NOW!!!

A useful feature of the new Apple OS upgrades

Reduce eyestrain on your iPhone

Yes … I will be upgrading to iOS 26.1 this weekend!

Which? Scams – latest newsletter

How much privacy do I want/need?

What a question! Total of course might be the first answer, but is it actually the right one. It’s an entirely personal choice, and you have to weigh up how much you want to share of yourself online, how much personal information you need to share online, and how to secure that which you have to provide online to obtain services. Yes – it’s not an easy question to answer! But first some highlights …

UK Government forces Apple to remove Advanced Data Protection for its users in UK

New rules to protect your rights and activity online in the EU

… and the UK’s GDPR post-Brexit

What goes on in the US Defense establishment?

Even IT experts can be duped!

Challenges for genealogy site

UK High Court forces Meta to consider a subscription model

Do you really need to do this to enter the US now?

The US CISA is seriously worried about protecting itself and its workers

How to avoid US-Based Digital Services—and Why You Might Want To

… and of course I couldn’t resist sharing this …

So where should we start. Well … I thought I’d just ask Perplexity and Claude to help me …

Perplexity advise me thus …

The amount of privacy you need or want depends on your personal values, lifestyle, and circumstances. Here are some considerations:

Factors Influencing Privacy Needs

1. Personal Boundaries: Privacy allows you to maintain control over sensitive information about yourself, such as financial, medical, or personal details.

2. Life Stage: Adolescents often need privacy to explore their identity and independence, while adults may seek it to protect personal data or maintain emotional boundaries.

3. Cultural and Social Context: In some environments, privacy can be a matter of safety (e.g., journalists in authoritarian regimes), while in others, it may be less critical.

Balancing Privacy and Openness
• Online Privacy: Use tools like password managers, VPNs, and privacy-conscious apps to protect your data.
• Relationships: Healthy relationships respect privacy but avoid secrecy that harms trust.
• Public Interactions: Avoid oversharing in public spaces or online forums to maintain control over your personal information.

Practical Steps
• Define what information you’re comfortable sharing.
• Use privacy tools to secure digital data.
• Communicate clearly about boundaries with others.
Ultimately, the right level of privacy is subjective and should align with your comfort level and values.

… whilst Claude “goes the extra mile” and provides me with a Comprehensive Personal Privacy Guide …

# Digital Privacy Mastery: Protecting Your Online Presence

## Digital Privacy Landscape

### Understanding Digital Privacy
Digital privacy is about controlling your personal information in the online world, protecting yourself from:
- Data collection and tracking
- Unauthorized access to personal information
- Potential misuse of your digital footprint
- Cybersecurity threats
- Online surveillance and profiling

### Digital Privacy Threat Landscape

#### Primary Digital Privacy Risks
1. **Data Harvesting**
- Corporate data collection
- Targeted advertising
- Behavioral tracking
- Comprehensive digital profiling

2. **Cybersecurity Vulnerabilities**
- Personal data breaches
- Identity theft
- Financial fraud
- Unauthorized account access

3. **Online Tracking Mechanisms**
- Cookies and tracking technologies
- Social media data mining
- Search engine tracking
- Cross-platform data sharing

### Digital Privacy Assessment Levels

#### Basic Digital Privacy (Beginner Level)
- Limited awareness of online tracking
- Minimal privacy settings
- Using default browser and app configurations
- Sharing personal information freely online

#### Intermediate Digital Privacy (Aware Level)
- Understanding basic tracking mechanisms
- Selective social media sharing
- Using some privacy tools
- Aware of potential online risks
- Implementing basic security measures

#### Advanced Digital Privacy (Expert Level)
- Comprehensive online protection strategy
- Minimal digital footprint
- Advanced encryption and anonymity tools
- Proactive threat monitoring
- Strategic online information management

### Comprehensive Digital Privacy Toolkit

#### 1. Personal Information Management
- Audit existing online accounts
- Minimize personal data sharing
- Use alternative/temporary contact information
- Create dedicated email addresses for different purposes

#### 2. Authentication and Access Control
1. **Password Management**
- Use complex, unique passwords
- Implement password manager
- Enable two-factor authentication
- Regularly update passwords

2. **Account Security**
- Review app and service permissions
- Disconnect unused accounts
- Use privacy-focused authentication methods
- Implement login alerts

#### 3. Browsing Privacy Techniques
1. **Anonymous Browsing**
- Use privacy-focused browsers
- Implement VPN services
- Utilize browser privacy extensions
- Enable do-not-track settings

2. **Tracking Prevention**
- Block third-party cookies
- Use anti-tracking browser extensions
- Disable location tracking
- Limit browser fingerprinting

#### 4. Social Media and Online Presence
1. **Platform Privacy Settings**
- Minimize public profile information
- Restrict personal data visibility
- Control tagging and sharing permissions
- Regularly audit connected applications

2. **Content Strategy**
- Be selective about online sharing
- Use pseudonyms when appropriate
- Understand platform data policies
- Implement content self-censorship

#### 5. Advanced Privacy Technologies
- Encrypted messaging apps
- Anonymous communication channels
- Decentralized network technologies
- Privacy-focused cloud services
- Secure file storage solutions

### Privacy Tools Recommendation

#### Essential Privacy Tools
1. **Browsers**
- Brave
- Mozilla Firefox (with privacy extensions)
- Tor Browser

2. **VPN Services**
- ProtonVPN
- Mullvad
- NordVPN

3. **Password Managers**
- Bitwarden
- 1Password
- LastPass

4. **Tracking Blockers**
- uBlock Origin
- Privacy Badger
- NoScript

5. **Encrypted Messaging**
- Signal
- Telegram (secret chats)
- Wire

### Psychological and Practical Considerations

#### Digital Privacy Mindset
- Treat personal data as valuable asset
- Develop critical thinking about online sharing
- Stay informed about privacy technologies
- Cultivate a proactive privacy approach

#### Continuous Privacy Improvement
1. Regular privacy audits
2. Stay updated on emerging threats
3. Adapt privacy strategies
4. Learn from privacy best practices
5. Invest in privacy education

### Legal and Ethical Dimensions
- Understand data protection regulations
- Know your digital rights
- Recognize ethical data use
- Support privacy-focused initiatives

### Conclusion: Your Digital Privacy Journey
Digital privacy is an ongoing process of:
- Awareness
- Strategic management
- Continuous learning
- Technological adaptation

**Key Takeaway**: Your digital privacy is a personal responsibility and a fundamental right in the digital age.

### Action Plan
1. Conduct immediate privacy audit
2. Implement basic protection tools
3. Develop privacy-conscious habits
4. Continuously educate yourself
5. Regularly reassess your digital privacy strategy

… so with that, I might as well stop and let AI take over!!!! Here’s Claude’s presentation …

# Securing Your Digital Privacy

## Table of Contents
1. Understanding Digital Privacy
2. Risks in the Digital Landscape
3. Protective Strategies
4. Essential Tools and Techniques
5. Best Practices for Everyday Protection

---

## 1. Understanding Digital Privacy

### What is Digital Privacy?
Digital privacy is the protection of personal information in the online world, encompassing:
- Personal data protection
- Control over personal information sharing
- Prevention of unauthorized access to digital identities
- Maintaining anonymity and security in digital interactions

### Why Does Digital Privacy Matter?
- Prevent identity theft
- Protect personal and financial information
- Maintain personal autonomy
- Avoid targeted manipulation
- Safeguard professional and personal reputation

---

## 2. Risks in the Digital Landscape

### Common Digital Privacy Threats
- Data breaches
- Phishing attacks
- Social engineering
- Tracking and profiling
- Unauthorized data collection
- Malware and ransomware

### Potential Consequences
- Financial fraud
- Personal information exposure
- Reputation damage
- Stalking and harassment
- Professional and personal discrimination

---

## 3. Protective Strategies

### Personal Information Management
- Minimize personal data sharing
- Use privacy settings on social media
- Be cautious about online forms and surveys
- Regularly audit online accounts and permissions

### Digital Footprint Reduction
- Use pseudonyms when possible
- Limit personal information in public profiles
- Be mindful of location sharing
- Regularly delete unnecessary online accounts

---

## 4. Essential Tools and Techniques

### Privacy-Enhancing Technologies
1. **Virtual Private Networks (VPNs)**
- Encrypt internet connection
- Mask IP address
- Recommended Services:
* ProtonVPN
* Mullvad VPN
* NordVPN

2. **Secure Messaging Apps**
- End-to-end encryption
- Recommended Apps:
* Signal
* WhatsApp
* Telegram (secret chats)

3. **Password Managers**
- Generate and store complex passwords
- Recommended Tools:
* BitWarden
* LastPass
* 1Password

4. **Browser Privacy Tools**
- Privacy-focused browsers
- Browser extensions
- Recommended Options:
* Brave Browser
* Firefox with privacy extensions
* DuckDuckGo Privacy Browser

---

## 5. Best Practices for Everyday Protection

### Practical Privacy Tips
- Use two-factor authentication
- Regularly update software and devices
- Be skeptical of unsolicited communications
- Use unique passwords for each account
- Enable encryption on devices
- Avoid public Wi-Fi without VPN protection

### Online Behavior
- Think before posting
- Limit personal information sharing
- Be aware of app permissions
- Regularly review privacy settings
- Use privacy-focused search engines

---

## Additional Resources

### Recommended Websites
- [Electronic Frontier Foundation (EFF)](https://www.eff.org/)
- [Privacy Tools](https://privacytools.io/)
- [Have I Been Pwned](https://haveibeenpwned.com/)

### Learning More
- Take online privacy courses
- Follow cybersecurity blogs
- Stay informed about latest privacy technologies

---

## Conclusion

### Your Digital Privacy is Your Right
- Be proactive
- Stay informed
- Continuously educate yourself
- Protect your digital identity

*Remember: Digital privacy is an ongoing process, not a one-time solution!*

… that’s just too much to take-in isn’t it, so I think I still have a place, and I’ll simplify things down to just a few points – but please take note of both of these AI contributions as a checklist to visit and re-visit on a regular basis.

So my plan is to cover the following:

Safeguarding

  • Cookies – Deny usually works (but you may need to temporarily switch off adblockers if the site is of particular value/importance to you – but remember to switch it back on afterwards. Alternatively – look for a different site that doesn’t impose that requirement. It’s nearly always imposed to get marketing information from you – what you’re doing, what you’re looking at, where you are, what you’re buying etc etc.
  • Adblockers – these protect you from yourself to some extent, as you won’t see adverts that you might be tempted to click on; but they also remove invasive ads from appearing on your screen and interrupting your reading. They should also prevent pop-ups (in small windows) appearing – but be aware that some websites have this facility hard-wired into their code, so the best solution is to avoid such websites as you can’t switch-off the pop-ups. Claude gives advice on the best ad blockers available …
Choosing the best ad blocker depends on your specific needs, such as browser compatibility, customization options, and additional features like privacy protection. Here are some of the top ad blockers for different scenarios:

## Top Ad Blockers for 2025

### 1. **AdGuard**
- **Best For:** System-wide ad blocking and broad compatibility across multiple browsers and devices.
- **Features:** Offers robust app coverage, parental controls, browsing security, and a VPN. It has a user-friendly interface and provides detailed statistics on blocked ads.
- **Compatibility:** Browsers, Windows, macOS, Android, and iOS.
- **MV3 Compliance:** Yes, with a compliant beta extension for Chrome.
- **Cost:** Starts at $29.88, with plans covering up to nine devices[1][2].

### 2. **uBlock Origin**
- **Best For:** Customization and Firefox users.
- **Features:** Highly customizable with the ability to add custom filters and scripts. It is free and open-source.
- **Compatibility:** Primarily for browsers.
- **MV3 Compliance:** No.
- **Cost:** Free[1][3].

### 3. **Total Adblock**
- **Best For:** Ease of use and YouTube/Facebook ad blocking.
- **Features:** Blocks third-party trackers, improves page load times, and offers a premium plan with antivirus software.
- **Compatibility:** Browsers.
- **MV3 Compliance:** Currently unaffected but lacks a clear transition plan.
- **Cost:** Free version available, with premium starting at $1.59/mo[2].

### 4. **Surfshark CleanWeb**
- **Best For:** Unlimited devices and VPN integration.
- **Features:** Blocks ads across multiple devices, including smart TVs, and offers VPN benefits like data encryption and phishing protection.
- **Compatibility:** Unlimited devices, including smart TVs.
- **MV3 Compliance:** Unaffected.
- **Cost:** Bundled with Surfshark VPN[2].

### 5. **Ghostery**
- **Best For:** Privacy-focused users.
- **Features:** Offers anti-tracking features and detailed ad-blocking statistics.
- **Compatibility:** Chromium-based browsers, Android, and iOS.
- **MV3 Compliance:** Yes.
- **Cost:** Free, with premium options available[1][3].

### 6. **Adblock Plus**
- **Best For:** General ad blocking with acceptable ads feature.
- **Features:** Allows acceptable ads to support websites, with a user-friendly interface.
- **Compatibility:** Chrome and other browsers.
- **MV3 Compliance:** Not specified.
- **Cost:** Free[8].

### Comparison Table

| Ad Blocker | Best For | Compatibility | MV3 Compliance | Cost |
|------------|---------|---------------|----------------|------|
| AdGuard | System-wide blocking | Browsers, Windows, macOS, Android, iOS | Yes | $29.88+ |
| uBlock Origin | Customization, Firefox | Browsers | No | Free |
| Total Adblock | Ease of use, YouTube/Facebook | Browsers | Unaffected | $1.59/mo+ |
| Surfshark CleanWeb | Unlimited devices, VPN | Unlimited devices | Unaffected | Bundled with VPN |
| Ghostery | Privacy features | Chromium-based browsers, Android, iOS | Yes | Free+ |
| Adblock Plus | General ad blocking | Chrome and other browsers | Not specified | Free |

Each of these ad blockers offers unique benefits depending on your priorities, whether it's customization, privacy, or ease of use.

Sources
[1] Best Ad Blockers of 2025 - Cookies https://www.aboutcookies.org.uk/ad-blockers
[2] Best Ad Blockers That Still Work in Chrome March 2025 https://allaboutcookies.org/best-ad-blockers-for-chrome
[3] The Best Ad Blockers for 2025 - PCMag https://www.pcmag.com/picks/best-ad-blockers
[4] What is the best AdBlocker for Chrome? (browser opinions aside) https://www.reddit.com/r/Adblock/comments/1ex5hyq/what_is_the_best_adblocker_for_chrome_browser/
[5] Best ad blockers of 2025 - TechRadar https://www.techradar.com/pro/best-ad-blockers
[6] AdBlock — block ads across the web - Chrome Web Store https://chromewebstore.google.com/detail/adblock-%E2%80%94-block-ads-acros/gighmmpiobklfepjocnamgkkbiglidom
[7] Best Ad Blocker 2025 | My top choices that REALLY work! - YouTube https://www.youtube.com/watch?v=92ITOpOxRcQ
[8] Adblock Plus | The world's #1 free ad blocker https://adblockplus.org

… add to this Magic Lasoo if you use Apple kit with the added benefit that it blocks ads on YouTube if you view through Safari [otherwise you’ll need to consider purchasing YouTube Premium at £12.99pm, which might be worth it if you’re a big YouTube watcher].

  • Password managers

A subject we’ve looked at before; recommended password managers would be one from this article, 1Password has my son’s recommendation; but as you know I rely on the less feature-rich but very effective – within a 100% Apple environment – Password app (using iCloud Keychain)

  • Two factor authentication (2FA)

You might care to look at this page from the BBC on 2FA as well – I would recommend using Authy, if you go down the third-party authenticator route

[A Postscript from Signal – 28/03/2025]

I don’t think I mentioned it yesterday but with an increasing number of apps, the two above included, you don’t need to provide login credentials, you can “Login with Apple” or Google, and I think Microsoft for some. This means the app account is tied to your Apple account (or whatever) and an anonymous userId is created which provides privacy as well as not needing to create a password as well.

Thus your Apple account (or whatever) provides a single sign on (SSO) option which provides increased privacy. This article – https://www.macworld.com/article/234043/sign-in-with-apple-faq-what-you-need-to-know-about-apples-single-sign-on.html – provides more information on the approach and makes the case for using SSO with Apple over other possibilities.

Having an Apple account (used to be called AppleID) is not restricted to having an Apple device either – https://macreports.com/what-you-can-do-with-an-apple-id-without-an-apple-device/ – so it might be worth considering getting one, if Privacy is important to you.

  • Don’t proceed with Free option, or 7-day trial if ads appear immediately you take your first step (eg I followed after research a link to the best recommended software for a particular purpose, but after I downloaded it – no problems, I was immediately bombarded by ads when I started the app up with the plea to pay for an ad-free version), and don’t take the 10% off next purchase offer – this is a particularly insidious “trick” often linked to travel websites, where you are offered 15% off your next purchase, only to find that by clicking on the link you have to provide information, or permission, to send personal information to other businesses.
  • Be mindful of links on purchase sites – similar to the above, but just be aware that the re-direction takes you away from the original website where you might have felt relatively safe. On that not, always use a Credit Card for online purchases (or Apple or Google Pay, or Paypal) as you’re provided with some protection against fraud.
  • Beware of location tracking – switch-off all that don’t need your location to work. In your apps just be aware that not all apps need to know where you are – maps … yes; weather – maybe; asda – not really!
  • Privacy settings in apps – Facebook, Google

Facebook (from Perplexity) …

To enhance your privacy on Facebook, here are key settings to adjust:

1. Control Who Sees Your Posts
Go to Settings & Privacy > Settings > Privacy.
Adjust the audience for your posts: choose "Friends," "Only Me," or customize it further. Avoid "Public" for maximum privacy.

2. Manage Profile Visibility
Edit your "About" section to limit shared details like work, education, and contact info. Set visibility to "Friends" or "Only Me".
Turn off search engine linking to your profile under Settings & Privacy > How People Find and Contact You.

3. Secure Your Account
Enable two-factor authentication and use a strong password.
Regularly review apps connected to your account and remove unnecessary ones.

4. Limit Old Posts
Use the "Limit Past Posts" option in Privacy Checkup to restrict visibility of older posts.

5. Control Tags and Posts on Your Profile
Under Profile and Tagging, decide who can post on your profile and who can see tagged posts. Set to "Friends" or stricter options.

6. Ad Preferences
Turn off personalized ads by reviewing ad preferences in Settings & Privacy > Ad Preferences.

Review these settings periodically for better privacy control!

… and remember my advice to logout from Facebook and Instagram after use. A belts and braces protection of your privacy.

Then for Google, start at accounts.google.com

Screenshot

Perplexity on Google Privacy settings gives me …

Google offers several privacy settings to help users control their data and online experience. Here are key privacy settings you should consider adjusting:

Web & App Activity
Turn off this master privacy control to limit Google's collection of your search history, location data, and app usage. To do this:
Go to any Google website
Click on your profile picture
Select "Google Account"
Navigate to "Data & Privacy"
Find "Web & App Activity" and turn it off

Location History
Disable location tracking by turning off both Web & App Activity and Timeline (formerly Location History). This prevents Google from storing detailed information about your movements.

Auto-Delete Options
If you prefer to keep some features enabled, set up auto-delete for your data:
Go to "Privacy & Personalization"
Select "Web & App Activity" or "Timeline"
Choose "Auto-delete" and set your preferred time period

Ad Personalization
Limit targeted advertising by adjusting these settings:
Go to "Privacy & Personalization"
Find "Ad Personalization"
Turn off personalized ads

Chrome Privacy Settings
For Chrome users, consider these adjustments:
Disable automatic sign-in: Settings > Sync and Google Services > Turn off "Allow Chrome Sign-In"
Sign out of Chrome: Click your profile picture > Sign out
Manage sync settings: Settings > Sync and Google Services > Manage What You Sync

Additional Controls
Review and limit data sharing with third-party apps and services
Use Google's Privacy Checkup tool to review and adjust your settings
Explore the "Data & Privacy" section in your Google Account for more options

Remember, while these settings can enhance your privacy, they may also affect some Google services' functionality. Regularly review and update your privacy settings to maintain your desired level of data protection.

Options you might consider …

  • Subscription rather than free – a hobby horse of mine! If it’s worth using, it’s worth paying for – especially if it prevents your information being sold on to other sites, or marketing organisations.
  • Privacy focussed solutions as a choiceProton vs Google;
  • Open source as a consideration – always investigate whether there is a FreeWare or DonationWare option, and then consider offering a subscription is requested – Wikipedia, Signal, Libre, etc etc
  • Wise choices when downloading – be sure of the website before you download software
Here are some of the best sites for downloading safe freeware:

1. **FileHippo**
- **Features**: Offers a wide range of current apps, categorized for easy navigation. Provides older versions of software, which can be useful if newer versions cause issues.
- **Benefits**: Properly labels any additional software offers, making it easy to avoid unwanted downloads[2].

2. **Softpedia**
- **Features**: Over 1 million software titles, regularly updated and checked for malware. Offers mirrors for previous versions of programs.
- **Benefits**: Detailed descriptions, user reviews, and editor ratings help ensure safe downloads[1][2].

3. **MajorGeeks**
- **Features**: Long-standing reputation for reliability, with a curated list of top freeware picks.
- **Benefits**: Known for its trustworthiness, despite a somewhat outdated interface[2].

4. **SnapFiles**
- **Features**: Highlights a "Freeware Pick" and a "Random Pick" to discover new apps. Includes user reviews and warnings about bundled software.
- **Benefits**: Offers a section for portable programs, ideal for running apps without installation[2].

5. **Ninite**
- **Features**: Allows downloading multiple apps at once, automatically rejecting toolbars and unwanted software.
- **Benefits**: Ideal for setting up new PCs or reinstalling software securely, with background updates[2].

6. **Tucows**
- **Features**: Established reputation with a wide range of software available.
- **Benefits**: Known for reliability and safety, though less frequently updated[1].

7. **Portable Freeware**
- **Features**: Curated directory focusing on portable freeware with comprehensive descriptions and user comments.
- **Benefits**: Ensures software runs without installation and leaves no traces on the host machine[3].

8. **Chip.de/Chip.eu**
- **Features**: Offers a variety of software with hints about potential toolbars or adware within the software itself.
- **Benefits**: Known for avoiding adware wrappers in downloads[1].

9. **Nonags**
- **Features**: Specializes in non-adware freeware, ensuring safe downloads.
- **Benefits**: Ideal for those seeking software without bundled unwanted programs[1].

10. **GitHub**
- **Features**: A platform primarily for open-source software development, offering a wide range of free and safe software.
- **Benefits**: Software is often reviewed and audited by the community, ensuring safety and quality[3].

Sources
[1] what's your trusted site for freeware? (sourceforge ect.) : r/software https://www.reddit.com/r/software/comments/1xwokn/whats_your_trusted_site_for_freeware_sourceforge/
[2] Safest Websites to Download Windows Software - Bug Zero https://blog.bugzero.io/safest-websites-to-download-windows-software-ffff6b2e152b
[3] Best Website for downloading Freeware Software? - Bogleheads.org https://www.bogleheads.org/forum/viewtopic.php?t=404839
[4] The best free software that's completely safe (we've checked) https://www.which.co.uk/news/article/the-best-free-safe-software-ajW7U4V3dBVU
[5] CNET Download: Free Software Downloads and Reviews for ... https://download.cnet.com
[6] The 10 Safest Free Software Download Sites for Windows in 2023 https://www.youtube.com/watch?v=KCaTww_6YcY
[7] Top 10 Sites to Download Free PC Games Completely Safe and Legit https://www.movavi.com/learning-portal/sites-to-download-free-pc-games.html
  • A VPN offers a degree of protection (even with a cell connection)
Using a VPN while connected to a cellular internet connection is not strictly necessary but is highly recommended for several reasons:

### **Why Use a VPN on Cellular Data?**
1. **Enhanced Privacy**:
- Cellular providers can track and log your online activity. A VPN encrypts your data, preventing your Internet Service Provider (ISP) from monitoring or selling your browsing habits[2][3][4].

2. **Increased Security**:
- While cellular networks are generally more secure than public Wi-Fi, they are not immune to threats like phishing or malicious attacks. A VPN adds an extra layer of encryption to protect sensitive information[1][2][3].

3. **Bypass Geo-Restrictions and Throttling**:
- A VPN allows you to spoof your IP address, enabling access to region-specific content or bypassing ISP throttling during high-bandwidth activities like streaming or gaming[2][3].

4. **Protection Against ISP Tampering**:
- Some ISPs compress or modify website content for mobile browsing. A VPN ensures you access unaltered content[1].

### **When You Might Not Need a VPN**
- If your primary concern is casual browsing or using apps like WhatsApp or Facebook, and you trust your cellular provider, a VPN might not feel essential[5].
- Using a VPN increases data usage (by 5–15%) and can drain your battery faster, so it may not be ideal if you're on a limited data plan or low battery[1][2][4].

### **Conclusion**
While cellular networks are safer than public Wi-Fi, using a VPN enhances privacy and security. It is particularly valuable if you frequently handle sensitive data, want to avoid ISP tracking, or access geo-restricted content. However, consider the trade-offs in terms of data usage and battery life.

Sources
[1] Does a VPN work on mobile data? - Surfshark https://surfshark.com/blog/does-vpn-work-on-cellular-data
[2] Should you use a VPN when connected to cellular data? | Tom's Guide https://www.tomsguide.com/computing/vpns/should-you-use-a-vpn-when-connected-to-cellular-data
[3] Does VPN work on mobile data? - Cybernews https://cybernews.com/what-is-vpn/does-a-vpn-work-on-mobile-data/
[4] Does a VPN work without Wi-Fi? - NordVPN https://nordvpn.com/blog/does-vpn-work-without-wifi/
[5] Who here uses VPN when on mobile data? - Reddit https://www.reddit.com/r/VPN/comments/n8x2kv/who_here_uses_vpn_when_on_mobile_data/
[6] Do you need a VPN on your phone? Here's the truth. - Mashable https://mashable.com/article/do-you-need-a-vpn-on-your-phone
[7] Why You Need a VPN on Your Smartphone | McAfee Blog https://www.mcafee.com/blogs/mobile-security/privacy-please-why-a-vpn-on-your-smartphone-may-be-a-smart-move-for-you/
[8] Do I Really Need a VPN at Home? - PCMag https://www.pcmag.com/how-to/do-i-need-a-vpn-at-home

So it’s up-to-you – how much privacy do you actually want; how much privacy do you need!

AI, chatbots and a new way to search

[Corrected information for Gemini in comparative section of post.]

A practical session following some demonstrations to encourage you to try out using Chatbot apps as an alternative to using a search engine. Of course most of the browsers and search engines now have the ability to “chat” added to them, ie Ecosia Chat and DuckDuckGo – which has the additional plus of you being able to choose which chatbot to use …

Claude tells me (as of October 2024) that the Edge, Opera, Chrome, Brave, Firefox and Arc browsers have this functionality, and Bing, Google (through Gemini), DuckDuckGo and Perplexity search tools have this functionality.

You can generate images too – but this is not the subject of today’s session. Look at Jonathan’s AI-generated avatar …

… or Phil’s set of images generated by Le Chat, from this script …

Screenshot

But we will look at how an image taken with your phone, or tablet, can be attached to a chatbot and get a summary of what it’s saying …

This (when sent to ChatGPT) with the one word message – “Summarise”, returned this …

  1. Online scamming is a global industry – It is vast, sophisticated, and growing rapidly, with criminal networks operating across borders.
    1. “Pig butchering” is a major scam method – Scammers build fake relationships with victims, emotionally manipulate them, and then convince them to invest in fraudulent schemes.
    2. Scamming is more dangerous than the drug trade – It operates beyond the reach of law enforcement, lacks regulation, and is highly scalable.
    3. Criminal compounds run large-scale scam operations – Many scams originate from compounds in Southeast Asia, where trafficked workers are forced into scamming.
    4. Advanced technology enables fraud – AI-generated voices, deepfake videos, and cryptocurrency help scammers operate anonymously and make their schemes more convincing.
    5. Scammers exploit human emotions – Victims fall prey to scams due to loneliness, fear, greed, and trust in online relationships.
    6. The economic impact is massive – Billions of dollars are stolen annually, affecting individuals, businesses, and economies.
    7. Law enforcement struggles to keep up – Scammers move money and people across jurisdictions faster than authorities can track them.
    8. International cooperation is needed – Countries must collaborate, working with banks, tech companies, and social media platforms to combat online fraud.
    9. Public awareness and education are crucial – Governments should implement stronger warnings and educational campaigns to prevent people from falling victim.

… but what is “pig butchering”, ask ChatGPT and you get this …

Pig butchering (shā zhū pán, 杀猪盘) is a sophisticated online scam that combines financial fraud with emotional manipulation. The term comes from the idea of “fattening up” a victim (the pig) before eventually “butchering” them for financial gain.

How It Works:
1. Initial Contact: Scammers approach victims through dating apps, social media, or even random text messages pretending to be a wrong number. They gradually build a friendly or romantic relationship.
2. Emotional Manipulation: Over weeks or months, scammers gain the victim’s trust, often pretending to be wealthy and successful. They encourage casual financial discussions, showing off their supposed investment profits.
3. Fake Investment Opportunity: Once trust is established, scammers introduce the victim to a “lucrative” investment, usually involving cryptocurrency or forex trading. They direct the victim to a fake but professional-looking website or app where they initially see small returns.
4. Encouraging Bigger Investments: As the victim gains confidence, they invest more money, sometimes even taking out loans or draining savings. The scammer keeps reinforcing the illusion of profits.

5. The Exit (Butchering Phase): Eventually, when the victim tries to withdraw funds, they encounter delays, extra fees, or are locked out entirely. The scammer then disappears, leaving the victim financially devastated.
6. Trafficking Connection: Many pig-butchering scams are operated from compounds in Southeast Asia, where trafficked workers are forced to run scams under threat of violence.

Why It’s Effective:
• Long-term manipulation: Unlike quick scams, it relies on slowly building trust.
• Emotional exploitation: Victims often feel emotionally invested, making them less skeptical.
• Convincing fake platforms: Sophisticated websites mimic real investment sites, making the scam seem legitimate.
• Cryptocurrency anonymity: Crypto transactions make it difficult to trace stolen money.

This type of fraud is one of the fastest-growing online crimes, with billions of dollars stolen worldwide each year.

That’s phenomenally powerful and time-saving!

So we’re going to look at installing some Chatbot apps, and doing some comparative enquiries, and end-up having some fun – I hope.

Le Chat helps me write this … “Provide a list of the most popular AI Chatbots, whether they’re open source and who they’re funded by?”

Here is a list of some of the most popular AI chatbots, their open-source status, and their funding sources:

  1. ChatGPT: Developed by OpenAI, ChatGPT is one of the most widely used AI chatbots. It is not open-source and is funded by Microsoft and other investors.
  2. Claude: Created by Anthropic, Claude is known for its conversational abilities and is considered one of the best overall AI chatbots. It is not open-source and has received significant funding from various investors.
  3. Google Gemini: Formerly known as Bard, Gemini is Google’s AI chatbot integrated with Google services. It is not open-source and is funded by Google.
  4. Microsoft Copilot: This AI chatbot is developed by Microsoft in collaboration with OpenAI. It is not open-source and is funded by Microsoft.
  5. Llama 3 by Meta: An open-source AI chatbot released by Meta AI. It is designed to be freely available for anyone to use and build upon. It is funded by Meta.
  6. Perplexity AI: Known for its ability to search the internet and provide relevant data, Perplexity AI is not open-source and is funded by various investors.
  7. Jasper AI: This AI chatbot is tailored for content creation and marketing. It is not open-source and is funded by various investors.
  8. Poe: Created by Quora, Poe allows users to access multiple AI models in one tool. It is not open-source and is funded by Quora.
  9. Rasa: A popular open-source framework for building conversational AI assistants. It is funded by various investors and is widely used in the developer community.
  10. DeepPavlov: An open-source conversational AI framework designed for developing production-ready chatbots. It is funded by various research grants and investments.

These AI chatbots represent a mix of open-source and proprietary solutions, each with its own strengths and funding sources.

Of these I do like Claude, Perplexity and Le Chat in particular, but Le Chat wasn’t in this list, why? I followed up my initial query with – “Why isn’t Le Chat in this list?”

Le Chat is an AI chatbot developed by Mistral AI, a French startup. It is designed to be a fast and efficient conversational assistant, capable of processing up to 1,000 words per second, making it one of the fastest AI models available. Le Chat is available as a native app for iOS and offers a range of features, including image analysis, content generation, and real-time internet searches. It is positioned as a European alternative to other AI chatbots like ChatGPT and Google Gemini.

Mistral AI has attracted significant investment from various sources, including American tech giants like Nvidia and IBM, as well as funding from the French government and other European investors. The company has also received support from France’s defense ministry and other European entities, highlighting its strategic importance in the region’s AI landscape.

Le Chat is part of Europe’s broader push for AI independence and is seen as a key player in the continent’s efforts to compete with major AI developers in the US and China. The chatbot is designed to offer strong privacy protections and aligns with European values regarding data security.

That’s why I like Le Chat – an element of independence from the US, but I suspect there will be a UK killer-chatbot in the wings!!!

I thought I’d do a comparative query across the different AI Chatbots I use – but in their web format so that I could do screenshots for this post [the responses would be the same on the phone/tablet – just easier for doing screenshots]. The query was fed to me by my daughter, and I followed the responses with some supplementaries (which I’m not including), but you’ll get the idea …

The enquiry … “In the UK, what I should plant in a western-facing partly shady coastal front garden with clayish soil?”

Le Chathttps://mistral.ai/products/le-chat

Screenshot

Perplexity (on the web I was given Perplexity Pro – presumable for a trial period) – https://www.perplexity.ai

Screenshot

For a full response – https://www.perplexity.ai/search/in-the-uk-what-i-should-plant-pu_I4lpmTKWVfR1U17OmrA

Claudehttps://claude.ai/new

Screenshot

the extreme – perhaps you have to pay to get access to Google’s own AI LLM – I’m happy to be corrected here!

Gemini (in a browser) returns this response …

https://g.co/gemini/share/ff8bfa44ae92

So to see how Gemini (in a browser looks), go to  https/gemini.google.com register (or use your Google account) and type in the enquiry. From the Gemini app it looks something like this …

In the UK, what I should plant in a western-facing partly shady coastal front garden with clayish soil? 🤗

It's great you're planning your coastal garden! Coastal gardens in the UK present some unique challenges, but also opportunities. Here's a breakdown of considerations and plant suggestions, taking into account your western-facing, partly shady, clayish soil conditions:
Key Challenges:
* Coastal Conditions:
* Salt spray: Plants need to tolerate salty air.
* Strong winds: Choose robust, wind-resistant plants.
* Potential for sandy, but in your case clayish soil.
* Western-Facing, Partly Shady:
* Western exposure means afternoon sun, which can be intense.
* "Partly shady" requires plants that can handle some shade but also appreciate some sun.
* Clayish Soil:
* Clay soil can be waterlogged in winter and dry and cracked in summer.
* It's essential to select plants that tolerate these conditions or amend the soil.
Plant Recommendations:
Here's a selection of plants that generally thrive in these conditions:
* Shrubs:
* Escallonia: Very tolerant of coastal conditions and wind.
* Photinia: Provides vibrant foliage and tolerates clay soil.
* Hebe: Many varieties are well-suited to coastal gardens.
* Lonicera nitida (shrubby honeysuckle): Good for hedging, tolerant of various conditions.
* Perennials:
* Hostas: Thrive in partial shade and tolerate clay.
* Ferns: Many ferns enjoy shady, moist conditions (clay can hold moisture).
* Pulmonaria (lungwort): Tolerates shade and clay soil.
* Geraniums (hardy): Many varieties are adaptable to various conditions.
* Sea thrift (Armeria maritima): Excellent for coastal areas.
* Grasses:
* Carex varieties: Many sedges tolerate clay soil and partial shade.
* Festuca glauca (blue fescue): Can add textural interest.
Tips for Clay Soil:
* Improve drainage: Incorporate organic matter like compost or well-rotted manure to improve soil structure.
* Mulching: Apply a mulch to help retain moisture in summer and protect roots in winter.
* Raised beds: Consider raised beds if drainage is a significant issue.
Where to Get More Information:
* Royal Horticultural Society (RHS): The RHS website (rhs.org.uk) is an excellent resource for plant information and gardening advice.
* Local Garden Centres: Local garden centres can provide tailored advice for your specific area.
When choosing plants, always check their specific requirements and consider your garden's microclimate.

Copilothttps://copilot.microsoft.com/chats/tBUeqP4WXhs3BKq8a6zy5. It has to be said the app version is quite different in appearance (so I include it below as well.

Screenshot
In the UK, what I should plant in a western-facing partly shady coastal front garden with clayish soil? 🤗

Ah, a coastal garden in Wales with clayish soil—sounds like a wonderful challenge! For a western-facing garden with partial shade and a seaside breeze, you'll want plants that can handle salt spray, thrive in heavy soil, and enjoy a mix of sun and shade.

Here are some suggestions:

### Perennials and Shrubs:
1. **Eryngium (Sea Holly)** - Perfect for coastal gardens with its striking, spiky flowers and tolerance for salty air.
2. **Hydrangea macrophylla** - Thrives in clay soil and gives fabulous blooms, especially in partial shade.
3. **Hebe** - Compact, hardy, and salt-tolerant, making it ideal for coastal fronts.
4. **Skimmia japonica** - Great for partial shade, and its colorful berries add winter interest.
5. **Rosa rugosa (Beach Rose)** - Tolerates tough coastal conditions and produces lovely fragrant flowers.

### Grasses:
1. **Carex (Sedges)** - Many varieties thrive in clay soil and are low-maintenance.
2. **Festuca glauca (Blue Fescue)** - Adds texture and color, and it’s very hardy.
3. **Miscanthus sinensis** - Works well in heavier soils and creates a striking backdrop.

### Flowering Plants:
1. **Alchemilla mollis (Lady's Mantle)** - Thrives in partial shade and tolerates clay, with charming frothy flowers.
2. **Astrantia** - Adds a touch of elegance with its intricate blooms and loves partial shade.
3. **Primula vulgaris (Primrose)** - Ideal for dappled shade, and they bring an early splash of color.

### Ground Covers:
1. **Ajuga reptans (Bugleweed)** - Tolerates clay and partial shade while offering glossy foliage and purple flowers.
2. **Vinca minor (Lesser Periwinkle)** - A hardy ground cover that thrives in shady spots.

It’s also worth working organic matter like well-rotted compost into the clay soil to improve drainage and structure over time. Coastal gardens can be unique, so experimenting with a mix of hardy and native plants might lead to delightful surprises. 😊

What do you think about these options? Let me know if you'd like specific care tips or alternatives!

I hope that’s of interest; I encourage you to do your own comparative enquiries, bearing in mind that they don’t all have access to up-to-date information.

The world is changing rapidly, and my son has already demonstrated that he can build the code for the front-end of a website using a chatbot which he incorporated into his DuckDuckGo browser …

Screenshot

… with the following instructions …

“I asked my new AI app writing tool to build me a private social networking tool inspired by Google+ features.

Just done the front end design, but I can add a database and I can get it to setup federation with Google login.

It’s mobile responsive as well.”

… now that’s truly amazing, but I digress.

Creating a sitcom

First prompt.

Can you come up with some sitcom names that would cover two elderly people, one who loves technology and loves setting up systems, and the other who has no idea?

then i got names … i responded -> I like wired and retired.

Second prompt

Can you write the premise of the show. The grandad gets very frustrated cause he sets up all these amazing systems and is energised by tech but his wife (grandma) is airy fairy and likes more human pursuits and poetry and gardening and is shocking at planning and execution. Both are lovely.

This was the response.

Show Title: Wired and Retired

Premise:
In the quiet suburbs, a lively retired couple navigates the collision of their wildly different passions. Frank, a tech-obsessed granddad, thrives on systems, automation, and the latest gadgets. His garage is a command center, his home a hub of interconnected brilliance—at least in his mind. Meanwhile, Betty, his whimsical wife, prefers the analog world. She spends her days writing poetry, tending to her unruly garden, and losing herself in daydreams.

Their love is undeniable, but their worlds often clash in hilarious ways. Frank’s perfectly calibrated smart irrigation system gets overrun by Betty’s impulsive planting sprees. His meticulous meal-planning app gets sidelined when Betty decides dinner should be a spontaneous pic… Read more

then he just kept asking questions

until he got to …

Updated Premise:
Retired life for Frank and Betty is far from quiet. Frank, a tech-obsessed granddad, keeps busy in his upstairs office, perfecting his gadgets, cheering for West Ham, and sneaking out for his favorite snack, ‘Nice and Spicy’ Nik Naks. Betty, his free-spirited wife, thrives on poetry, gardening, and unplanned adventures that constantly disrupt Frank’s meticulously planned systems.

Their quirky family dynamic adds another layer of hilarity. Their 40-something son, who lives nearby, frequently steps in as mediator and problem solver, though his visible hair loss suggests he’s barely holding it together. Their older son, who lives in Australia, adds to the chaos during his visits, gleefully stirring up trouble and playing both parents off each other.

Balancing out the chaos is their serious older daughter, a psychologist, who watches the family dynamics with professional concern. She often finds herself frustrated with her brothers’ antics and their impact on her parents, though her attempts to intervene usually go unnoticed.

Adding warmth to the mix is their youngest daughter, who lives close by with her young family. Betty adores spending time with her grandchildren, but her tendency to lose track of time often leaves Frank exasperated when she abandons his carefully laid plans for yet another spontaneous outing.

Through all the love, laughter, and occasional family drama, Frank and Betty prove that life is always better with a little humor—and a lot of heart.

Supporting Characters:
• Millie: The tech-savvy granddaughter who enjoys Frank’s high-tech world but often teams up with Betty during family adventures.
• George: Frank’s West Ham-loving best mate and snack-run partner, who adds to the laughs.
• Dorothy: Betty’s poetic and gardening partner, who fuels her creative chaos.
• Alan: The middle son, a local, stressed-out mediator whose receding hairline marks his thankless efforts to keep the peace.
• David: The mischievous older son from Australia, who stirs up trouble whenever he visits.
• Clara: The serious older daughter, a psychologist, who’s always concerned about the family’s dynamics, especially her brothers’ antics.
• Lucy: The youngest daughter, whose young family brings joy and chaos into Betty’s life, often making her forget time (and Frank’s plans).

Tone:
A heartwarming sitcom full of humor and relatable family moments, Wired and Retired celebrates the beauty of intergenerational dynamics, proving that even in retirement, life is a delightful blend of love, laughter, and just enough chaos to keep things interesting.

… and then we got Episodes of the sitcom …

Episode Titles:
1. “Password Protected”
Frank’s new smart home security system locks Betty out after she forgets the password during a gardening spree. Alan is called in to mediate, only for the system to malfunction spectacularly during a surprise visit from David.
2. “Nik Nak Sneak Attack”
Frank’s secret snack stash is discovered by Betty, who replaces his ‘Nice and Spivey’ Nik Naks with healthy alternatives. Desperate to retrieve his beloved snack, Frank ropes Millie into a covert snack run that goes hilariously wrong.
3. “The Poetry of Football”
Frank prepares for a big West Ham match, but Betty accidentally double-books the living room for her poetry club meeting. Clara arrives to mediate, but her psychological insights only make matters worse.

4. “Down the Rabbit Hole”
Betty gets caught up babysitting Lucy’s kids and loses track of time, leaving Frank stranded at a gadget expo. When Lucy apologizes, Frank realizes he enjoys the quiet chaos of his grandkids—until they discover his gadgets.
5. “Springsteen & Shenanigans”
David’s visit from Australia throws the household into disarray as he tries to convince Frank to join a local Springsteen tribute band while secretly encouraging Betty to paint her garden shed bright pink. Alan is left to clean up the mess.
6. “Psychologist vs. Chaos”
Clara decides to hold a family therapy session to address everyone’s dynamics. But when old grudges resurface and Frank’s gadgets interrupt the session, Clara questions if anyone can truly retire from family drama.

and a 30-Minute Episode Outline:

Episode: “Password Protected”

  1. Cold Open (2-3 minutes)
    Betty struggles with Frank’s new voice-activated front door lock after forgetting the password. She tries random phrases (“Bruce Springsteen rules!”) but is locked out. Frank smugly explains the system’s brilliance—until it locks him out too.
  2. Setup (5-6 minutes)
    Frank works on fixing the system while Betty heads to the garden, only to accidentally trigger the motion sensors. Chaos ensues as Frank’s phone floods with alerts. Alan shows up after receiving a frantic call from Betty.
  3. Rising Action (6-8 minutes)
    Alan tries to mediate, but the system glitches and locks everyone—including Millie, who came to help—inside the house. Betty starts reciting poetry to keep calm, which Frank finds infuriating. Meanwhile, David calls from Australia, adding comic commentary.
  4. Climax (7-8 minutes)
    Alan manages to bypass the system just as Betty’s gardening friends arrive for tea, unwittingly triggering the alarms again. Frank declares the system a failure and blames Betty, who points out she only wanted a simple lock and key.
  5. Resolution (3-4 minutes)
    Frank reluctantly agrees to simplify the system but secretly tinkers with it that evening. Betty catches him sneaking a Nik Nak, teasing him that even his snacks need a password.

Tag Scene (1 minute)
The system malfunctions during the night, locking the entire family in the bedroom. Betty smirks, “At least we’re safe from burglars.” Frank sighs, “Or freedom.”

Each episode mixes laugh-out-loud situations with heartfelt moments, showing that even retirement is full of surprises!

Now it’s your turn!!!! This was all generated using ChatGPT, but the other AI chatbots could probably do the same.