Loopy Pro: Create music, your way.
What is Loopy Pro? — Loopy Pro is a powerful, flexible, and intuitive live looper, sampler, clip launcher and DAW for iPhone and iPad. At its core, it allows you to record and layer sounds in real-time to create complex musical arrangements. But it doesn’t stop there—Loopy Pro offers advanced tools to customize your workflow, build dynamic performance setups, and create a seamless connection between instruments, effects, and external gear.
Use it for live looping, sequencing, arranging, mixing, and much more. Whether you're a live performer, a producer, or just experimenting with sound, Loopy Pro helps you take control of your creative process.
Download on the App StoreLoopy Pro is your all-in-one musical toolkit. Try it for free today.
Comments
Well, it’s not that easy .. their malicious proxy may push to your web client invalid certificate (own) but then yeah, you can notice in your browser warning about invalid certificate .. most of people will notice it, some may not
they can also infect your computer with malware which allows them sniff https connection and decipher yours https data (they basically steal public key received by your browser so they can decipher data which is your browser sending to web server)
Of course, this is advanced technique and may not happen to you .. but 2FA is simply another level of protection agains more advanced attacks .. personally, i use 2FA only for crypto exchanges and my main e-mail account, other than that i don’t have any sensitive data and all i may loose by hack is backed up on cold storage :-)))
Really sensitive data (for example crypto wallets private keys) NEVER enter any computer, just paper (short term keys) or HW wallet (multi year wallets)
I mean - if you have anything you want to be ABSOLUTELY rock solid sure not even best hacker on planet can steal from you - just NEVER store it on computer or any digital storage device. That simple it is. Including photo
It’s always about searching compromise between convenience/ease of use and security…
What pisses me a lot is that many pages are forcing you to create password like “A3blaba!” - you know the shit like “one capital, one number, one special character, at least 8 chars” - Such passwords are hard to remember and are COMPLETE shit in terms of security. Much better is simply use short sentence like 3-4 words (something what makes sense to you) - it’s counter intuitive but such passwords are much hard to guess from cryptographic point of view, but super easy to remember
TLS is used just for SMTP (e-mail sending) service.. not completely sure but i think it’s not useable for www traffic.. (but do not quote me on this, not completely sure)
Not impossible, but much more difficult if the hacker isn't on the same local area network. The technique involves tricking the target into thinking it's establishing the encrypted session with malicious system that then acts as a pass-through. It wasn't terribly difficult. I used to know the LAN techniques back in the day, but have forgotten more than I know at this point.
If someone can successfully trick your computer into establishing the HTTPS flow initially with their computer then they can pass traffic through while being able to read it. Extremely unlikely, but no, not impossible.