<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Noé C. Michel</title>
    <description>The latest articles on DEV Community by Noé C. Michel (@noe).</description>
    <link>https://dev.to/noe</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F758790%2Fd6c5c31e-a1b7-4d04-bfbb-db3ac5e0a215.png</url>
      <title>DEV Community: Noé C. Michel</title>
      <link>https://dev.to/noe</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/noe"/>
    <language>en</language>
    <item>
      <title>Very interesting technique!</title>
      <dc:creator>Noé C. Michel</dc:creator>
      <pubDate>Wed, 09 Jul 2025 23:14:09 +0000</pubDate>
      <link>https://dev.to/noe/very-interesting-2if9</link>
      <guid>https://dev.to/noe/very-interesting-2if9</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/worldlinetech/json-style-guides-for-controlled-image-generation-with-gpt-4o-and-gpt-image-1-36p" class="crayons-story__hidden-navigation-link"&gt;🎨JSON Style Guides for Controlled Image Generation with GPT-4o and GPT-Image-1&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;
          &lt;a class="crayons-logo crayons-logo--l" href="/worldlinetech"&gt;
            &lt;img alt="Technology at Worldline  logo" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6396%2Fae09e152-87fc-4390-b5d7-cb90729471d2.png" class="crayons-logo__image"&gt;
          &lt;/a&gt;

          &lt;a href="/raphiki" class="crayons-avatar  crayons-avatar--s absolute -right-2 -bottom-2 border-solid border-2 border-base-inverted  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F982002%2Fb4188602-61e2-49e6-85be-d590a9b2e228.png" alt="raphiki profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/raphiki" class="crayons-story__secondary fw-medium m:hidden"&gt;
              raphiki
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                raphiki
                
              
              &lt;div id="story-author-preview-content-2469534" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/raphiki" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F982002%2Fb4188602-61e2-49e6-85be-d590a9b2e228.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;raphiki&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;span&gt;
              &lt;span class="crayons-story__tertiary fw-normal"&gt; for &lt;/span&gt;&lt;a href="/worldlinetech" class="crayons-story__secondary fw-medium"&gt;Technology at Worldline &lt;/a&gt;
            &lt;/span&gt;
          &lt;/div&gt;
          &lt;a href="https://dev.to/worldlinetech/json-style-guides-for-controlled-image-generation-with-gpt-4o-and-gpt-image-1-36p" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;May 8 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/worldlinetech/json-style-guides-for-controlled-image-generation-with-gpt-4o-and-gpt-image-1-36p" id="article-link-2469534"&gt;
          🎨JSON Style Guides for Controlled Image Generation with GPT-4o and GPT-Image-1
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/genai"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;genai&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/image"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;image&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/json"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;json&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/gpt"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;gpt&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/worldlinetech/json-style-guides-for-controlled-image-generation-with-gpt-4o-and-gpt-image-1-36p" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/exploding-head-daceb38d627e6ae9b730f36a1e390fca556a4289d5a41abb2c35068ad3e2c4b5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/multi-unicorn-b44d6f8c23cdd00964192bedc38af3e82463978aa611b4365bd33a0f1f4f3e97.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;82&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/worldlinetech/json-style-guides-for-controlled-image-generation-with-gpt-4o-and-gpt-image-1-36p#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              9&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            4 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>genai</category>
      <category>image</category>
      <category>json</category>
      <category>gpt</category>
    </item>
    <item>
      <title>Art x Science's "Literary Empathy" AI: A Confidential Tour of the "Sapere Aude" Project and Its Neo4j-Powered "Story Graphs"</title>
      <dc:creator>Noé C. Michel</dc:creator>
      <pubDate>Mon, 19 May 2025 23:35:31 +0000</pubDate>
      <link>https://dev.to/noe/art-x-sciences-literary-empathy-ai-a-confidential-tour-of-the-sapere-aude-project-and-its-7jn</link>
      <guid>https://dev.to/noe/art-x-sciences-literary-empathy-ai-a-confidential-tour-of-the-sapere-aude-project-and-its-7jn</guid>
      <description>&lt;p&gt;Alright, devs. Lean in. This isn't your standard product announcement. No sterile slides. No corporate jargon. We're pulling back the curtain, just a crack, on something… different. Something that pulses. Art x Science International. They're not just building tools; they're attempting to instill a kind of literary empathy into artificial intelligence. Today, you get a confidential tour. A glimpse into the soul of their &lt;a href="https://artxsc.org" rel="noopener noreferrer"&gt;"Sapere Aude" project&lt;/a&gt; and the intricate, Neo4j-fueled "Story Graphs" [cite: PAGE 1] at its core. Prepare for a journey into the beautifully complex.&lt;/p&gt;

&lt;p&gt;The mountain: classic literature. Vast. Imposing. For neurodivergent minds, particularly those navigating the exhilarating chaos of ADHD, these dense forests of prose can feel… impenetrable. A locked garden. Art x Science International asked: what if AI could be more than a brute-force summarizer? What if it could be a guide? A whisperer? What if it could learn empathy?&lt;/p&gt;

&lt;p&gt;Enter their concept of "Literary Empathy" AI. A bold claim. Almost audacious. It’s not about simply making text shorter. It’s about understanding. The author’s unique cadence. The reader’s cognitive landscape. The subtle dance between the two. They are, in essence, teaching their models – sophisticated NLP algorithms, including fine-tuned GPT-like architectures [cite: PAGE 1] – to feel the rhythm of the original work while simultaneously anticipating the needs of a reader prone to distraction. It’s stylometry preservation meeting complexity reduction. A tightrope walk.&lt;/p&gt;

&lt;p&gt;And the grand stage for this endeavor? The "Sapere Aude" project. "Dare to know." A fitting name. Because what they're daring to do is fundamentally re-imagine literary accessibility. This isn't just about scaling; it's about deepening.&lt;/p&gt;

&lt;p&gt;Now, let's talk tech. The beating heart. Those "Story Graphs." Imagine, if you will, the narrative DNA of a novel – characters, pivotal events, thematic undercurrents, intricate relationships, and the crucial "plot steps" – not as a linear string, but as an interconnected, visualized web. This is where Neo4j steps onto the stage, its graph database capabilities providing the perfect architecture to map these complex literary ecosystems. These aren't static diagrams; they are dynamic, interactive maps of meaning.&lt;/p&gt;

&lt;p&gt;How does this translate to the reader? Freedom. The AI, armed with graph traversal algorithms like depth-first and breadth-first search, can illuminate alternative pathways through the story. A reader might choose to follow the intricate arc of a single character. Or trace a specific thematic thread. The system guides, ensuring coherence, but the journey becomes personalized, adaptive. The press release even hints at a contributor GUI where these graphs—nodes of character, theme, event—are made tangible, explorable. It’s a paradigm shift from passive consumption to active engagement.&lt;/p&gt;

&lt;p&gt;But here’s the crucial counter-narrative to the AI-takes-over trope: this is a profound human-AI collaboration. Educational neuroscientists and literary specialists are not just consultants; they are co-creators, guiding the AI's development, curating its output. There's significant human effort in data labeling, meticulously identifying those notable plot points, the dialogue that sings, the passages that might prove "hard to read" – all to train the models. The AI augments human expertise, it doesn’t supplant it.&lt;/p&gt;

&lt;p&gt;Why should this make your developer heart beat faster? Because it’s sophisticated NLP in action, fine-tuned for an incredibly nuanced task. It’s about building interactive narratives that are truly interactive. It’s AI for genuine social change, tackling cognitive accessibility head-on. And the underlying framework? It whispers of a future where personalized education technology adapts not just to what we learn, but how our individual minds learn best.&lt;/p&gt;

&lt;p&gt;Art x Science International has an ambitious roadmap: adapting 4,500 books in three languages, with an initial deep focus on French content where they can get direct educator feedback. They're opening registrations for crowdsourcing microtasks, distributing initial copies for feedback, and planning a progressive launch.&lt;/p&gt;

&lt;p&gt;They’re inviting technology partners, AI researchers, and individuals to join their mission. Donations are vital. For those who want to dive deeper into their tech stack, explore potential white papers, or discuss technical collaboration, Noé Cabannes Michel is the point of contact (&lt;a href="//mailto:noe@artxsc.org"&gt;noe@artxsc.org&lt;/a&gt;). General information and support can be found at &lt;a href="https://artxsc.org" rel="noopener noreferrer"&gt;https://artxsc.org&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;This is more than code. It’s a conversation between human creativity, machine intelligence, and the timeless power of story. It’s about daring to know how we can make the world’s literary heritage accessible to all, not by diminishing it, but by illuminating new ways in.&lt;/p&gt;

&lt;p&gt;What do you think? Can AI truly learn literary empathy? The journey has begun.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>neo4j</category>
      <category>news</category>
      <category>nlp</category>
    </item>
    <item>
      <title>New tabs in Windows file explorer</title>
      <dc:creator>Noé C. Michel</dc:creator>
      <pubDate>Sun, 13 Mar 2022 10:02:43 +0000</pubDate>
      <link>https://dev.to/noe/new-tabs-in-windows-file-explorer-5627</link>
      <guid>https://dev.to/noe/new-tabs-in-windows-file-explorer-5627</guid>
      <description>&lt;p&gt;A Windows 11 dev build 22572, announced this Wednesday, with other features such as improved parental control and a redesigned editing software came with an early surprise. Recently, a test user under the name of Xeno reported that a secret command on ViveTool can enable the tabs.&lt;br&gt;
&lt;iframe class="tweet-embed" id="tweet-1501678535617953801-233" src="https://platform.twitter.com/embed/Tweet.html?id=1501678535617953801"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1501678535617953801-233');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1501678535617953801&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;h2&gt;
  
  
  For real?
&lt;/h2&gt;

&lt;p&gt;If the File Explorer tabs seem easy and simple to use, we don't know if it will be included in a final build or it could never be. According to &lt;a href="https://www.pcworld.com/article/621685/windows-11-preview-builds-now-have-file-explorer-tabs.html" rel="noopener noreferrer"&gt;PcWorld&lt;/a&gt;, "Microsoft previously tested tab-like interfaces outside the browser with Sets, but abandoned it three years ago". &lt;/p&gt;

&lt;h2&gt;
  
  
  Enable it
&lt;/h2&gt;

&lt;p&gt;This is one of the most requested features of all time. So, in case you want to try here is a short tutorial for you :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sign up in the Windows Insider program&lt;/li&gt;
&lt;li&gt;Install the latest version, make sure the dev channel build is 22572&lt;/li&gt;
&lt;li&gt;Once it's done, get &lt;a href="https://github.com/thebookisclosed/Vive" rel="noopener noreferrer"&gt;github.com/thebookisclosed/Vive&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Run this command : &lt;code&gt;vivetool addconfig 304370472 2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Restart your computer&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Else, some third-party programs can give you a similar experience on Windows 10.&lt;/p&gt;

</description>
      <category>news</category>
      <category>windows</category>
      <category>productivity</category>
    </item>
    <item>
      <title>This browser extension can show YouTube dislikes</title>
      <dc:creator>Noé C. Michel</dc:creator>
      <pubDate>Mon, 24 Jan 2022 17:24:57 +0000</pubDate>
      <link>https://dev.to/noe/this-browser-extension-can-show-youtube-dislikes-16ln</link>
      <guid>https://dev.to/noe/this-browser-extension-can-show-youtube-dislikes-16ln</guid>
      <description>&lt;p&gt;YouTube has recently removed the dislike count across the platform to avoid mass harassment. But this new extension can actually return the famous dislike button.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7famed29incicbf7rhdh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7famed29incicbf7rhdh.png" alt="YouTube dislikes Credit:The Next Hint" width="800" height="421"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The disappearance of the dislikes counter leads to controversery. Some creators are even strongly opposed to it. Right now, you can still put a red thumb under a video, but you can't see how many "thumbs down" the video has garnered. Besides, YouTubers still have access to the counter from their YouTube Studio dashboard. Nevertheless, there is a method to make the total number of dislikes appear again under YouTube videos.&lt;/p&gt;

&lt;h2&gt;
  
  
  Open source "Return YouTube Dislikes"
&lt;/h2&gt;

&lt;p&gt;According to the &lt;a href="https://returnyoutubedislike.com/" rel="noopener noreferrer"&gt;extension's website&lt;/a&gt; , the extension gets data from a combination of archived data from before the official YouTube dislike API shut down, and extrapolated extension user behavior. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The extension collects the video ID of the video you are watching, fetches the dislike (and other fields like views, likes, etc) using our API. The extension then displays the dislike count and ratio on the page. If you like or dislike a video, that is recorded and sent to the database so an accurate dislike count can be extrapolated.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In January 2022, this free extension has hit over 2,000,000 downloads in total.&lt;/p&gt;

&lt;h2&gt;
  
  
  Redactor's review after one week
&lt;/h2&gt;

&lt;h6&gt;
  
  
  3/5 ★★★☆☆
&lt;/h6&gt;

&lt;p&gt;I tried for my personal for one week use and to be honest that's a really good solution if you are looking for having an opinion about the video that you are watching and to don't waste time on usefulness tutorial. It feels like the old days and I can't part with it. Some people on the internet complain about the dislike numbers not being updated for a long time ago, but it's still enough to make you a good idea if it's shit or not. Unfortunately, it may not work on every new videos uploaded after December 13th 2021, but the team plans to share a API system with the creators.&lt;/p&gt;

&lt;p&gt;Download for Chrome, Firefox, Edge, Opera and iOS : &lt;a href="https://returnyoutubedislike.com/" rel="noopener noreferrer"&gt;returnyoutubedislike.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>youtube</category>
      <category>tutorial</category>
      <category>news</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Import Google Maps 3D data into Blender</title>
      <dc:creator>Noé C. Michel</dc:creator>
      <pubDate>Sat, 18 Dec 2021 14:32:38 +0000</pubDate>
      <link>https://dev.to/noe/import-google-maps-3d-data-into-blender-2g14</link>
      <guid>https://dev.to/noe/import-google-maps-3d-data-into-blender-2g14</guid>
      <description>&lt;p&gt;&lt;a href="https://www.youtube.com/channel/UCIldsycnma5sHR1VRP38vhg" rel="noopener noreferrer"&gt;Nicko16&lt;/a&gt;, a Blender YouTuber, uploaded in 2020 a short tutorial about how to Import Google Maps 3D Data into Blender, using the RenderDoc Blender add-on. Basicly, it import 3d models and building from google map with &lt;a href="https://github.com/eliemichel/MapsModelsImporter/releases" rel="noopener noreferrer"&gt;MapsModelsImporter&lt;/a&gt; developed by Élie Michel.&lt;/p&gt;

&lt;h2&gt;
  
  
  Video
&lt;/h2&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/F_XsmoZJmG8"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;18th November 2021, UPDATE, I can confirm this is working with: &lt;br&gt;
Blender v2.93.6 &lt;br&gt;
RenderDoc v1.16&lt;br&gt;
MapsModelImporter v0.4.0  &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1462924565055741960-916" src="https://platform.twitter.com/embed/Tweet.html?id=1462924565055741960"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1462924565055741960-916');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1462924565055741960&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;h4&gt;
  
  
  Requirements &amp;amp; useful links
&lt;/h4&gt;

&lt;p&gt;This is the text that you need to add to the Chrome shortcut target field to run it in debug mode (delete the existing contents beforehand):&lt;/p&gt;

&lt;p&gt;&lt;code&gt;C:\Windows\System32\cmd.exe /c “SET RENDERDOC_HOOK_EGL=0 &amp;amp;&amp;amp; START&lt;/code&gt; &lt;code&gt;C:\Program Files (x86)\Google\Chrome\Application\chrome.exe^ –disable-gpu-sandbox –gpu-startup-dialog&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;If your Chrome is installed in a different location to the one above you may need to go in and change parts of this text.&lt;/p&gt;

&lt;p&gt;You can download the MapsModelmporter addon here(MapsModelsImporter-v0.2.1.zip): &lt;a href="https://github.com/eliemichel/MapsMod" rel="noopener noreferrer"&gt;https://github.com/eliemichel/MapsMod&lt;/a&gt;&lt;br&gt;
You can download RenderDoc here: &lt;a href="https://renderdoc.org/" rel="noopener noreferrer"&gt;https://renderdoc.org/&lt;/a&gt;&lt;br&gt;
You can see Elie’s original video here: &lt;a href="https://youtu.be/X6Q7dbtXVZQ" rel="noopener noreferrer"&gt;https://youtu.be/X6Q7dbtXVZQ&lt;/a&gt;&lt;br&gt;
You can download Blender here: &lt;a href="https://www.blender.org/download/" rel="noopener noreferrer"&gt;https://www.blender.org/download/&lt;/a&gt;&lt;br&gt;
we support our best for this free tutorial and scripts for Importing Google Maps 3D Data&lt;/p&gt;

&lt;h4&gt;
  
  
  Conclusion
&lt;/h4&gt;

&lt;p&gt;We tried and actually it perfectly works! It's pretty useful to have an access into the world in 3D whatever your project is. The data is accurate but, as you excepted, it's made of low-poly models so if you are requiring or you need this for close-up (plans), I don't advice you to make it. And of course, it's totally free. &lt;/p&gt;

&lt;p&gt;Let us know your feedback in comment.&lt;/p&gt;

&lt;p&gt;Noé Cabannes-Michel &lt;a class="mentioned-user" href="https://dev.to/noe"&gt;@noe&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tutorial</category>
      <category>beginners</category>
      <category>blender</category>
      <category>3d</category>
    </item>
    <item>
      <title>Verified email badge ? ✅ (2022 updated)</title>
      <dc:creator>Noé C. Michel</dc:creator>
      <pubDate>Sun, 21 Nov 2021 16:13:14 +0000</pubDate>
      <link>https://dev.to/noe/verified-email-badge--4nem</link>
      <guid>https://dev.to/noe/verified-email-badge--4nem</guid>
      <description>&lt;p&gt;&lt;a href="https://www.youtube.com/c/thiojoe" rel="noopener noreferrer"&gt;ThioJoe&lt;/a&gt;, an American Tech YouTuber with over 2,8 million subscribers, revealed in a new video a hidden feature, extremely rare, how to get a badge like the one of "those influencers who think they're cool with their verified badge" on Twitter or Instagram.&lt;/p&gt;

&lt;p&gt;But there is a verified badge that everyone can get and actually nobody has… It's for your email account. &lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1462411741346861057-637" src="https://platform.twitter.com/embed/Tweet.html?id=1462411741346861057"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1462411741346861057-637');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1462411741346861057&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Example of certified badge on Apple Mail client. &lt;em&gt;Credit: ThioJoe&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;You might think if everyone can get one, why is it so rare? The answer is because it's usually hard to setup if you don't know what you're doing, which by the end of the tutorial you will.&lt;/p&gt;

&lt;p&gt;Watch this high-quality step-by-step tutorial on YouTube and understandable even for non-tech-savvy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Video
&lt;/h2&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/3ne0d37cZyc"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;h4&gt;
  
  
  S/MIME certificates
&lt;/h4&gt;

&lt;p&gt;You see these "verified" badges in the email&lt;br&gt;
software are not actually like verified badges on social media. But rather they signify that an email has been sent with a certain security protocol called &lt;code&gt;S/MIME&lt;/code&gt;, which is a feature supported by almost all email clients.&lt;/p&gt;

&lt;p&gt;And I guess it's just rarely used because this level of security is just not really necessary. However, I think once people realize that you can get a super rare badge appearing next to your emails, that might get people's attention.&lt;/p&gt;
&lt;h5&gt;
  
  
  When I found one
&lt;/h5&gt;

&lt;p&gt;What's really funny is the &lt;code&gt;S/MIME&lt;/code&gt; protocol has been around since around 2004. But despite that, I have literally only seen it used ONCE, which was an email from some crypto exchange marketing email. And it had a badge in Apple Mail and immediately my reaction was just... what. is. that. I had never seen it before.&lt;/p&gt;

&lt;p&gt;So I saw that when you click on the thing with a badge, it says "The sender signed this message with a trusted certificate", and I also looked in the Gmail web interface which said something similar, so I knew it wasn't just an Apple thing. And long story short, after quite a bit of digging, I figured out that it uses that &lt;code&gt;S/MIME&lt;/code&gt; protocol I already mentioned, and specifically you need - tech jargon warning, an: &lt;code&gt;S/MIME&lt;/code&gt;&lt;/p&gt;
&lt;h4&gt;
  
  
  What are S/MIME certificates?
&lt;/h4&gt;

&lt;p&gt;Email Certificate from a Root Certificate Authority, sometimes just called an "email certificate". And to answer a few more quick things you're probably wondering: It should not matter what service you use for email, whether Gmail, Verizon, AT&amp;amp;T, Comcast, whatever. Instead what matters is the email client software, such as Outlook, or Apple Mail, whatever.&lt;/p&gt;

&lt;p&gt;Most web interfaces for email services like Gmail do not actually let you add certificates to emails when sending, but if you use Outlook for example to send through Gmail it will work.&lt;/p&gt;

&lt;p&gt;Another thing I'll point out is the person on the other end does NOT need to do anything special for the badge to show up, this is supported by default by almost all email clients. Again it will be presented differently depending on the client, but considering Apple Mail alone on iOS, iPad, and Mac makes up over 50% of the email client market share, most people will see some kind of badge like this one.&lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1462409176387358722-996" src="https://platform.twitter.com/embed/Tweet.html?id=1462409176387358722"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1462409176387358722-996');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1462409176387358722&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;h4&gt;
  
  
  What do they really mean ?
&lt;/h4&gt;

&lt;p&gt;Now before I get into how to get one of these certificates and how to set it up, let me quickly and simply explain what it even is, without getting too technical. And yes, it is important to know so just bear with me.&lt;/p&gt;

&lt;p&gt;In the simplest terms possible, an email certificate is like a two-part digital key (made of a public and a private key) that is tied to your email address.&lt;/p&gt;

&lt;p&gt;You can use the certificate to 'sign' your emails in such a way, that the person receiving the email KNOWS that only the person with that original certificate and the private key could have done so. The purpose of the public key is to send along basically, as an identifier, you can think of it as.&lt;/p&gt;

&lt;p&gt;But here's the other important part of this. You see, anyone can just create their own certificate and say "uh yea I own this email address".&lt;/p&gt;

&lt;h5&gt;
  
  
  Certificate Authorities role
&lt;/h5&gt;

&lt;p&gt;That's where the Certificate Authorities come in. These are companies that make all sorts of other certificates like SSL ones for encrypting websites.&lt;/p&gt;

&lt;p&gt;There are only a handful of these companies relatively speaking, and all of them are universally considered trustworthy and secure by every other company around the world. So what these companies do, is they have their own secret so-called &lt;code&gt;root&lt;/code&gt; certificates, again that is universally recognized, and they can use to sign and verify all sorts of other lesser certificates for anyone who wants one, usually for a price though.&lt;/p&gt;

&lt;p&gt;So in the context of this video, a really easy way to understand it, is what happens is we go to a certificate authority, who first confirms we control some email address like "&lt;a href="mailto:whatever@example.com"&gt;whatever@example.com&lt;/a&gt;".&lt;/p&gt;

&lt;p&gt;Then they issue a signed certificate, so that when we send it along with our emails, then Apple, or Gmail, or whatever service sees it, they'll say "ah an email from &lt;a href="mailto:whatever@example.com"&gt;whatever@example.com&lt;/a&gt;, oh what's this? It included a certificate, well it matches the email address, but that doesn't mean much, anyone could have made this... Oh, wait I see the certificate was signed by XYZ authority who I do trust..."&lt;/p&gt;

&lt;p&gt;Then they'll check, "hey XYZ authority, did you actually sign this certificate?" to which they'll respond "yea I did it's legit before I gave them that certificate I made sure they own that email address."&lt;/p&gt;

&lt;p&gt;And then, the email service will be like 'cool' and show the badge that it was a trusted certificate.&lt;/p&gt;

&lt;p&gt;And just a contrary example, if you were to&lt;br&gt;
just send along some random certificate you made yourself, it would look like this on the other hand, because even though it matches the email, the software has no idea where it came from, so it's basically useless.&lt;/p&gt;

&lt;h4&gt;
  
  
  Requirements
&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;Warning: this is going to get somewhat technical at times. It's not hard once you know the steps, but you'll soon see why I wanted to explain all the certificate stuff before because it will make it easier to follow along if you sort of know what's going on at each step. And think of it this way, maybe it's not a bad thing that it's not easy, because it makes it more exclusive for you.&lt;/em&gt;&lt;/p&gt;

&lt;h6&gt;
  
  
  Step 1 - get a S/MIME Email certificate from a trusted authority
&lt;/h6&gt;

&lt;p&gt;Years ago there were plenty of them offering these certificates for free, so if you were to now search "free &lt;code&gt;S/MIME&lt;/code&gt; email certificates" you'll mostly find older articles, and even an old web page from Comodo who used to offer them, the page is still there, but the links on it are dead and they no longer offer these. And most of the articles and posts I've been reading recently were all saying there is no way to get free certificates anymore, but that is not true.&lt;/p&gt;

&lt;p&gt;I was able to find the last certificate authority that is offering free &lt;code&gt;S/MIME&lt;/code&gt; certificates, and that company is called Actalis.&lt;/p&gt;

&lt;p&gt;They're an Italian certificate authority, but it doesn't matter where they're based, because they're recognized as a root authority globally, that's the whole point. And you can see even on Google's support page listing trusted certificates for &lt;code&gt;S/MIME&lt;/code&gt;, there they are. &lt;a href="https://support.google.com/a/answer/7448393?hl=en" rel="noopener noreferrer"&gt;(Source - Google Workspace)&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And real quick by the way, the reason I emphasized&lt;br&gt;
that they're the last one, is if this video becomes popular enough and a ton of demand appears for these certificates, nothing is guaranteeing they won't start charging in&lt;br&gt;
the future, in which case you'd just have to instead go to the company of your choice and buy one.&lt;/p&gt;

&lt;p&gt;These certificates really aren't expensive anyway, other authorities offer them for only about $20 per year, but still.&lt;/p&gt;

&lt;p&gt;So if you ever need some business services this Actalis company offers, give them a shot. This isn't sponsored or anything, I think we should just support companies that do things we like, like offering free certificates when no one else will.&lt;/p&gt;

&lt;p&gt;OK... with all that being said...&lt;/p&gt;

&lt;p&gt;I mean jeez how long are we into this video and I'm only now starting the walkthrough.&lt;/p&gt;

&lt;p&gt;Well just think of it as filtering out the lazy people, so it's more exclusive for you patient viewers.&lt;/p&gt;

&lt;h5&gt;
  
  
  Get the certificate
&lt;/h5&gt;

&lt;p&gt;So go to Actalis' page where you'll enter the email you want to verify&lt;/p&gt;

&lt;p&gt;&lt;a href="https://extrassl.actalis.it/portal/uapub/freemail?lang=en" rel="noopener noreferrer"&gt;https://extrassl.actalis.it/portal/uapub/freemail?lang=en&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You just type in your email, prove you're not a robot and click send the verification email. After a couple of minutes you should receive it, but be sure to check your spam box too, it went in there for one of mine.&lt;/p&gt;

&lt;p&gt;Now at first, you'll see in the email that it's all in Italian but just scroll down because they included the same text in English too.&lt;/p&gt;

&lt;p&gt;Though all you need is the long verification code anyway, so just copy that, and paste it into the box back on the first page.&lt;/p&gt;

&lt;p&gt;Then you should "obviously" read the different terms and conditions, and if you agree, check those boxes and click Submit Request.&lt;/p&gt;

&lt;p&gt;Next this critically is important, it will now take you to a page with a password, which you'll need to install the certificates on&lt;br&gt;
your devices.&lt;/p&gt;

&lt;p&gt;This password won't be shown to you ever again and can't be recovered, so make sure you save that in a safe place maybe print it out, we will need it shortly.&lt;/p&gt;

&lt;p&gt;But don't just leave it lying around on your desktop either. Because if someone somehow gets hold of your certificate file we'll look at in a second, they could use the password and that together to impersonate your email address.&lt;/p&gt;

&lt;p&gt;Next you can go to your email and wait for the email with your new certificate attached.&lt;/p&gt;

&lt;p&gt;Now this certificate will be valid for 1 year, and then you'll have to get a new one. 1 year might not seem that long but actually it's pretty good. Even if you were to buy one somewhere, they usually max out at 3 years, and a lot of other free ones used to be for like 30 days.&lt;/p&gt;

&lt;p&gt;Also you actually don't want it to be valid forever, because if somehow it got stolen, someone could just impersonate you forever&lt;br&gt;
until you realize it, or they could save it and use it years down the line at the perfect or worst opportunity.&lt;/p&gt;

&lt;p&gt;Whereas if it expires, even if the worst happens and someone is able to steal it, it's only useful to any bad guys for a limited time. However if you do find out it's stolen, you&lt;br&gt;
can actually report it stolen and they can invalidate it so it can't be used anymore. To do that you just use the link in the email along with the User code and Private code listed there.&lt;/p&gt;

&lt;h6&gt;
  
  
  Step 2 - Setup
&lt;/h6&gt;

&lt;p&gt;So download the zip file and extract the pfx&lt;br&gt;
certificate file somewhere you'll remember, and actually give it's own folder, it will make things easier later. You should also probably back it up, but since it's only valid for 1 year, as long as your email service saves your emails at least that a year, you could always just redownload the attachment.&lt;/p&gt;

&lt;p&gt;But again, you will need that password shown to you before. So now that you have your certificate, next we need to install it on our devices.&lt;/p&gt;

&lt;p&gt;First I'm gonna do on Windows and Outlook, and then on your iOS or mac for Apple Mail, since those are by far the most popular clients. Unfortunately the Gmail web client does not let you attach a certificate to get this verified thing. To be clear again though, that's just the gmail web interface, if you have a gmail email address it's fine, you just have to send the email with supporting software like Outlook or Apple mail or something.&lt;/p&gt;

&lt;p&gt;Alright now no matter what email client you're gonna use, even if you just want to use this on your phone, you'll still need to install this on Windows first, and I'll show you why in a second.&lt;/p&gt;

&lt;p&gt;To install it, just double click the pfx file you downloaded, and select 'current user', then click next.&lt;/p&gt;

&lt;p&gt;Here it will already have the file location entered so you can click next again, and here is where you need to enter the certificate password, which is the one from that page. On the import options, the only one you might want to change, if you want to change the password later, is to check the box to enable&lt;br&gt;
"Mark this key as exportable".&lt;/p&gt;

&lt;p&gt;I'm not going to get into how to re-export the key and all that, that's something you can look up by yourself.&lt;/p&gt;

&lt;p&gt;And that's because as the file is delivered here, it should work on all the devices.&lt;/p&gt;

&lt;p&gt;You might also choose the option that makes you enter the password every time you want to use it, but that might be a pain, so it's up to you, I didn't bother.&lt;/p&gt;

&lt;p&gt;Also I want to be clear the settings you choose are only going to apply on this Windows computer, it's not changing the certificate file in any way, it's just importing it into Windows with these settings.&lt;/p&gt;

&lt;p&gt;On the next page, just let it automatically select the certificate store, hit next, then finish, and it should say import was successful.&lt;/p&gt;

&lt;h6&gt;
  
  
  Step 3 - Get the intermediate certificates for the authority
&lt;/h6&gt;

&lt;p&gt;Next, before we configure our email clients, there is one more important step that might be necessary for certain software, which is to get the intermediate certificates for the authority, but don't worry it's way easier than it sounds.&lt;/p&gt;

&lt;p&gt;In the start menu just type &lt;code&gt;certificate&lt;/code&gt; and click the result called &lt;code&gt;Manage User Certificates&lt;/code&gt;. There's another one called &lt;code&gt;manage computer certificates&lt;/code&gt;, but that's different the one we're looking for is not going to show up in there.&lt;/p&gt;

&lt;p&gt;Now this will bring up a window showing any other certificates for the user, which there are many for all sorts of purposes, but we want to go to &lt;code&gt;Personal&lt;/code&gt;, then &lt;code&gt;Certificates&lt;/code&gt;, and look for the one that has our email address.&lt;/p&gt;

&lt;p&gt;If for some reason there's others in there that mentions your email address, just look for the one that says issued by Actalis, and also the expiration date is exactly 1 year from today when you registered it, plus or minus a day because of time zones.&lt;/p&gt;

&lt;p&gt;So double click the correct certificate and then go to the &lt;code&gt;Certification Path&lt;/code&gt; tab. This shows basically the &lt;code&gt;chain of custody&lt;/code&gt;(you can think of it) of signatures on your certificate, leading back to the root authority.&lt;/p&gt;

&lt;p&gt;Our is at the bottom, which was actually signed by an intermediate certificate, which was in turn signed by the root certificate. And yes this will become relevant it wasn't&lt;br&gt;
a useless tangent, but for now we need to actually export the intermediate certificate for later, you'll see why then.&lt;/p&gt;

&lt;p&gt;So click to highlight the middle one, then click &lt;code&gt;View Certificate&lt;/code&gt;, and go to the &lt;code&gt;Details&lt;/code&gt; tab.&lt;/p&gt;

&lt;p&gt;And also drag this window to the side a bit&lt;br&gt;
so it's not on top of the other one, you'll want to be able to read off the bottom one. So in this new window, click 'Copy to File', then click Next, then keep the default format and click next again, and it will ask you where to save it.&lt;/p&gt;

&lt;p&gt;Just browser to wherever you have the main&lt;br&gt;
&lt;code&gt;pfx&lt;/code&gt; file and put it in the same place just so they're together, that's why I suggested to give it's own folder. And for the name, you can just read off the window below and name the file the same as the certificate to make it easy. Then just hit next, then finish, and it will say successful.&lt;/p&gt;

&lt;h6&gt;
  
  
  Optionnal step
&lt;/h6&gt;

&lt;p&gt;Now this next bit probably isn't actually be necessary, but I would just do it anyway, which is to do the same thing and export the root certificate also, which is the top one in the chain. Then just put it the folder with the other two and name it as the root name.&lt;/p&gt;

&lt;p&gt;That way you have a copy of the whole chain just in case, but you'll realistically only need the middle one and your personal one.&lt;/p&gt;

&lt;h4&gt;
  
  
  Step 4 - Configuring the email client
&lt;/h4&gt;

&lt;p&gt;Alright now we're getting to the good part. At this point we have all the certificates ready to go and organized, so we can actually get into actually configuring the different software to send those emails.&lt;/p&gt;

&lt;h5&gt;
  
  
  For Outlook
&lt;/h5&gt;

&lt;blockquote&gt;
&lt;p&gt;If you use Apple Mail for Mac or Apple Mail for iOS, skip this part and scroll down.&lt;br&gt;
Don't work with neither Outlook for Web nor Windows mail app.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;So now let's configure Outlook to send signed&lt;br&gt;
emails.&lt;/p&gt;

&lt;p&gt;And I'm using Office 365 Outlook specifically, which is the latest version but it should be basically the same for Outlook 2019 and 2016.&lt;/p&gt;

&lt;p&gt;Alright so in Outlook I'm assuming you already connected outlook to your email account so you can send emails from outlook and stuff like that.&lt;/p&gt;

&lt;p&gt;After you do that, go to the top left and click File &amp;gt; &lt;code&gt;Options&lt;/code&gt; at the bottom &amp;gt; Trust Center &amp;gt; &lt;code&gt;Trust Center Settings&lt;/code&gt; button &amp;gt; Email Security.&lt;/p&gt;

&lt;p&gt;The first thing to do is go through a few checkbox options.&lt;/p&gt;

&lt;p&gt;Here, make sure you DO check "Send clear text signed message when sending signed messages".&lt;/p&gt;

&lt;p&gt;This basically makes it like a regular email, we just send the signature along with it, so if the recipient's client for some reason doesn't support &lt;code&gt;S/MIME&lt;/code&gt; protocol, it's no big deal, they'll still be able to read it.&lt;/p&gt;

&lt;p&gt;Finally, if you want to enable signing emails automatically by default, at least for email addresses that have certificates, you can check "Add digital signatures to outgoing messages", but I would hold off on that for now until you've tested it out and made sure everything works first.&lt;/p&gt;

&lt;p&gt;Now what we need to do is click the settings button here.&lt;/p&gt;

&lt;p&gt;The window it pops up will probably be all blank the first time, but if it's not, such as if you're doing this for multiple emails, or maybe there's some other existing security policy in there, if there is, be sure to first click &lt;code&gt;New&lt;/code&gt;, which will create a new separate entry we can use.&lt;/p&gt;

&lt;p&gt;And in that case, if there was an existing one and you click New, the previous entry will be still available through the dropdown.&lt;/p&gt;

&lt;p&gt;Otherwise if you don't click new and just start changing stuff, it would overwrite your existing entry, which you don't want.&lt;/p&gt;

&lt;p&gt;In any case though, once you have a new blank entry, type in a name to make it easy to identify, like your email address then &lt;code&gt;email certificate&lt;/code&gt; or something like that.&lt;/p&gt;

&lt;p&gt;Then Uncheck the top checkbox talking about default security setting.&lt;/p&gt;

&lt;p&gt;We don't want these as default, just for their corresponding email accounts.&lt;/p&gt;

&lt;p&gt;Now, next to where it says 'Signing Certificate', click choose.&lt;/p&gt;

&lt;p&gt;This will bring up a window to select the certificate, you might have to click "more choices", but just look for the same certificate we've been using, which has your email address in it.&lt;/p&gt;

&lt;p&gt;Because we installed it to our Windows profile, it should be right in there, so click to select the right one, make sure it the info at the top is for the correct one, and then click OK.&lt;/p&gt;

&lt;p&gt;Ok this next bit is important so pay attention.&lt;/p&gt;

&lt;p&gt;You'll see it has filled in the rest of the boxes, but where it says "hash algorithm", we need to change that to "SHA256". If you keep it on SHA1, which is an outdated algorithm, it will work for some email software like Apple Mail, but for others it might not.&lt;/p&gt;

&lt;p&gt;In Gmail for example if you use SHA1, it will say "The signature uses an unsupported algorithm. The digital signature is not valid". Which is obviously not good, so make sure these are set to SHA256 and AES 256 Bit.&lt;/p&gt;

&lt;p&gt;Finally, make sure the bottom check box is enabled, the one talking about sending the certificates.&lt;/p&gt;

&lt;p&gt;I think it is on by default, just double check.&lt;/p&gt;

&lt;p&gt;Now we can just click OK on all the windows to go back down, and we are finally ready to test it out!&lt;/p&gt;

&lt;p&gt;So go to your inbox, click New Email, just make sure it's from the right one we just set up. Then add whatever text to the subject and body, this is just going to be a test email to yourself or another email account you have.&lt;/p&gt;

&lt;p&gt;But before you click send, we have to choose to sign it. This can be found at the top in the &lt;code&gt;Options&lt;/code&gt; tab, then look for the &lt;code&gt;Sign&lt;/code&gt; icon that looks like this ribbon. When you click it, it, will darken to show it's enabled, and you're ready to send!&lt;/p&gt;

&lt;p&gt;Before the moment a truth, a couple notes here. If you want to add the Sign button to the main tab for easier access like I did here, just right click the ribbon menu and hit &lt;code&gt;customize ribbon&lt;/code&gt;, then on the right, click &lt;code&gt;New Group&lt;/code&gt; to make a custom group, name it what you want, then on the left, just go to the dropdown to All Commands and scroll down to where you&lt;br&gt;
see the Sign icon.&lt;/p&gt;

&lt;p&gt;Now I have a second orange one which some other software added as a plugin, just ignore that.&lt;/p&gt;

&lt;p&gt;So just make sure the custom group is selected on the right, then click the 'Sign' icon on the left, and hit "Add", then OK. Now it should be right there always easily accessible on the main tab.&lt;/p&gt;

&lt;p&gt;Second note, you will have to remember to click and enable the &lt;code&gt;sign&lt;/code&gt; button for every email you send.&lt;/p&gt;

&lt;p&gt;You can go back to that other setting I showed you before, which will make it enabled by default, then if that's enabled, you can individually select when not to sign.&lt;/p&gt;

&lt;p&gt;Third note, if you do set up multiple certificates with multiple emails, outlook will automatically sign the emails with the correct one for that address, so you don't have to pick which certificate to use every time, it does it automatically.&lt;/p&gt;

&lt;p&gt;And now with that being said, we can click &lt;code&gt;Send&lt;/code&gt; and see what happens. If you sent it to yourself, you'll probably see it show up right in Outlook, and it will have a similar looking ribbon to the right of it.&lt;/p&gt;

&lt;p&gt;If it's a Gmail address, you can also look at the Gmail web interface and make sure it shows up right there too, with the green check. Although unfortunatelly you have to click the dropdown to see the green check, but whatever better than nothing.&lt;/p&gt;

&lt;p&gt;And you can also look on your phone, like Apple mail, and there it should show the check all good. It's also good to check it on your phone because you can be sure it shows up on devices even without any extra certificates installed yet, so you know it will show on everyone elses too.&lt;/p&gt;

&lt;p&gt;Note that on iPhone it will say it was signed with a trusted certificate, but if you click &lt;code&gt;view certificate&lt;/code&gt; it will actually say "Not Trusted". That's not a problem, that just means you personally have not installed that certificate on the phone, but obviously it's still signed by a trusted root certificate so it got the check mark and everything.&lt;/p&gt;

&lt;p&gt;What that feature is basically if you and your friend or someone created your own certificates, you can choose to trust them even if they weren't signed by an authority.&lt;/p&gt;

&lt;h5&gt;
  
  
  For an iOS Device
&lt;/h5&gt;

&lt;p&gt;Alright now let's move on to setting this&lt;br&gt;
up on an iOS device which should not take as long, we already did most of the legwork at the computer.&lt;/p&gt;

&lt;p&gt;To get the certificates to your phone, the easiest thing to do is email them to yourself. So take all three from the folder, and attach them to an email to yourself, then just open the email on your iphone.&lt;/p&gt;

&lt;p&gt;First we can install the personal certificate simply by clicking the attachment, and then just choose to install it on the iPhone. Then you need to go into the Settings app, and near the top you'll see a new thing that says "Profile Downloaded", so click into that.&lt;/p&gt;

&lt;p&gt;It should say something like "Identity Certificate", and will probably say "not signed" in red, which is fine we'll fix that. So just click Install, then type in your passcode. Click install again at the top, and then install yet again at the bottom.&lt;/p&gt;

&lt;p&gt;And now it will ask you for that password from before, so type that in. Then you click Next, and it will say "Profile&lt;br&gt;
Installed", so click Done. We're not done yet, but you can find the installed certificates or profiles on iOS, if you go to Settings &amp;gt; General &amp;gt; Profiles. In here notice how if you click into the profile we just installed, it says "Not Verified". That's because for some dumb reason, the iPhone doesn't fetch the intermediate certificate, whereas windows did, so we didn't have to worry about it before.&lt;/p&gt;

&lt;p&gt;If you were to try and send an email now without installing the intermediate certificate, it would actually show up to the other person like this, all in red, with a thing that says "Unstrusted Signature", not a good look, that's worse than nothing at all.&lt;/p&gt;

&lt;p&gt;The solution is really easy though, just go back to the email with the attachements, and click the attachment for the intermediate certificate, which is probably called "Actalis Client Authentication CA G3" or whatever you called it, and do the same thing as before. Click it, install it to the iphone, go to settings, install it from the 'profile downloaded' thing at the top, and it should not require any kind of password because this is a public certificate.&lt;/p&gt;

&lt;p&gt;You'll also notice that this one will probably say "Verified" in green unlike the other one that's red, and that's because this one was actually signed by the root certificate directly, which is preinstalled on basically every device, because it's a root, that's the point.&lt;/p&gt;

&lt;p&gt;And also, now that this one is installed, if you go into your personal certificate profile again, this time it should indeed say "Verified" in green, because now the phone has the whole chain, so it can verify it originally came from the root certificate.&lt;/p&gt;

&lt;p&gt;One quick important question you might have, is "wait a minute, if I had to install the intermediate certificate to make it show up as trusted, won't anyone I send an email to have to do that to on their phone?" and the answer is no. As long as you, the sender, have the whole chain installed, the phone sends the whole chain along with it in the email, so it doesn't matter if it's installed on the receiving device.&lt;/p&gt;

&lt;p&gt;So yes, it is stupid that the phone couldn't get the intermediate certificate automatically when you installed it, when windows can, but whatever.&lt;/p&gt;

&lt;p&gt;I'll also point out that I believe all of these free certificates issued by Actalis have the same intermediate certificate, you&lt;br&gt;
should only have to install that one once on your phone, even if you add more personal certificates for more email addresses.&lt;/p&gt;

&lt;p&gt;Of course you'll want to double check that.&lt;/p&gt;

&lt;p&gt;Also like I've said a couple times, you really should not have to install the third root certificate, but it's still good to check&lt;br&gt;
anyway.&lt;/p&gt;

&lt;p&gt;Alright so now that the certificates are installed,&lt;br&gt;
there's one more step, which is to enable the signing on outgoing emails. To do that, go back to Settings &amp;gt; Mail &amp;gt; Accounts&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Click the relevent one you're setting up &amp;gt; Click 'Account' again &amp;gt; Then 'Advanced'. Here near the bottom you'll see some options under &lt;code&gt;S/MIME&lt;/code&gt;. Click on 'Sign', and make sure you select&lt;br&gt;
the correct certificate for the email address if there are multipl certificate options there. Then toggle the thing to enable signing, and now it should say 'Yes' in the previous one next to sign. Also make sure that next to 'Encrypt by Default'&lt;br&gt;
that says No. We do not want that for our purposes and might&lt;br&gt;
not work at all depending on the recipient's device.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Finally I would just go into your other email accounts and make sure it didn't for some reason enable Signing for any other ones besides the one we just did. It shouldn't have, but just check a couple to make sure they say No.&lt;/p&gt;

&lt;p&gt;And now, we are again ready for the moment of truth. So go back to the Mail app, go into the relevant email account, compose an email and just send it to yourself, and it should come through&lt;br&gt;
and have a check mark next to it. And here's anothing thing, every time you set up a certificate on a new device, make sure you send a test email AND look at the test email on all your other devices. That way you can make sure nothing went wrong&lt;br&gt;
either on the sending side, or any receiving sides.&lt;/p&gt;

&lt;p&gt;The example I gave before, was in Outlook, I had the wrong hash algorithm set, and while it showed up fine in Apple Mail (it didn't care about the outdated algorithm), in Gmail it did give that error, so just check everywhere to be sure.&lt;/p&gt;

&lt;p&gt;Because we just set it up on iPhone, I will point out that on Mac the process is basically the same, you just open the email with the certificates, then you choose to install it to &lt;code&gt;Sign In&lt;/code&gt;, not iCloud like it has by default. For some reason for me it won't work with iCloud. However, for me, my Mac actually did sync&lt;br&gt;
the certificates from my phone to my mac automatically, so you might not even need to install them, you can check.&lt;/p&gt;

&lt;p&gt;Once they're installed on your Mac, now when you go to compose an image, by default you'll see a verification badge on the right next to the subject line to show it will be signed, which you can click to disable if you want. If you're on an android device it should really be a similar process to iPhone, where generally you just open the attachments for the certificates, click them to install them, then it's just a matter of whether your email app will support it.&lt;/p&gt;

&lt;p&gt;And of course no matter what email app you're using, you can just look up the instructions for how to enable signing. And like I said, I don't believe Gmail supports sending with &lt;code&gt;S/MIME&lt;/code&gt; either on Desktop interface, or the Gmail mobile apps.&lt;/p&gt;

&lt;p&gt;So now that you know how to get the badge&lt;br&gt;
set up on your email accounts, the last thing I want to point out is that if you do this on a work email account or work computer, I'm not totally sure if this will work all the time.&lt;/p&gt;

&lt;p&gt;For example, if your email is managed through an Azure Directory or something like that, they might have Microsoft Outlook set on all computers to disable those &lt;code&gt;S/MIME&lt;/code&gt; settings. At the same time, you might still be able to do it on your phone even if it's a work email.&lt;/p&gt;

&lt;p&gt;I really have no idea whether that's something companies can restrict, but I'm just pointing it out as a possibility, because I do know some companies actually use &lt;code&gt;S/MIME&lt;/code&gt; internally. Anyway though, hopefully now all of you learned something new.&lt;/p&gt;

&lt;p&gt;And I bet least a few of you are going to get some questions by people about how you got that cool checkmark next to your email. Be sure to give this post a like and also follow me because I make new videos every week, and let me know what you think in the&lt;br&gt;
comments.&lt;/p&gt;

&lt;p&gt;Noé C. Michel - &lt;a class="mentioned-user" href="https://dev.to/noe"&gt;@noe&lt;/a&gt; &lt;br&gt;
With ThioJoe - youtube.com/c/ThioJoe&lt;/p&gt;

</description>
      <category>tutorial</category>
      <category>beginners</category>
      <category>youtube</category>
      <category>video</category>
    </item>
  </channel>
</rss>
