What’s a Rich Text element?
The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.
Static and dynamic content editing
A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text element to that field in the settings panel. Voila!
How to customize formatting for each rich text
Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.
What Is Juice Jacking and How Does OSOM Prevent It?
Privacy and security are so deeply linked they empower one another. At OSOM, we build hardware and software with both specifically in mind. This is why we are introducing a new type of charging cable with the Solana Saga. With a flip of a single switch, you can disconnect the cable’s data lines, ensuring your phone only receives power when it's plugged into a charging receptacle.
What is Juice Jacking?
The FBI and FCC have issued warnings regarding a kind of hypothesized attack they call "juice jacking." In their words, this is an attack where "bad actors can load malware onto public USB charging stations to maliciously access electronic devices while they are being charged." This means that, when you plug a device into a power source, rather than simply being topped up as expected, something on the other end of that receptacle is actually trying to steal your data or install malware. If you ever use a public USB port — for example at hotels, airplanes, coffee shops, etc. — you don’t know what (or who) is on the other end of it.
How, you may ask, can someone else hack my information through a power outlet? The port you’re plugging into may not just supply power. That’s because your phone also uses USB for data transmission. When you plug in a thumb drive, webcam, keyboard, or other accessories, certain pins aren’t just pumping power over the cable. The pins also transmit data so these accessories work. Some devices, like recent smartphones, have tools that attempt to mitigate this by disabling USB data transmission in software when connected to an unfamiliar device. But these are software solutions that could be subject to their own vulnerabilities.
Fortunately, hypothesized juice jacking attacks are themselves reliant on the expected presence of data-transmitting pins to operate.
Privacy and Security at the Flip of a Switch
The privacy cable we ship with the Solana Saga has a single simple feature: Toggle a switch, and the data-delivering pins inside the USB cable are physically disconnected and unable to function, while the pins to power up your device still work. Without that connection, hardware on the other end of the connection, malicious or otherwise, is unable to communicate with your device. It can continue to supply power, but it can’t “talk” to your Saga — or other phone, tablet, or laptop). Since the disconnection that happens is at the physical level, no one can try to “hack” the cable back open through software — you’re in control.
For added peace of mind, we’ve included an LED that flashes when data is being transmitted, so even if you don’t have the toggle flipped, you should have an idea when something on the other end of your cable is trying to “talk” to your phone.
There are charging-only cables out there that don’t have the required data pins, but then you’re left unable to connect your Saga to your computer or other accessories, and that means you have to carry two separate cables. So-called “data blockers” or more humorously named “USB condoms” also exist as accessories you can plug onto the end of a cable to disconnect the data pins, but they’re small dongles that are very easily lost. Building this functionality directly into the cable means that privacy and security come at no loss of convenience — and we think that’s OSOM.
Privacy is power, own your privacy.