📅 November 26, 2019

An Easier and Faster Way to Spoof the MAC Address of Your Mac

an easy and fast way to spoof the MAC address of your Mac computer.

A couple of weeks ago FSM published a tutorial, showing you how to spoof the MAC address of your computer.  The tutorial also explains why you should consider spoofing the MAC address.

The only problem with the tutorial, at least for (some/most?) Mac users, is that it shows you how to spoof the MAC address using the terminal. And that stands against everything that’s holy and sacred in the macOS world. The it just works philosophy does not apply anymore. Let’s fix it…

Enter LinkLiar, an app that just works….

Continue reading “An Easier and Faster Way to Spoof the MAC Address of Your Mac”

📅 November 6, 2019

A VPN is NOT a Privacy Tool and It Won’t Make You Anonymous

A VPN won’t make you anonymous on the internet, that’s just marketing bullshit. Don’t believe the hype!

No, this is not a VPN provider ad disguised as an article. In fact, I won’t even hint at using a specific provider.

This is just an article that aims to bust some myths about what a VPN will do for you. I will do my best to describe why and when you should use a VPN. Simple as that. No hidden ad. I promise.

Continue reading “A VPN is NOT a Privacy Tool and It Won’t Make You Anonymous”

📅 October 26, 2019

Two-Factor Authentication: What is 2FA and Why You Should Use It?

Your online accounts are vulnerable if you don’t use 2FA.

We all have dozens of online accounts. All of them require a password. Complex and unique. Password re-use is a huge problem with large data breaches becoming more and more common these days, with billions of data records lost or stolen since 2013.

Earlier this year hackers were passing around  a gargantuan, unprecedented collection of 2.2 billion unique usernames and associated passwords.

With such a huge number of data breaches, do you think that there’s a slight chance at least one of your accounts was among them?

If anybody tried to log in to your account before you had a chance to change your password, the only thing that would save you would be two factor authentication ( 2FA ).

Continue reading “Two-Factor Authentication: What is 2FA and Why You Should Use It?”

📅 October 13, 2019

HOW TO: Watch YouTube and Keep Your Subscriptions Without Ads and Google’s Tracking

all the youtube glory without ads, tracking and annoyances

Ditching Google and all its services is not that hard. Except for YouTube and Maps. At least that’s the case for most users.

However, some users don’t know that they can still use YouTube without using YouTube. Confused?

You can still watch YouTube videos and have all of your subscriptions but without Google’s tracking, without cookies, ads, bypass georestrictions and other annoyances. Intrigued?

Jump over the break to learn more…

Continue reading “HOW TO: Watch YouTube and Keep Your Subscriptions Without Ads and Google’s Tracking”

📅 October 7, 2019

VeraCrypt Updated to v1.24

VeraCrypt, the free and open source disk encryption software, updated to v1.24

VeraCrypt was updated to v1.24 .VeraCrypt is a free and open source disk encryption software for macOS Linux and Windows. You can download VeraCrypt 1.24 here.

If you’re new to VeraCrypt, you can check our beginner’s guide to Veracrypt.

Jump over the break to check out the changelog:

Continue reading “VeraCrypt Updated to v1.24”

📅 October 7, 2019

HOW TO: Spoof Your MAC Address

How to easily spoof your MAC address on macOS, Linux and Windows.

If you’re looking to keep your online identity anonymous, a step in the right direction would be to change the unique MAC address of your computer every time you connect to a network.

Continue reading “HOW TO: Spoof Your MAC Address”

📅 September 22, 2019

HOW TO: Turn On Automatic HTTPS Upgrade in Safari on iOS 13

How to turn on automatic HTTPS upgrade in Safari on iOS 13

In iOS 13 go to Settings>Safari>Advanced>Experimental Features> turn on Automatic HTTPS upgrade.

HTTPS is a protocol that provides secure Internet transactions between web browsers and web sites. You can check to see if the web page you are visiting uses HTTPS by making sure that the URL at the top of your browser begins with HTTPS rather than HTTP. The “S” stands for secure. Some browsers also indicate that you are using a secure connection by displaying a closed lock in the corner of the browser.

HTTPS protects users from certain kinds of Internet surveillance. By encrypting your connection, HTTPS prevents eavesdroppers from seeing the contents of your communication with a website, including potentially sensitive data such as the contents of your email and chats, login credentials, search terms, and credit card numbers. Many sites support the use of HTTPS, but may not turn it on by default. Other sites have failed to implement HTTPS at all.

Learn more about HTTPS here.

ALSO READ HOW TO: Enable HTTPS Only Mode in Firefox

📅 February 15, 2019

Riot.im is Out of Beta. Free, Open Source, Chat Client Based on Matrix

Riot.im is out of beta. Riot.im is a free, open source and decentralized chatting platform based on the Matrix protocol for real-time communication offering end-to-end encryption. It can bridge other communications via others protocols such Slack or IRC, and it’s available cross-platform ( including web browsers ). For more info check out the official webpage.

PS: while we at it, here’s why you don’t want to use Slack.

PS2: for everything else there’s Signal.

📅 February 5, 2019

Whonix: The Beginner’s Guide

So what the hell is Whonix?

Whonix is a desktop operating system designed for advanced security and privacy. Whonix mitigates the threat of common attack vectors while maintaining usability. Online anonymity is realized via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP address leaks. Commonly used applications are pre-installed and safely pre-configured for immediate use. The user is not jeopardized by installing additional applications or personalizing the desktop. Whonix is under active development and is the only operating system designed to be run inside a VM and paired with Tor.

Jump over the break to learn how to get whonix up and running….

Continue reading “Whonix: The Beginner’s Guide”