📅 November 6, 2019

A VPN is NOT a Privacy Tool and It Won’t Make You Anonymous

A VPN won’t make you anonymous on the internet, that’s just marketing bullshit. Don’t believe the hype!

No, this is not a VPN provider ad disguised as an article. In fact, I won’t even hint at using a specific provider.

This is just an article that aims to bust some myths about what a VPN will do for you. I will do my best to describe why and when you should use a VPN. Simple as that. No hidden ad. I promise.

Continue reading “A VPN is NOT a Privacy Tool and It Won’t Make You Anonymous”

📅 October 26, 2019

Two-Factor Authentication: What is 2FA and Why You Should Use It?

Your online accounts are vulnerable if you don’t use 2FA.

We all have dozens of online accounts. All of them require a password. Complex and unique. Password re-use is a huge problem with large data breaches becoming more and more common these days, with billions of data records lost or stolen since 2013.

Earlier this year hackers were passing around  a gargantuan, unprecedented collection of 2.2 billion unique usernames and associated passwords.

With such a huge number of data breaches, do you think that there’s a slight chance at least one of your accounts was among them?

If anybody tried to log in to your account before you had a chance to change your password, the only thing that would save you would be two factor authentication ( 2FA ).

Continue reading “Two-Factor Authentication: What is 2FA and Why You Should Use It?”

📅 October 7, 2019

VeraCrypt Updated to v1.24

VeraCrypt, the free and open source disk encryption software, updated to v1.24

VeraCrypt was updated to v1.24 .VeraCrypt is a free and open source disk encryption software for macOS Linux and Windows. You can download VeraCrypt 1.24 here.

If you’re new to VeraCrypt, you can check our beginner’s guide to Veracrypt.

Jump over the break to check out the changelog:

Continue reading “VeraCrypt Updated to v1.24”

📅 October 7, 2019

HOW TO: Spoof Your MAC Address

How to easily spoof your MAC address on macOS, Linux and Windows.

If you’re looking to keep your online identity anonymous, a step in the right direction would be to change the unique MAC address of your computer every time you connect to a network.

Continue reading “HOW TO: Spoof Your MAC Address”

📅 September 22, 2019

HOW TO: Turn On Automatic HTTPS Upgrade in Safari on iOS 13

How to turn on automatic HTTPS upgrade in Safari on iOS 13

In iOS 13 go to Settings>Safari>Advanced>Experimental Features> turn on Automatic HTTPS upgrade.

HTTPS is a protocol that provides secure Internet transactions between web browsers and web sites. You can check to see if the web page you are visiting uses HTTPS by making sure that the URL at the top of your browser begins with HTTPS rather than HTTP. The “S” stands for secure. Some browsers also indicate that you are using a secure connection by displaying a closed lock in the corner of the browser.

HTTPS protects users from certain kinds of Internet surveillance. By encrypting your connection, HTTPS prevents eavesdroppers from seeing the contents of your communication with a website, including potentially sensitive data such as the contents of your email and chats, login credentials, search terms, and credit card numbers. Many sites support the use of HTTPS, but may not turn it on by default. Other sites have failed to implement HTTPS at all.

Learn more about HTTPS here.

ALSO READ HOW TO: Enable HTTPS Only Mode in Firefox

📅 February 12, 2019

Passphraseme: A Quick and Simple Way to Generate High Entropy Passphrases

Passphraseme is a quick and simple cryptographically secure script to generate high entropy passphrases using the Electronic Frontier Foundation’s wordlists, including their fandom-inspired wordlists.

Continue reading “Passphraseme: A Quick and Simple Way to Generate High Entropy Passphrases”

📅 February 5, 2019

Whonix: The Beginner’s Guide

So what the hell is Whonix?

Whonix is a desktop operating system designed for advanced security and privacy. Whonix mitigates the threat of common attack vectors while maintaining usability. Online anonymity is realized via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP address leaks. Commonly used applications are pre-installed and safely pre-configured for immediate use. The user is not jeopardized by installing additional applications or personalizing the desktop. Whonix is under active development and is the only operating system designed to be run inside a VM and paired with Tor.

Jump over the break to learn how to get whonix up and running….

Continue reading “Whonix: The Beginner’s Guide”

📅 December 10, 2018

HOW TO: Encrypt Your Emails

Like it or not we need to start using encryption in everyday tasks. Privacy is a fundamental right and “I have nothing to hide” is a bullshit argument for not using encryption and has nothing to do with privacy. Most of us, 99% of the time, have nothing to hide, but that doesn’t mean we should give everything away, for free, on a silver fucking platter.

Email encryption is easy, and you won’t have to spend a dime as we’re going to use only free and open source tools.

Continue reading “HOW TO: Encrypt Your Emails”

📅 July 2, 2018

Cryptee: A Cross Platform, Encrypted Home for Your Private Documents and Photos

Cryptee is a cross platform, encrypted and secure home for your private documents, notes, files and photos.

You should know by know that it’s important to encrypt your files before uploading them to the cloud. But still, most people, are using services like iCloud, Dropbox and/or Evernote without any concern because they’re “convenient”.

If you’re one of those people you might want to take a look at Cryptee –  a cross platform, encrypted and secure home for your private documents, notes, files and photos.

Continue reading “Cryptee: A Cross Platform, Encrypted Home for Your Private Documents and Photos”

📅 April 2, 2018

This is How Dark Patterns Trick You Online [video]

here’s how dark patterns trick you online

The world wide web is a tricky place. Websites take advantage of “dark patterns” to trick users into doing things they might not want to do in order to benefit the website/service in question. Disguised ads, hidden costs or forced continuity are just some examples of “dark patterns”.

Continue reading “This is How Dark Patterns Trick You Online “