Censorship and Propaganda-Part 1 how they work

We are currently living in the information era. Intelligence on every single subject is readily available at the click of a button. As information is what amounts to the most critically important resource for our survival, both individually and as a society, the development of technology that led to the general accessibility of that information […]

VPNs and Tor-How to Internet works and how to protect oneself while exploring it

Have you ever watched a video and then suddenly the youtuber in the middle of his spiel on why K-On! is the representation of a perfect utopia when suddenly “this is why I use this x brand VPN”? Yeah, so do I. VPNs are largely presented as a perfect way to be safe on the […]

CrowdStrike: the dangers of cloud-based security as a service.

Yeah, after that debacle it was pretty obvious to anyone knowing me that I would have to give my two cents on that subject.I will begin this article by asking you to share it with your friends, family and the people you know because this will touch, in layman’s terms, about a phenomenon taking place […]

Vectors of Attacks: Know thy Enemy

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”-Sun Tzu, The Art of War […]

On Basic Android Security and Anonymity Part 4-The Ghost Protocol

Welcome back. Have you begun developing those good habits we have discussed in the last article? I certainly hope so. However, in this final part of our Android Security series, we will be diving directly in the white rabbit’s hole, into a level of opsec that is probably going to feel largely overkill for the […]

On Basic Android Security and Anonymity Part 3-Good Habit

Welcome back! Have you had fun with the apps we have installed last time? I am sure there is still some things that will require adjustment, and that is fine. Which is why this time, we will be going over developing some good behavior and habits with our android phones. But before I go on, […]

On basic Android Security and Anonymity Part 2-The Apps

We are following the last article, which introduced us to the settings of our android phone and how to, with the limit of what is being provided to us as is, limit as much as possible our security and breach of anonymity risks without installing or uninstalling anything. This was already a great step in […]

On basic Android Security and Anonymity Part 1-The Settings

Hello everyone! It has been a while since I wrote anything in here. The last few months have been…hectic to say the least and I had to prioritize some stuff. Let me start this year with a banger of an article shall we? You may have been thinking that your phone’s security and degree of […]

Announcing a small project

So our friends at https://wolflinux.com/ and I will be working on a fun little project. It is tied to computer security so stay tuned! But what about SIP? We are very much so still working on releasing SIP-1 do not worry about this, and expect a full article in the next 24h on smartphone security […]

Establishing a Methodology and a Threat Model

As we begin to dive deeper into a better understanding of security and anonymity, and start applying what we will learn together here, it becomes important to establish certain rules for ourselves. Now, as I wish this process to apply both for your various devices and to your real life identity, this small guide will […]

 
Clicky