The title explains it pretty well, now is your time for action. A court recently forced the FCC to open and review public comments on the issue again. This time, the focus is on the impact to public safety, low income Americans, and broadband infrastructure. So we'll have to try keep comments focused on those … Continue reading FCC forced to reopen net neutrality comments
Category: OC
Dangers of facial recognition
I'm sure from the title alone you realize this isn't going to be a feel good story. In recent news the activity of Clearview AI has come to light. It contains a database of faces from social media. You know, that thing where you upload photos of yourself with your full name and where you … Continue reading Dangers of facial recognition
Encryption back doors
We want everyone's home locks to be master keyed so that law enforcement can open anyone's door with the same key right? We're all ok with compromising our security a bit, to allow law enforcement to catch the four horsement of the infoclaypse (terrorists, drug dealers, pedophiles, and organized crime) right? Would it make you … Continue reading Encryption back doors
In the spirit of things…
Breaches & hacks happen, mitigate their impact.
Better than your typical generic hoodie hacker I'm sure if you follow this blog, or even if you don't, you realize that things get hacked and compromised all the time. At some point we have to ask ourselves what we can do about it. There are a couple options. You could stop using technology all … Continue reading Breaches & hacks happen, mitigate their impact.
DoH controversy
DoH So, I'd like to talk about DNS over HTTPS here to give my views on the topic. It has been making some news recently because Mozilla has added the ability to use it in their Firefox browser and Google is implementing it as well. As a result, Comcast has recently been trying to fight … Continue reading DoH controversy
Smartphone OS Choices
I think it is safe to say that in today's society most of us have a smartphone. Unfortunately, that usually means giving up quite a bit of data in order to use one. There are options to reduce the amount of data you hand over of course. You can tweak the settings and permissions as … Continue reading Smartphone OS Choices
Denied for someone else’s views
This month I'm just going to discuss briefly a recent article about the use of social media at the border and how people are being denied entry to the USA based on what their friends' views may be. Think about it for a bit. People are being denied entry because of something a friend posted … Continue reading Denied for someone else’s views
Data value
This month I decided to write a little bit about the value of data. It has surpassed oil as the most valuable resource in the world. Just let that sink in for a moment. The most valuable resource in the world is YOU. Specifically, your browsing/likes/interests/location/dob/etc. Now, think about how much regulation there is around … Continue reading Data value
The breach problem
I was inspired to talk about our data breach problem today due to a recent article. As I'm sure many of you are aware, there have been and continue to be many data breaches from various companies. They hardly ever get covered by mainstream media unless they're huge, because honestly it would be absolutely exhausting … Continue reading The breach problem
Staying updated in privacy
Security concept: pixelated words Privacy on digital background, 3d render Staying up to date with privacy issues can be difficult. So I'm going to cover a few resources that I've found helpful. If you like podcasts, then The Privacy, Security, & OSINT Show is for you. It's the best podcast I've found to stay up … Continue reading Staying updated in privacy
End-To-End Encryption
ProtonMail, Signal, OpenVPN, Nextcloud So this will be a quick touch-base on end-to-end encryption. When we talk about privacy, the last thing I want to do is talk about which company I trust with my privacy. So that's where end-to-end encryption comes into play. With end-to-end encryption, you don't have to trust the provider as … Continue reading End-To-End Encryption
From Google to Nextcloud
If you care about your privacy online and off, you should try to minimize your use of the big players in the data-mining business. These include Facebook, Twitter, Google, Amazon, and Microsoft. There are typically good alternatives to all of these, but today we'll talk mostly about Google. Google is most well know for their … Continue reading From Google to Nextcloud
Email’s Problems
Protonmail & Blur Email is a flawed protocol. It's the digital equivalent to sending a post card in the mail. The mailman can read your postcard, as can everyone between the origin and the destination. It is prone to getting spam and junk since it's a single address. Once spam/junk senders get a hold of … Continue reading Email’s Problems
Pi-hole + PiVPN = Awesome
Pi-Hole gives you lots of ad blocking feel-goods