Browsed by
Author: HFTI

Eliminating The Phone Bill

Eliminating The Phone Bill

I have an announcement to make.  I am no longer going to pay a cell phone bill.  The savings will be significant and I am excited about that. Last month was the last time I visited my carrier’s retail store to make a payment on my pre-paid account, and I don’t anticipate returning ever again. Readers here know that I use my phone in a very non-traditional manner. I have written about that strategy at length in two different articles…

Read More Read More

Standard Notes: Review

Standard Notes: Review

A big part of my digital workflow has always included using some sort of note taking application.  I like to keep track of thoughts, links, and projects I am working on by making notes and referring back to them from time to time.  A variety of information is kept in the form of notes on my computer and phone, ranging from mundane to potentially critical pieces of information that could be exploited if it fell into the wrong hands.  I…

Read More Read More

Podcast 054 – WiFi Security

Podcast 054 – WiFi Security

This week I sat down with Justin to discuss best practices for setting up your Wi-Fi network, managing networks on your devices, and using (or NOT using) untrusted networks. SHOW NOTES: INTRO EFF on Intel Management Engine, Purism Complete Disables IME Purism Partners with NextCloud for Librem 5 Facebook Wants Your Nude Photos Authy for Desktop
 / Signal for Desktop MAIN TOPIC Setting up your Wi-Fi network •    SSID Naming – Wigle.net  / Wigle SSID Stats •    Encryption •    Remote…

Read More Read More

Children’s Online Privacy Protection Act

Children’s Online Privacy Protection Act

In a previous article I discussed how people who qualify as a public official or law enforcement officer can reference State laws in their letters to data brokers and people search websites to assist them with removing their personal information.  If you are a qualified individual who can utilize these laws to help achieve faster compliance and more advanced opt-outs, I encourage you to articulate this in the letters and emails you send to companies who are exposing your personal…

Read More Read More

Podcast 051 – Snail Mail Control

Podcast 051 – Snail Mail Control

A while back I shared my collection of links to take control your mail (HERE).  If you have not yet visited that article, I highly recommend taking the time to rearrange how your mail is handled, remove yourself from marketing lists, and compartmentalize your address as part of an overall strategy to reduce how often your real name and physical address are used together.  This past week I recorded another podcast with co-host Justin Carroll to discuss these mail control…

Read More Read More

Podcast 050 – Privacy Round Table

Podcast 050 – Privacy Round Table

This week I sat down with friends Jason, Jesse, Michael and Justin for a round-table discussion of privacy and security issues.  Had a lot of fun talking about current privacy issues and also reviewing the last fifty episodes of The Complete Privacy & Security Podcast.  Something in here for everyone, so take a listen! Play below or Subscribe at: RSS / iTunes / Google / Stitcher Listen to previous episodes at https://privacy-training.com/podcast.html  

For The Rookies

For The Rookies

I often tell people that learning about privacy and security is like going to a salad bar.  When you attend a live training about these subjects or begin to explore the large number of topics that are related to this endeavor, it can be a bit overwhelming.  With so many options and choices to consider, how does a person decide where to begin?  Hence the salad bar analogy.  There are decisions to made at every turn along the way.  What…

Read More Read More

The Equifax Debacle

The Equifax Debacle

Here is the latest information from reputable sources on the massive Equifax breach from this past week.  I encourage everyone to review the information, stay informed, and take proactive steps to protect your personal information.  A recent podcast about this breach is embedded below which discusses important actions a person can take, and also a free credit freeze tutorial is included in the notes below.  Unfortunately, this latest breach will not be the last. Breach at Equifax May Impact 143M…

Read More Read More

Phone Strategy: Update

Phone Strategy: Update

Last year I wrote an article (here) which detailed a way to set up your phone strategy with enhancements to privacy & security in mind.  Since that time, I have received numerous emails with questions and feedback on the solutions I set up.  I decided to post an update to my strategy and highlight some of the changes I have made over the past year.  I am going to leave the original article untouched so that readers can compare the…

Read More Read More

Metapho: App Review

Metapho: App Review

I wanted to do a quick review for a useful iOS app that I have been using for a while now.  Metapho allows you to view, edit, and remove the metadata from your photos before sharing them.  It should come as no surprise that anytime someone sends me a photo, I check it for metadata.  I am curious who among my contacts has location services enabled on their phone.  Many of the people I associate with are also privacy conscious,…

Read More Read More