The Equifax Debacle

Here is the latest information from reputable sources on the massive Equifax breach from this past week.  I encourage everyone to review the information, stay informed, and take proactive steps to protect your personal information.  A recent podcast about this breach is embedded below which discusses important actions a person can take, and also a […]

Phone Strategy: Update

Last year I wrote an article (here) which detailed a way to set up your phone strategy with enhancements to privacy & security in mind.  Since that time, I have received numerous emails with questions and feedback on the solutions I set up.  I decided to post an update to my strategy and highlight some […]

Metapho: App Review

I wanted to do a quick review for a useful iOS app that I have been using for a while now.  Metapho allows you to view, edit, and remove the metadata from your photos before sharing them.  It should come as no surprise that anytime someone sends me a photo, I check it for metadata. […]

Voter Records

On June 12, 2017, media outlets in the U.S. began reporting the news that information on over 200 million registered voters was accidentally exposed online due to poor security measures.  The data, which was stored on a publicly accessible cloud server, included 1.1 terabytes of unsecured personal information including names, dates of birth, addresses, phone […]

Sharing A Cell Phone Number

During a recent trip out of town, I met with a real estate broker to inquire about home prices in the area and also get a contact for a local attorney who may be able to help with purchasing property in a non-traditional, private manner.  The broker I met worked for a well known firm, […]

Mobile App Collection

In this post I will summarize some of the mobile apps that I have chosen as part of my strategy for a more secure and private communications platform.  I have reviewed several of these in previous posts, however I am frequently asked for recommendations and a list of what my current set up consists of.  […]

Podcast Interview

I wanted to take a moment to remind readers about the Complete Privacy & Security Podcast, hosted by Michael Bazzell and Justin Carroll.  This weekly podcast tackles many privacy & security related topics in depth and also answers listener questions on a regular basis.  As of this week, there are 30 episodes and every single […]

Staying Informed

“The future is not some place we are going, it is one we are creating. The paths are not to be found, they are to be made.  And the activity of making them changes both the creator, and the destination.”  – John H. Schaar If you are passionate about any topic, you know the value […]

Silent Pocket: Faraday Sleeve

Today’s article is a review of a product I have been using for a few weeks now that I really enjoy.  The company Silent Pocket has a faraday sleeve that comes is a variety of sizes, perfect for cell phone use.  If you are not familiar with a faraday bag/sleeve, it is used to instantly […]

Anonymous Purchase: Example

I can’t remember the last time a piece of mail or a package arrived at my home that was addressed to my real name with my real address.  The mailbox collects dust, and I enjoy checking it periodically just to confirm that once again, the junk mail is nonexistent. Occasionally a piece of mail will […]

Security Guide: iOS 10

Security consultant, author, and fellow blogger, Justin Carroll, has started releasing a series of free blog posts focused on securing Apple’s latest mobile operating system, iOS 10.  He is making this information available to everyone and asked that in return, you share his posts with people you know and ask questions through his blog if […]

Privacy Resolutions

With the New Year approaching, many people make resolutions to accomplish new goals and develop positive habits that will move their lives forward.  One of mine is to continue to exercise more and to eat fewer cookies.  Exercise is already a habit for me, and the toughest part will be to cut down on the […]

Sudo Privacy App: First Look

I have spent the past month testing out a new app, Sudo, for use as an additional tool in the privacy toolbox and so far I am excited about what I have seen.  Digital Trends provided a bit of background which I will summarize for you here as we take a look at how this […]

Social Engineering

When a person reaches the point where they have eliminated the vast majority of their personal data from online sources, it brings a certain sense of comfort and fulfillment of a job well done.  If you are able to remove your information from those hard to reach, specialized databases then you have gone further than […]

Gear Review: Anti-Surveillance

Today’s post will cover a couple quick gear recommendations that may enhance your secure and private digital lifestyle.  As time goes on, I plan to include suggestions and reviews on software, apps, and fun things that I have used as part of my set up.  In the past I reviewed Signal – Private Messenger, and […]

Digital Hoarding

When you ask a hoarder why they are hoarding whatever it is they have an unusual abundance of; they will tell you, “it’s a collection”.  No, it is not a collection of anything.  It is a problem!  While on the job I have walked into homes where there was an obvious hoarding problem.  The worst […]

Photo EXIF Data

More digital photos will be taken this year than were taken on film in the entire history of the analogue camera business.  Estimates vary on the total number of photos that will be shared this year between worldwide users, between 2-3 trillion depending on how you crunch the numbers.  Some researchers estimated even higher and […]

The Complete Privacy & Security Podcast

I am happy to announce that privacy and security experts Michael Bazzell and Justin Carroll are now co-hosting a podcast to compliment and provide updates to their book.  If you are serious about the topics we discuss here, you need to be studying The Complete Privacy & Security Desk Reference.  They plan to provide a […]

Help For Parents

“A child born today will grow up with no conception of privacy at all.  They’ll never know what it means to have a private moment to themselves, an unrecorded, unanalyzed thought.  And that’s a problem because privacy matters; privacy is what allows us to determine who we are and who we want to be.” – […]

National Cyber Security Awareness Month

October is National Cyber Security Awareness Month.  National Cyber Security Awareness month has been observed in the US since 2004.  It is sponsored by the Department of Homeland Security’s National Cyber Security Division, and the National Cyber Security Alliance (NCSA).  This year a fellow blogger and mentor, Justin Carroll, decided to get in on the […]

Only Crooks Change Their Phone Number

Introduction: Secure and private cellular communications is a fascinating topic to research.  When the contract on my personal cell phone account expired recently, I chose to use that as an opportunity to change up my communication strategy.  Of course, privacy and security were a top priority in developing the new system.  I am not hiding […]

Signal – Private Messenger

Signal – Private Messenger by Open Whisper Systems is a free and open source software application that employs end-to-end encryption, allowing users to send end-to-end encrypted group, text, picture, and video messages and have encrypted phone conversations between Signal users on iPhone and Android.  Although Signal uses telephone numbers as contacts, calls and messages actually […]

Address Protection (PT 2)

In PART 1 of this series on Address Protection we discussed the importance of separating your real name from your physical address.  We also touched on mail control methods and ways to deal with previous addresses found in search results.  Take the time to review PART 1 and follow the links that were provided to […]

Compartmentalization

Compartmentalization is the limiting of access to information to persons or other entities who need to know it in order to perform certain tasks.  The concept originated in the handling of classified information in military and intelligence applications.  The basis for compartmentalization is the idea that, if fewer people know the details of a mission […]

Privacy Workflow

Those of us who have chosen to safeguard our privacy and take digital security to another level know that it requires changing our habits and being more situationally aware.  This awareness extends from the digital world and into the physical world as well.  Operational security is a constant assessment of your threat model, and can […]

Electronic Frontier Foundation

The Electronic Frontier Foundation (EFF) is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. They work to ensure that rights and freedoms are enhanced and protected as our use of technology […]

Email Privacy

Email in general is not a secure method of communicating.  Free email accounts are free to use because you are the product.  Your personal information, contacts, the contents of your messages, and the meta data associated with your communications are very valuable to companies who monetize that data.  All of the major free email providers […]

Anonymous Purchases

The normal process of making a purchase for goods and services reveals a lot of data.  Merchants collect names, addresses, phone numbers, email addresses, and anything else they can get you to provide for their marketing purposes and for building a profile on you.  They also have your credit or debit card information that links […]

Address Protection (PT 1)

Protecting You Home Address Separating your real name from your home address is extremely important.  Home is where you and your family can be located, and anyone who Google’s your name may be able to find you easily.  Most people’s home address can be found on over 40 different websites within a minute.  This represents […]

Become A Student Of The Game

If you have decided that hiding from the Internet, or your physical and digital security are important to you, then you need to begin making decisions that support those goals.  Not every method or technique is appropriate for everyone and you need to assess your threat model to determine what conveniences you are willing to […]

Telling Lies

In general, people are pretty good at telling lies.  People lie to their significant others, their bosses, their co-workers, and friends.  They even lie to the authorities.  Lying comes naturally for most people, especially when the lie will help protect them from a perceived negative consequence.  I am not a psychologist, but after spending many […]