Browsed by
Category: Identity Management

Information Removal: A Strategic Approach

Information Removal: A Strategic Approach

INTRODUCTION: When a person starts out on the quest to remove as much personal information about themselves that they find online, the effort usually begins with a “shotgun approach”. You begin searching Google to identify links to websites that display your information. Hopefully you’ll also search Bing and other search engines in the same manner, and use targeted search techniques and operators to pinpoint your information quickly. I have previously discussed many useful techniques for pinpointing your searches and saving…

Read More Read More

Dis’root’ – Calendar & Contact Syncing

Dis’root’ – Calendar & Contact Syncing

One of the questions I get asked most often via email or during a training session is, “how to you sync calendar and contact information if you are not using Google anymore?” News flash…Google is not the only place that can store, sync, and organize your digital content like calendars and contacts. Since completely abandoning Google, I have never looked back. I absolutly have a need to keep track of my schedule and to keep track of contact information…but I…

Read More Read More

The Creepy Line

The Creepy Line

An eye-opening documentary, The Creepy Line reveals the stunning degree to which society is manipulated by Google and Facebook and blows the lid off the remarkably subtle – hence powerful – manner in which they do it. Movie Details: https://www.thecreepyline.com The Creepy Line is a title taken from the words of former Google CEO Eric Schmidt, when during a 2010 interview he explained Google’s code of conduct: “The Google policy on a lot of things is to get right up…

Read More Read More

PRIVACYTOOLS.IO

PRIVACYTOOLS.IO

Privacytools.io continues to be one of my go-to places to research the latest tools and alternative resources to incorporate into my daily work flow. Whenever I consider if there may be a more private or secure way of doing something on my computer or with the software choices I am currently using, I will check privacytools.io for recommendations and insight. The website is very well organized, informative, and updated frequently with reviews and alternative solutions to explore. The website has…

Read More Read More

NCOPD Podcast Interview

NCOPD Podcast Interview

Episode 9: Learning to “Hide from the Internet” Recently I sat down with Jordan Smith from NCOPD, a podcast dedicated to military leadership and self development. We discussed digital security considerations in military and civilian communications.  Listen to my ramblings on these topics and check out the show notes below.  Thanks Jordan for the discussion and here’s to a great new year for you and your listeners! Privacy Tools Recommendations: MySudo | Wire | Signal | KeepPassXC | MiniKeePass |…

Read More Read More

Removals That Require More Effort

Removals That Require More Effort

 Many of my readers are law enforcement employees who put a lot of effort into removing personal information from online search results. I find that some people who spend a lot of time with this effort often will skip contacting some of the larger data brokers or investigative databases to also request removal. Suppressing your information from these larger data bases is often only available for qualified individuals like law enforcement, judges, public officials to name a few. Civilians who…

Read More Read More

iPod Story From The Trenches

iPod Story From The Trenches

The pursuit of hardening your operational security, removing and obfuscating your personal information, and employing tactics to enhance your privacy is a marathon, not a sprint. It takes time, careful planning, patience, an adventurous spirit, and a willingness to learn new skills. Some dabble a bit with their new found enthusiasm for these topics, and others commit to considerable lifestyle changes for the long haul.  I am always impressed and humbled when people I have met decide to make changes…

Read More Read More

Expanding The Circle Of Trust

Expanding The Circle Of Trust

“Accept the things to which fate binds you, and love the people with whom fate brings you together, but do so with all your heart” -Marcus Aurelius This past week I finished up my final training trip for 2018. It was a busy year to say the least and I am so thankful for all of the opportunities I had to circumnavigate the country and share information that I am passionate about with so many of you. In addition to…

Read More Read More

Alias Amazon Account

Alias Amazon Account

Early on when I committed to making all of my purchases anonymously, one of the big hurdles I had to figure out was how to order from Amazon.  Privacy seekers routinely face this same challenge because so much of the shopping people do nowadays is through Amazon. One day I hope to move away from using Amazon entirely, but until that day comes I will need to utilize an account, make payments, and receive shipments as anonymously as possible and…

Read More Read More

Disinformation (Updated)

Disinformation (Updated)

Based on my experience, many of you will be successful at removing most, if not all of your personal information from the Internet.  You will need patience, due diligence, and a willingness to learn how “the system” works and the many methods that are available to keep your information hidden from public sources.  By changing your habits you can keep your personal details hidden and enjoy being invisible with a much higher level of security and protection from data breaches…

Read More Read More