Browsed by
Category: Reviews

iPod Story From The Trenches

iPod Story From The Trenches

The pursuit of hardening your operational security, removing and obfuscating your personal information, and employing tactics to enhance your privacy is a marathon, not a sprint. It takes time, careful planning, patience, an adventurous spirit, and a willingness to learn new skills. Some dabble a bit with their new found enthusiasm for these topics, and others commit to considerable lifestyle changes for the long haul.  I am always impressed and humbled when people I have met decide to make changes…

Read More Read More

Countdown To Capture

Countdown To Capture

This post may seem like a brief departure from my usual thoughts and discussions on digital operational security and identity management. I know that many followers of this blog are members of law enforcement, criminal and private investigators, and online researchers who also have a genuine interest in topics related to privacy. Recently, I began following a high profile investigation from the west coast which is fascinating to me for several reasons. Peter Chadwick is wanted for murdering his wife,…

Read More Read More

COMSEC – Released!

COMSEC – Released!

I have a brand new book that was just released.  It is co-written with Justin Carroll and is a comprehensive look at communications security measures (COMSEC).  Here is a explanation from the back cover… The most prolific, comprehensive, and intrusive mass surveillance device ever designed by man is the cellular phone you carry with you everywhere you go. This device tracks and collects a staggering amount of personal information. That valuable data is sold and stored indefinitely by an equally…

Read More Read More

Review: The Stranger In The Woods

Review: The Stranger In The Woods

“How many things there are that I do not want”. – Socrates, Circa 425 B.C. “When you enjoy solitude, you are never alone”. – Christopher Knight   I recently returned from one of several road trips I take each year. Vacations are important to me to maintain sanity and return refreshed and refocused on life’s priorities. Each trip is always an “off the grid vacation”, where I do my best to not leave a digital trail of where I have…

Read More Read More

MySudo – Update!

MySudo – Update!

The blog has been neglected recently, I know. Thanks for all your emails and enthusiasm about staying informed on all things privacy! The past few months have kept me busy, teaching for private organizations, working with clients, and even writing a book. Every day is a new opportunity to learn more and to share more about these important topics and from morning to night I am staying on top of it all in addition to my day job. In this…

Read More Read More

Self-Stalking

Self-Stalking

Those of us who are dedicated to removing our personal information from the Internet know that this effort is a constant battle. Experts in this field estimate that there are hundreds of relevant people search engines alone, and when you include the smaller sites that seem to pop up each week, the numbers could be in the thousands. Public records like property tax information, marriage licenses, and vehicle information are collected by the largest data brokers on each of us….

Read More Read More

MAT: Metadata Anonymisation Toolkit

MAT: Metadata Anonymisation Toolkit

How to remove file metadata for your privacy on Linux. In a previous article, I discussed how metadata embedded in images can jeopardize your privacy and reveal personal information about you. Care should be taken when sharing and posting photos, and the same can be said about the documents you share with others. A typical data file often has associated “metadata” which is descriptive information about the file such as the creator’s name, tools used to generate the file, file…

Read More Read More

“Verify” your contacts

“Verify” your contacts

The majority of people I communicate with are using either Signal or Wire as their preferred method of communication.  Both offer extremely secure, end-to-end encrypted communications and I have reviewed those services in previous posts about my communications strategy.  Many of you have adopted a similar strategy for yourselves and I applaud your efforts to make all your communications more private and secure. Recently, I decided to “verify” all of my contacts that use either Signal or Wire.  Both services…

Read More Read More

Standard Notes: Review

Standard Notes: Review

A big part of my digital workflow has always included using some sort of note taking application.  I like to keep track of thoughts, links, and projects I am working on by making notes and referring back to them from time to time.  A variety of information is kept in the form of notes on my computer and phone, ranging from mundane to potentially critical pieces of information that could be exploited if it fell into the wrong hands.  I…

Read More Read More

Phone Strategy: Update

Phone Strategy: Update

Last year I wrote an article (here) which detailed a way to set up your phone strategy with enhancements to privacy & security in mind.  Since that time, I have received numerous emails with questions and feedback on the solutions I set up.  I decided to post an update to my strategy and highlight some of the changes I have made over the past year.  I am going to leave the original article untouched so that readers can compare the…

Read More Read More