Self-Stalking

Self-Stalking

Those of us who are dedicated to removing our personal information from the Internet know that this effort is a constant battle. Experts in this field estimate that there are hundreds of relevant people search engines alone, and when you include the smaller sites that seem to pop up each week, the numbers could be in the thousands. Public records like property tax information, marriage licenses, and vehicle information are collected by the largest data brokers on each of us….

Read More Read More

MAT: Metadata Anonymisation Toolkit

MAT: Metadata Anonymisation Toolkit

How to remove file metadata for your privacy on Linux. In a previous article, I discussed how metadata embedded in images can jeopardize your privacy and reveal personal information about you. Care should be taken when sharing and posting photos, and the same can be said about the documents you share with others. A typical data file often has associated “metadata” which is descriptive information about the file such as the creator’s name, tools used to generate the file, file…

Read More Read More

“Verify” your contacts

“Verify” your contacts

The majority of people I communicate with are using either Signal or Wire as their preferred method of communication.  Both offer extremely secure, end-to-end encrypted communications and I have reviewed those services in previous posts about my communications strategy.  Many of you have adopted a similar strategy for yourselves and I applaud your efforts to make all your communications more private and secure. Recently, I decided to “verify” all of my contacts that use either Signal or Wire.  Both services…

Read More Read More

Privacy Milestones 2017

Privacy Milestones 2017

Last year at this time (2016), I wrote about my Privacy Resolutions for the upcoming year and some goals that I hoped to accomplish in the pursuit of better personal OPSEC.  I encouraged others to reflect and identify new areas to focus on that could improve their stance on privacy over the next 12 months. Some of the areas I chose to focus on this past year included re-reading and studying “the basics”, many of which are outlined in The…

Read More Read More

PODCAST 058 – New To Privacy? Start Here

PODCAST 058 – New To Privacy? Start Here

Privacy is a huge topic and knowing where to start can be overwhelming. This week Justin Carroll and I sit down to discuss how to overcome analysis paralysis and develop a plan to reclaim your right to privacy. Subscribe at: RSS iTunes Google Stitcher SHOW NOTES   INTRO Follow-up on our Wi-Fi episode Article about Wi-Fi probing System76 Linux Laptops MAIN TOPIC Understanding the threats to your privacy The concept of compartmentalization Defining your privacy priorities and privacy non-negotiables Managing…

Read More Read More

Eliminating The Phone Bill

Eliminating The Phone Bill

I have an announcement to make.  I am no longer going to pay a cell phone bill.  The savings will be significant and I am excited about that. Last month was the last time I visited my carrier’s retail store to make a payment on my pre-paid account, and I don’t anticipate returning ever again. Readers here know that I use my phone in a very non-traditional manner.  I have written about that strategy at length in two different articles…

Read More Read More

Standard Notes: Review

Standard Notes: Review

A big part of my digital workflow has always included using some sort of note taking application.  I like to keep track of thoughts, links, and projects I am working on by making notes and referring back to them from time to time.  A variety of information is kept in the form of notes on my computer and phone, ranging from mundane to potentially critical pieces of information that could be exploited if it fell into the wrong hands.  I…

Read More Read More

Podcast 054 – WiFi Security

Podcast 054 – WiFi Security

This week I sat down with Justin to discuss best practices for setting up your Wi-Fi network, managing networks on your devices, and using (or NOT using) untrusted networks. SHOW NOTES: INTRO EFF on Intel Management Engine, Purism Complete Disables IME Purism Partners with NextCloud for Librem 5 Facebook Wants Your Nude Photos Authy for Desktop
 / Signal for Desktop MAIN TOPIC Setting up your Wi-Fi network •    SSID Naming – Wigle.net  / Wigle SSID Stats •    Encryption •    Remote…

Read More Read More

Children’s Online Privacy Protection Act

Children’s Online Privacy Protection Act

In a previous article I discussed how people who qualify as a public official or law enforcement officer can reference State laws in their letters to data brokers and people search websites to assist them with removing their personal information.  If you are a qualified individual who can utilize these laws to help achieve faster compliance and more advanced opt-outs, I encourage you to articulate this in the letters and emails you send to companies who are exposing your personal…

Read More Read More

Podcast 051 – Snail Mail Control

Podcast 051 – Snail Mail Control

A while back I shared my collection of links to take control your mail (HERE).  If you have not yet visited that article, I highly recommend taking the time to rearrange how your mail is handled, remove yourself from marketing lists, and compartmentalize your address as part of an overall strategy to reduce how often your real name and physical address are used together.  This past week I recorded another podcast with co-host Justin Carroll to discuss these mail control…

Read More Read More