One Thing To Do Today: Threat Model Part 2, Who is the threat anyway?
In the early 2000’s I marked some time as a Usability and Human Factors Professional, drawing on neglected novelist within to
Read moreIn the early 2000’s I marked some time as a Usability and Human Factors Professional, drawing on neglected novelist within to
Read moreOption 1: You know something can go wrong. “They” can get you …THEM…today it will be in some new way that
Read moreTL;DR Use ImageOptim or one of their recommendations to remove EXIF data off pictures before they go up on the
Read moreTL;DR – Protonmail, Tutanota rank as the easiest to use “secure” free email as service options. Might also consider Fastmail in conjunction
Read moreTL;DR If a device has a connection to a network, it needs a frequent update schedule. Computational devices on
Read moreTL;DR: Set StartPage or DuckDuckGo as the default search on your browser. Put the other in the bookmarks bar. Search engines know what we look for,
Read moreTL;DR: A VPN is a narrow tool. Use them accordingly. Virtual Private Networks evolved to connect remote workers into their organization’s network
Read moreI have a new friend. It’s the scripted voice on clickclickclick.click, a website keeping me company as I write this
Read moreLet’s do something super simple today. Turn off default image loading in your email client or settings. HTML emails can
Read moreTL; DR Install the EFF sponsored chrome extension HTTPs Everywhere or look into a browser like Brave. The letters HTTP stand for
Read moreTL:DR Sign up for Crashplan with the option of managing your own keys. The SFMUNI was able to tell the
Read moreIn honor of #opencybermonday, it seems to be a good moment to point out that security minded folks tend to also
Read more