Use Tor (Encrypted Browser, Proxy and Protocol).Use Tails (Secure OS).Use Signal (Secure Messaging App).Use Burner Emails.Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network).Don't Log In Unnecessarily.Use Private Browsing Modes.Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule).Disable Telemetry Everywhere When Possible.Pair a VPN with something else, … Continue reading 10 Anonymity Rules
Keep Personal Information Professional and LimitedKeep Your Privacy Settings OnPractice Safe BrowsingUse a Secure VPN ConnectionBe Careful What You Download and Where You Download FromChoose Strong Passwords and Enable 2 Factor AuthenticationMake Online Purchases From Secure and Trusted SitesBe Careful What You PostBe Careful Who You Meet OnlineKeep Your Operating System and Software Up To … Continue reading 10 Internet Safety Rules
Signal continues to experience a stunning growth rate as the Play Store reveals that Signal has been downloaded between 10 million and 100 million times already. Combined with founder Moxie Marlinspike’s statement that more than 40% of Signal users are on iOS, you get a respectable (but still comparatively small) number. Of course, the foundation … Continue reading Privacy-Focused Messenger Signal is Ready To Take On Whatsapp
Hi, how are you? Today i would like to update a post i did a few years ago and so here we are. First before i start the post, there will be links down below for those interested in protecting themselves, families, businesses and their data from hackers. If you are in a hurry take … Continue reading The Best Password Guide: Updated!
What is Data Security? is the process of keeping data secure and protected from not only unauthorized access but also corrupted access. The main focus of data security is to make sure that data is safe and away from any destructive forces. Data is stored as rows and columns in its raw form in the … Continue reading Basic Data Security
If you look online for VPN apps you’ll find quite a lot of them all over the place. However, while virtual private networks are mostly used by people looking to remain anonymous on the internet, a lot of VPN apps, particularly free ones, actively undermine that very basic aim by tracking or logging your browsing … Continue reading ProtonVPN Is Now the World’s First Fully Open Source VPN App
Debunked! Hey guys! How are you doing? I am back with another post. Today i want to debunk, and explain how Tor and Proxy chains work. What they are. And how to truly become anonymous. Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic … Continue reading Tor, Proxychains and VPNs
First stable version of the Tor browser for Android IS now available on Google Play Store On May 22nd 2019, the Tor Project released the stable version of Tor Browser for Android on Google’s Play Store, which is now available as a free download. For those unaware, Tor is a network technology that preserves users’ … Continue reading Official Tor Browser Launched on The Play Store
Hey guys, how are you doing? It's Ajulu's Thoughts back again with another post: The Apps Ajulu Uses On His Android Phone(Nokia 6 2017) Now a brief intro to who Ajulu is and his device specs. Ajulu is the founder, author and editor in chief of Ajulu's Thoughts. A tech blog that has been steadily … Continue reading The Apps Ajulu Uses On His Android Phone: Nokia 6 2017
Hey guys, we are back again with another informative post. Which hat do you think fits you or that friend you know knows hacking? To start is to define a hacker: A hacker is a person with specific skill sets, they use to access computers/laptops/servers/data/information without anyone knowing or gaining authorization/a password. Now there are … Continue reading Types of Hackers: Which Hat Fits You?
Hi guys, how are y'all doing? Today we will talk about privacy, anonymity and security. As i mentioned in the previous post The Password Guide. Edward Snowden the guy who aired out the dirty laundry of several large corporations, who are reading, seeing and hearing every piece of data in the world. And i know … Continue reading Privacy, Anonymity and Security: The Wonderful Threes Part 1
Security Policies and Resources A list of resources for the security conscious tech-users. Operation security, incident response and help guides. Just right click on any link and open in a new tab. Make sure to bookmark this site for reference. Info-Sharing Classification Red Alert List (Don't Share) Passwords Real, full (family) … Continue reading Privacy, Security and Anonymity Mini Guide & Links