Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]

Categories
Data Security TECH & CYBERSECURITY

10 Internet Safety Rules

Keep Personal Information Professional and Limited Keep Your Privacy Settings On Practice Safe Browsing Use a Secure VPN Connection Be Careful What You Download and Where You Download From Choose Strong Passwords and Enable 2 Factor Authentication Make Online Purchases From Secure and Trusted Sites Be Careful What You Post Be Careful Who You Meet […]

Categories
TECH & CYBERSECURITY

Privacy-Focused Messenger Signal is Ready To Take On Whatsapp

Signal continues to experience a stunning growth rate as the Play Store reveals that Signal has been downloaded between 10 million and 100 million times already. Combined with founder Moxie Marlinspike’s statement that more than 40% of Signal users are on iOS, you get a respectable (but still comparatively small) number. Of course, the foundation […]

Categories
TECH & CYBERSECURITY

The Best Password Guide: Updated!

Hi, how are you? Today i would like to update a post i did a few years ago and so here we are. First before i start the post, there will be links down below for those interested in protecting themselves, families, businesses and their data from hackers. If you are in a hurry take […]

Categories
LIFE TECH & CYBERSECURITY

Tor, Proxychains and VPNs

Debunked! Hey guys! How are you doing? I am back with another post. Today i want to debunk, and explain how Tor and Proxy chains work. What they are. And how to truly become anonymous. Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Hacker/Cybersecurity/I.T Jargon Explained

Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Official Tor Browser Launched on The Play Store

First stable version of the Tor browser for Android IS now available on Google Play Store On May 22nd 2019, the Tor Project released the stable version of Tor Browser for Android on Google’s Play Store, which is now available as a free download. For those unaware, Tor is a network technology that preserves users’ […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Kenya’s Cyber Insecurity

Hey guys, i am back again with another article, and today i want to touch a bit on Kenya’s Cybersecurity issue. Most of us have heard the NEWS, Kenya has a major cybersecurity issue. Kenya has the highest internet penetration in Africa with over 31 million people having access to the internet, according to a […]

Categories
TECH & CYBERSECURITY

The Apps Ajulu Uses On His Android Phone: Nokia 6 2017

Hey guys, how are you doing? It’s Ajulu’s Thoughts back again with another post: The Apps Ajulu Uses On His Android Phone(Nokia 6 2017) Now a brief intro to who Ajulu is and his device specs. Ajulu is the founder, author and editor in chief of Ajulu’s Thoughts. A tech blog that has been steadily […]

Categories
TECH & CYBERSECURITY

Privacy, Anonymity and Security: The Wonderful Threes Part 1

Hi guys, how are y’all doing? Today we will talk about privacy, anonymity and security. As i mentioned in the previous post The Password Guide. Edward Snowden the guy who aired out the dirty laundry of several large corporations, who are reading, seeing and hearing every piece of data in the world. And i know […]

Categories
TECH & CYBERSECURITY

Privacy, Security and Anonymity Mini Guide & Links

Security Policies and Resources   A list of resources for the security conscious tech-users. Operation security, incident response and help guides. Just right click on any link and open in a new tab. Make sure to bookmark this site for reference.   Info-Sharing Classification   Red Alert List (Don’t Share)   Passwords Real, full (family) […]