10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol).Use Tails (Secure OS).Use Signal (Secure Messaging App).Use Burner Emails.Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network).Don't Log In Unnecessarily.Use Private Browsing Modes.Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule).Disable Telemetry Everywhere When Possible.Pair a VPN with something else, … Continue reading 10 Anonymity Rules

10 Internet Safety Rules

Keep Personal Information Professional and LimitedKeep Your Privacy Settings OnPractice Safe BrowsingUse a Secure VPN ConnectionBe Careful What You Download and Where You Download FromChoose Strong Passwords and Enable 2 Factor AuthenticationMake Online Purchases From Secure and Trusted SitesBe Careful What You PostBe Careful Who You Meet OnlineKeep Your Operating System and Software Up To … Continue reading 10 Internet Safety Rules

Top 15 Essential Open Source Security Software and Tools

Hey everyone? How are you? Today i would like to touch on security by listing(with links) The Top Open Source Security Tools i personally recommend. Many of these tools can be used by anyone. So let's hop in! Notice: If you are interested in testing these tools they are all available to download and use … Continue reading Top 15 Essential Open Source Security Software and Tools

Tor, Proxychains and VPNs

Debunked! Hey guys! How are you doing? I am back with another post. Today i want to debunk, and explain how Tor and Proxy chains work. What they are. And how to truly become anonymous. Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic … Continue reading Tor, Proxychains and VPNs

Kenya’s Cyber Insecurity

Hey guys, i am back again with another article, and today i want to touch a bit on Kenya's Cybersecurity issue. Most of us have heard the NEWS, Kenya has a major cybersecurity issue. Kenya has the highest internet penetration in Africa with over 31 million people having access to the internet, according to a … Continue reading Kenya’s Cyber Insecurity