Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]

Categories
Data Security TECH & CYBERSECURITY

10 Internet Safety Rules

Keep Personal Information Professional and Limited Keep Your Privacy Settings On Practice Safe Browsing Use a Secure VPN Connection Be Careful What You Download and Where You Download From Choose Strong Passwords and Enable 2 Factor Authentication Make Online Purchases From Secure and Trusted Sites Be Careful What You Post Be Careful Who You Meet […]

Categories
TECH & CYBERSECURITY

Massive ‘Collection #1’ Breach Exposes 777 Million Emails, 22 Million Passwords

Hey guys, how are y’all doing? Another massive data dump has just occurred. And as the title says it’s big and serious. I’ll post links to help you check out if your passwords or emails are part of the dump. My advice, whether or not you find your data, go change your password to a […]

Categories
TECH & CYBERSECURITY

Privacy, Security and Anonymity Mini Guide & Links

Security Policies and Resources   A list of resources for the security conscious tech-users. Operation security, incident response and help guides. Just right click on any link and open in a new tab. Make sure to bookmark this site for reference.   Info-Sharing Classification   Red Alert List (Don’t Share)   Passwords Real, full (family) […]