Layered Signal-Silence Tactics

Setting the Scene Over the past half-century, U.S. policing has steadily absorbed military tactics, equipment, and training. The turning point came in the late 1960s when high-profile shootings left officers feeling outgunned; the federal 1033 program (established in 1990) then institutionalized the flow of surplus assault rifles, armored vehicles, and tactical gear into local departments. By the […]

Read More… from Layered Signal-Silence Tactics

Self-Made One-Time Pads from Everyday Sources

Introduction – Making the Cipher the target Self-Made One-Time Pads from Everyday Sources – Making the Cipher the target dives deep into a technique that goes far beyond the standard “VPN + strong passwords” checklist. The goal is simple but powerful: make the cipher itself the target so that anyone who intercepts our traffic is […]

Read More… from Self-Made One-Time Pads from Everyday Sources

Making Believable Clones to hide yourself

Making Believable Clones to hide yourself When I first tackled the problem of digital over-exposure, my tactical article walked you through the basics: flooding every device you own — phone, laptop, smartwatch — with harmless, random traffic so that any single data point became meaningless. In the Tactical Article I just published, we mixed in […]

Read More… from Making Believable Clones to hide yourself

Noise Flooding your metadata for privacy

  Noise flooding explained Noise Flooding your metadata for privacy is a technique of artificially creating believable metadata so that real traffic is lost. Every day your device leaves a trail of tiny data points — URLs you visit, timestamps, user-agent strings, and IP addresses. To a data-broker or advertising network those points are the […]

Read More… from Noise Flooding your metadata for privacy

The year of guerrilla privacy

  The year of guerrilla privacy When I first started writing about personal security, I quickly realized that talking about privacy is easy — doing it is a whole different ballgame. That’s why 2026 will be the first year I not only share ideas but actually live them in front of you, two weeks at […]

Read More… from The year of guerrilla privacy

Thanksgiving Data Stuffing Recipe

  Thanksgiving Data Stuffing Recipe Every Thanksgiving the house fills with laughter, the aroma of roasted turkey, and — unfortunately— a swarm of unfamiliar devices. Smartphones, tablets, laptops, smart-watches, and even Bluetooth-enabled wearables all plug into the guest Wi-Fi, broadcast their presence, and begin chatting with the world outside. In today’s data-driven economy those signals […]

Read More… from Thanksgiving Data Stuffing Recipe

Compartmentalization for Privacy and Security

  Compartmentalization for Privacy and Security In today’s hyper‑connected world, a single breach can cascade into a full‑blown privacy nightmare, and that’s exactly why I’m a big fan of compartmentalization. By deliberately separating different aspects of my digital and physical life—email, social media, banking, work tools, and even personal hobbies — I create “walls” that […]

Read More… from Compartmentalization for Privacy and Security

Browser Anti‑Fingerprinting

Browser Anti‑Fingerprinting How to Blind Trackers and Feed Them False Data When I first started digging into browser‑level anti‑fingerprinting, I quickly realized that the problem isn’t just “someone can see my user‑agent string.” It’s an entire ecosystem of tiny data points—canvas hashes, timing quirks, font lists, hardware concurrency, even the way my mouse wiggles across […]

Read More… from Browser Anti‑Fingerprinting