Privacy and Security when Blind For anyone who relies on technology to see the world, privacy isn’t a luxury—it’s a lifeline. Blind users depend on screen‑readers, OCR apps, and voice assistants to turn visual information into audible or tactile form. Each of those tools creates a hidden data trail that can be captured, stored, or […]
Using MITRE D3FEND to strengthen you home network
Using MITRE D3FEND to strengthen you home network D3FEND is a knowledge base of cybersecurity countermeasure techniques. In the simplest sense, it is a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. It is designed for “Blue Team” Cybersecurity defenders to have a methodology to make their networks more secure. I […]
Read More… from Using MITRE D3FEND to strengthen you home network
The Slippery Slope
Orwellian Nightmare We seem to be caught up in an Orwellian nightmare. Many people are outraged at the latest laws the are being forced upon people in various countries and it is starting to happen here in the United States. I am, of course, talking about “Age Verification” (AV). The way that it is […]
Setting up Next DNS
Setting Up Next DNS You might ask: “Don’t I already have DNS?”. The short answer is “Yes”, in most cases your ISP (the company that you buy your internet from) does give you a DNS which they own and can see and sell all of your data to third party companies. This give your […]
Privacy Myths Debunked
Privacy Myths Debunked Many people have misconceptions when it comes to privacy and security. Many myths have circulate on the internet concerning them. In this article –Privacy myths debunked – I have listed several and will try to explain why and how they are false. Here are just some of the more common ones: […]
Home surveillance systems debate
Home surveillance systems debate An overview of the debate Home surveillance systems are everywhere now. As of October 2022, nearly half of American households with broadband internet had a home security system, networked camera, video doorbell, or combination of them. That is a lot of cameras! The data is not stored in your home, […]
Self-Hosting at home
Self-Hosting at Home When many people talk about self-hosting they are talking about a private server on the internet which is rented by you from a company that has servers. I am going to tell you about another way to think about self hosting. Do it at home right on your local network. It […]
Cool Tech You Need
Here is a collection of some of the cool tech that you need to take a look at. The list will be updated to keep it current. All Metal 7.0 inch Touch Screen Ultra-Light Mini Laptop At $449.99 (at the time of writing) this little laptop is one to put into your tool kit. […]
Threat Modeling for Individuals
What is Threat Modeling for Individuals? Threat modeling is a way of thinking about risk. It is not all technological solutions but they do play a role in thinking about how to mitigate or lessen the threats. When you think about defense, start with thinking about what you’re defending, and how valuable it is. Lets […]
Step-by-step guide – Home Network Diagram
Home Network Diagram Part of the Home Cybersecurity series Once we have a good inventory of what is on our network, it is time to draw a diagram of what we have to get a good picture. Visualizing your home network with a home network diagram will help you to plan and visualize what […]