Browser Anti‑Fingerprinting How to Blind Trackers and Feed Them False Data When I first started digging into browser‑level anti‑fingerprinting, I quickly realized that the problem isn’t just “someone can see my user‑agent string.” It’s an entire ecosystem of tiny data points—canvas hashes, timing quirks, font lists, hardware concurrency, even the way my mouse wiggles across […]
Category: Security
How to keep your devices and network safe.
Emergency‑Response Plan for Personal Hardware
Emergency‑Response Plan for Personal Hardware Introduction When a determined adversary stands at your front door, ready to snatch your computer or launch a sophisticated cyber‑attack, the outcome hinges on whether you have a pre‑written emergency‑response plan. A well‑crafted “kill‑switch” that instantly isolates the device, rotates all cryptographic material, and dumps fresh secrets to an encrypted […]
Read More… from Emergency‑Response Plan for Personal Hardware
Privacy and Security when Blind
Privacy and Security when Blind For anyone who relies on technology to see the world, privacy isn’t a luxury—it’s a lifeline. Blind users depend on screen‑readers, OCR apps, and voice assistants to turn visual information into audible or tactile form. Each of those tools creates a hidden data trail that can be captured, stored, or […]
Using MITRE D3FEND to strengthen you home network
Using MITRE D3FEND to strengthen you home network D3FEND is a knowledge base of cybersecurity countermeasure techniques. In the simplest sense, it is a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. It is designed for “Blue Team” Cybersecurity defenders to have a methodology to make their networks more secure. I […]
Read More… from Using MITRE D3FEND to strengthen you home network
Home surveillance systems debate
Home surveillance systems debate An overview of the debate Home surveillance systems are everywhere now. As of October 2022, nearly half of American households with broadband internet had a home security system, networked camera, video doorbell, or combination of them. That is a lot of cameras! The data is not stored in your home, […]
Self-Hosting at home
Self-Hosting at Home When many people talk about self-hosting they are talking about a private server on the internet which is rented by you from a company that has servers. I am going to tell you about another way to think about self hosting. Do it at home right on your local network. It […]
Step-by-step guide – Home Network Diagram
Home Network Diagram Part of the Home Cybersecurity series Once we have a good inventory of what is on our network, it is time to draw a diagram of what we have to get a good picture. Visualizing your home network with a home network diagram will help you to plan and visualize what […]
Home Cybersecurity (Updated)
Home Cybersecurity updated I have wanted to update my network cybersecurity and tell you all of the things that I have learned. This will be a series of updated in-depth articles that will help you to setup your own cybersecurity in your own home. I know that this is going to be an ambitious project, […]
Using CISSP to help secure your home network
Using CISSP to help secure your home network I am enrolled in a Cybersecurity class right now and as with most courses I take I get to thinking about how to apply what I am learning to my own life. So I thought about how to take the Certified Information Systems Security Professional (CISSP) Domains […]
Read More… from Using CISSP to help secure your home network
Best privacy and security apps for Linux
Here are some of the best of the best security and privacy apps for Linux. Using Linux means that you value security and privacy. Here are some of the best FOSS (Free and Open-Source Software) that I have come across. Download them and check out some great programs to keep you safer on the internet. […]