Making Believable Clones to hide yourself When I first tackled the problem of digital over-exposure, my tactical article walked you through the basics: flooding every device you own — phone, laptop, smartwatch — with harmless, random traffic so that any single data point became meaningless. In the Tactical Article I just published, we mixed in […]
Category: guerrilla privacy
Noise Flooding your metadata for privacy
Noise flooding explained Noise Flooding your metadata for privacy is a technique of artificially creating believable metadata so that real traffic is lost. Every day your device leaves a trail of tiny data points — URLs you visit, timestamps, user-agent strings, and IP addresses. To a data-broker or advertising network those points are the […]
The year of guerrilla privacy
The year of guerrilla privacy When I first started writing about personal security, I quickly realized that talking about privacy is easy — doing it is a whole different ballgame. That’s why 2026 will be the first year I not only share ideas but actually live them in front of you, two weeks at […]
Thanksgiving Data Stuffing Recipe
Thanksgiving Data Stuffing Recipe Every Thanksgiving the house fills with laughter, the aroma of roasted turkey, and — unfortunately— a swarm of unfamiliar devices. Smartphones, tablets, laptops, smart-watches, and even Bluetooth-enabled wearables all plug into the guest Wi-Fi, broadcast their presence, and begin chatting with the world outside. In today’s data-driven economy those signals […]