Browser Anti‑Fingerprinting How to Blind Trackers and Feed Them False Data When I first started digging into browser‑level anti‑fingerprinting, I quickly realized that the problem isn’t just “someone can see my user‑agent string.” It’s an entire ecosystem of tiny data points—canvas hashes, timing quirks, font lists, hardware concurrency, even the way my mouse wiggles across […]
Category: Online Safety / Security
Why I Decided to Host a Family‑Only Mastodon Instance
I was recently asked by a friend that was concerned with the level of discourse on Social media and He wanted to know if there was something that could be done. While I can’t solve the problems that we are experiencing on social media as a whole, there is one positive direction that you […]
Read More… from Why I Decided to Host a Family‑Only Mastodon Instance
Emergency‑Response Plan for Personal Hardware
Emergency‑Response Plan for Personal Hardware Introduction When a determined adversary stands at your front door, ready to snatch your computer or launch a sophisticated cyber‑attack, the outcome hinges on whether you have a pre‑written emergency‑response plan. A well‑crafted “kill‑switch” that instantly isolates the device, rotates all cryptographic material, and dumps fresh secrets to an encrypted […]
Read More… from Emergency‑Response Plan for Personal Hardware
Why I’m Saying “No” to Mandatory Government‑ID Checks Online
Why I’m Saying “No” to Mandatory Government‑ID Checks Online I’ve started noticing a worrying trend: everywhere I go online — whether I’m signing up for a new bank account, joining a cloud‑storage service, or just trying to comment on a social‑media post — I’m asked to scan or photograph my government‑issued ID. At first, […]
Read More… from Why I’m Saying “No” to Mandatory Government‑ID Checks Online
Privacy and Security when Blind
Privacy and Security when Blind For anyone who relies on technology to see the world, privacy isn’t a luxury—it’s a lifeline. Blind users depend on screen‑readers, OCR apps, and voice assistants to turn visual information into audible or tactile form. Each of those tools creates a hidden data trail that can be captured, stored, or […]
Using MITRE D3FEND to strengthen you home network
Using MITRE D3FEND to strengthen you home network D3FEND is a knowledge base of cybersecurity countermeasure techniques. In the simplest sense, it is a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. It is designed for “Blue Team” Cybersecurity defenders to have a methodology to make their networks more secure. I […]
Read More… from Using MITRE D3FEND to strengthen you home network
The Slippery Slope
Orwellian Nightmare We seem to be caught up in an Orwellian nightmare. Many people are outraged at the latest laws the are being forced upon people in various countries and it is starting to happen here in the United States. I am, of course, talking about “Age Verification” (AV). The way that it is […]
Setting up Next DNS
Setting Up Next DNS You might ask: “Don’t I already have DNS?”. The short answer is “Yes”, in most cases your ISP (the company that you buy your internet from) does give you a DNS which they own and can see and sell all of your data to third party companies. This give your […]
Privacy Myths Debunked
Privacy Myths Debunked Many people have misconceptions when it comes to privacy and security. Many myths have circulate on the internet concerning them. In this article –Privacy myths debunked – I have listed several and will try to explain why and how they are false. Here are just some of the more common ones: […]
Step-by-Step Home Network Inventory Guide
Step-by-Step Home Network Inventory Guide Article Two – Home Cybersecurity series Taking an inventory of your home network is the first step in getting your network under control. There is an old adage that you can’t control what you don’t know about, and the same is true for your network. You have to know what […]