Emergency‑Response Plan for Personal Hardware

Emergency Response plan - Personal - Hardware. Step by step considerations and code to help you plan.

Emergency‑Response Plan for Personal Hardware Introduction When a determined adversary stands at your front door, ready to snatch your computer or launch a sophisticated cyber‑attack, the outcome hinges on whether you have a pre‑written emergency‑response plan. A well‑crafted “kill‑switch” that instantly isolates the device, rotates all cryptographic material, and dumps fresh secrets to an encrypted […]

Read More…

Why I’m Saying “No” to Mandatory Government‑ID Checks Online

Banner for the article "Why I’m Saying “No” to Mandatory Government‑ID Checks Online" showing a cartoon of a man demanding your "papers"

  Why I’m Saying “No” to Mandatory Government‑ID Checks Online I’ve started noticing a worrying trend: everywhere I go online — whether I’m signing up for a new bank account, joining a cloud‑storage service, or just trying to comment on a social‑media post — I’m asked to scan or photograph my government‑issued ID. At first, […]

Read More…

Privacy and Security when Blind

Blindness, Assistive Technology, and Data Privacy

Privacy and Security when Blind For anyone who relies on technology to see the world, privacy isn’t a luxury—it’s a lifeline. Blind users depend on screen‑readers, OCR apps, and voice assistants to turn visual information into audible or tactile form. Each of those tools creates a hidden data trail that can be captured, stored, or […]

Read More…

Using MITRE D3FEND to strengthen you home network

Using MITRE D3FEND to Secure & Privatize a Home Network

  Using MITRE D3FEND to strengthen you home network D3FEND is a knowledge base of cybersecurity countermeasure techniques. In the simplest sense, it is a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. It is designed for “Blue Team” Cybersecurity defenders to have a methodology to make their networks more secure. I […]

Read More…

Step-by-Step Home Network Inventory Guide

step-by-step home network inventory - the first step in home cybersecurity

Step-by-Step Home Network Inventory Guide Article Two – Home Cybersecurity series Taking an inventory of your home network is the first step in getting your network under control. There is an old adage that you can’t control what you don’t know about, and the same is true for your network. You have to know what […]

Read More…

Home Cybersecurity (Updated)

Home cybersecurity

Home Cybersecurity updated I have wanted to update my network cybersecurity and tell you all of the things that I have learned. This will be a series of updated in-depth articles that will help you to setup your own cybersecurity in your own home. I know that this is going to be an ambitious project, […]

Read More…

What to Do After Installing Pop_OS

  I really am enjoying I just received a beautiful new Thelio Mira from System 76 (they don’t advertise here, but they make a great product and I highly recommend them). When I get a new computer I install the programs and add-ons that I want on it. POP_OS is great for this. It is […]

Read More…