Emergency‑Response Plan for Personal Hardware

Emergency Response plan - Personal - Hardware. Step by step considerations and code to help you plan.

Emergency‑Response Plan for Personal Hardware Introduction When a determined adversary stands at your front door, ready to snatch your computer or launch a sophisticated cyber‑attack, the outcome hinges on whether you have a pre‑written emergency‑response plan. A well‑crafted “kill‑switch” that instantly isolates the device, rotates all cryptographic material, and dumps fresh secrets to an encrypted […]

Read More…

Why I’m Saying “No” to Mandatory Government‑ID Checks Online

Banner for the article "Why I’m Saying “No” to Mandatory Government‑ID Checks Online" showing a cartoon of a man demanding your "papers"

  Why I’m Saying “No” to Mandatory Government‑ID Checks Online I’ve started noticing a worrying trend: everywhere I go online — whether I’m signing up for a new bank account, joining a cloud‑storage service, or just trying to comment on a social‑media post — I’m asked to scan or photograph my government‑issued ID. At first, […]

Read More…

Privacy and Security when Blind

Blindness, Assistive Technology, and Data Privacy

Privacy and Security when Blind For anyone who relies on technology to see the world, privacy isn’t a luxury—it’s a lifeline. Blind users depend on screen‑readers, OCR apps, and voice assistants to turn visual information into audible or tactile form. Each of those tools creates a hidden data trail that can be captured, stored, or […]

Read More…

Using MITRE D3FEND to strengthen you home network

Using MITRE D3FEND to Secure & Privatize a Home Network

  Using MITRE D3FEND to strengthen you home network D3FEND is a knowledge base of cybersecurity countermeasure techniques. In the simplest sense, it is a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. It is designed for “Blue Team” Cybersecurity defenders to have a methodology to make their networks more secure. I […]

Read More…