Recent #security posts:

  • 5 EASY security tips to protect your privacy Staying safe on your phone or computer is difficult. Too often, the choices we make actually compromise our privacy. Here are 5 easy steps you can take to actively take back control of your privacy. #privacy #surveillance #digital #security #hack

  • Interview with a Real Spy: How she breaks into things, and what you can learn Jek Hyde's job includes all the best parts about being a spy: She's what is known as a "Red Team Physical Penetration Tester". She's paid by companies to break into their buildings and security systems so that they can see where their weaknesses are. I talk to her about her favorite spy jobs, her favorite gadgets, and what we can do to protect our own digital and physical security. Jek Hyde's twitter: Security resources mentioned in the video: Data blocker: Privacy screen: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Deviant Ollam: Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks Practical Lock Picking: A Physical Penetration Tester's Training Guide #security #spy # hacker #malware #bitcoin

  • Best ways to protect your privacy, with Jameson Lopp Jameson Lopp is a leading privacy expert, and CTO of Casa. Last year he documented his own journey into extreme privacy, and his company is at the forefront of promoting sovereignty for the individual and helping them to live more free and secure lives. He chats with me at Consensus about this, and shares some fantastic tips for how we can all protect our privacy in our day-to-day lives. #privacy #security #blockchain #bitcoin

  • In this brief presentation, we look at Man In The Middle Attacks also known as MITM. This video is intended for those new to online safety and security but I hope old hats will like it as well. Cyber Security has many facets but we all have to start somewhere. For more information on Man In The Middle Attacks please go to the following links: Entry: Man-in-the-middle attack: What Is a Man-in-the-Middle Attack? Security Jargon Explained #cybersecurity #maninthemiddleattack #privacy #security

  • A world with no police? With Pete "Mance" Raymond At Liberty Forum this year, I chatted with Pete 'Mance' Raymond, the "Free Man Beyond the Wall". We talked about ways that people can be more free today, and what the world would look like with private police. If you don't listen to Pete's podcast, you definitely need to start: #libertarian #security #police #privacy

  • Where Should You Store Your Private Keys Is storing your private key in a bank's locked box hypocrisy? Not necessarily. While cryptocurrencies have put the power of our finances back in our hands, it's up to us to make sure those funds are protected, stored, and backed up. I run through some of the securest ways to store your private keys. #bitcoin #blockchain #security