Blog
You Need To Stop DNS Leaks
Categories:
[Technology]
My mind has been on the Domain Name System (DNS) server for about a week now. I've been mulling over whether VPNs are necessary and what level of trust should be placed in a DNS provider. It's evident not to trust your ISP's DNS since some companies have been caught manipulating the data or using yo...
How To Stop Leaking Metadata
Categories:
[Technology]
Even if you use a VPN and surf the web over TLS/HTTPS your ISP or the coffee shop you sit in can still know where you go and what you do on the internet. It's this data that gets sold to the highest bidder for a profit off what you do online.
No matter if it is the coffee shop or your ISP it's dis...
You Need A Hardware Wallet
Categories:
[Technology]
If you put money into Bitcoin or another crypto, it's mad essential to store your wealth in a hardware wallet. These devices keep your private keys offline which significantly increases your security and limits the chances of your currency being stolen.
I picked up my first hardware wallet back in...
How To Increase Efficiency With Bash Automation
Categories:
[Technology]
As you well know by now, I am a big nerd. Not the broken glasses and suspender-wearing kind but the learn as much about computers as I can kind. The more I learn, the more I find myself moving away from large desktop environments and window managers to the terminal. The terminal is fast, efficient,...
Why You Should Use Free & Open Source
Categories:
[Technology]
Free and Open Source Software (FOSS) is a group of programs and projects classified as both open-source and free software. This type of software respects the user's freedom while allowing all of us to look over the code. The ability to review code is essential, so we know exactly what the program is...
Reclaim Your Privacy With F-Droid
Categories:
[Technology]
All modern phones and mobile devices come with a pre-packaged app store to allow you to download useful applications. The store software is closed-source, and the majority of the applications we install are the same.
Maybe the app could be open source if they did not rely on some little bit of cod...
Your VPN Is Not Enough
Categories:
[Technology]
Your VPN Is Not Enough
My previous post about VPNs had a lot of traction over the Fediverse. Thanks to everyone for all the support and also thanks to the readers that pointed out what I missed about VPNs. How they are inherently secure but not private in many respects.
They are correct; no on...
VPNs Are Awesome (When Used Correctly)
Categories:
[Technology]
Internet Service Providers can see the sites you visit, log them, sell them, or slow you down when using a specific website. All of this is the focus of net neutrality which may or may not be a good thing for the internet. I'll avoid my strong urge to blast my politically educated opinion on net neu...
You Need Secure Chat Apps
Categories:
[Technology]
Secure chat is a topic that I am always looking into because I believe we all have a right to privacy. Searching new apps that come onto the market to see if they have default encryption are open source and respect the users.
Encrypting our chat does not mean we have something illegal to say or sh...
Keep Your Email Private
Categories:
[Technology]
I have several email addresses that claim to encrypt my data and even the email sent if the other user has an account with the same provider. All of them work well, but Tutanota is my favorite by far for many reasons. The main reason is its open source, and we all know how much I love open source so...