The question of privacy & security (or lack thereof) for mobile devices is among the most frequent questions I am asked on a daily basis. Here are my considerations and recommendations.
Starting at some point around World War I, numbers stations have operated as a simple and foolproof method for government agencies to communicate instructions to assets working undercover. Lets build a new one!
There are so many initial similarities shared by Opposition Researchers and OSINT Analysts, that they are often confused for one another within the political domain. This likely stems from their abilities to utilize publicly available information to achieve their objectives. However, their similarities pretty much end here.
If you keep up with the news, work in IT or even on a computer, it does not take much imagination to think of a scenario in which one might loose access (temporarily or permanently) to your records and files. These days, stories about targeted events like hackers, home invaders or arsonists seem almost as…
Over the years, many friends and prospect clients have approached me with a problem: One privacy violation or other has taken it too far and they have to eradicate that one thing from their life. Ironically, the violator is usually a consideration in the latter phases of a privacy consulting project, meaning that it is…
This is one of the more common types of projects that you will see see while working with private clients and security consultancies alike. As the title suggests, the vulnerability assessment is an analysis through which the client aims to develop detailed, tailored knowledge of the vulnerabilities of a person, campaign, organization or series of…
A brief overview of my new favorite daily-driver: Pop!_OS, some of the privacy & security features that I like, and my personal use case for context.
A general overview on collecting breach data: Another unhealthy hoarding habit or rich set of OSINT pivot points?
If you’ve already decided that you ‘need’ a burner phone, there are some considerations involved if you want to use it safely or semi-anonymously, but it will come down to tradecraft in the end.
An 18 Month functionality review of a truly unique, private and anonymous messenger platform. Briar Messenger.