The first step in removing old accounts is to find them all. In this article, we'll start with the best and most obvious way to find your online accounts.| Firewalls Don't Stop Dragons
Many of us are carrying around some serious digital baggage. In this blog series, I'm going to help you trim the fat - a data diet, if you will. And in the process, improve both your privacy and your security. Digital Baggage The world wide web is over 30 years old now. The internet as| Firewalls Don't Stop Dragons
You should minimize your online accounts. But there are some accounts everyone has, like it or not, and you need to plant your flag before someone else does.| Firewalls Don't Stop Dragons
You should never send files that contain confidential or sensitive information to someone on the Internet without protection. You need to encrypt the file itself and you need to make sure you send it using an end-to-end encrypted channel. I'll tell you how to send files securely. (It's really not that hard.)| Firewalls Don't Stop Dragons
Our mobile phones have become the center of our digital lives. We carry them with us everywhere we go. Let's learn how to keep them physically secure.| Firewalls Don't Stop Dragons
Our mobile phones are now used to ID and authenticate us. SIM swapping allows a hacker to clone your phone and become you. How do you stop it?| Firewalls Don't Stop Dragons
Enabling two-factor authentication for your most important accounts is crucial. But text-based 2FA is not secure. You need to use TOTP codes.| Firewalls Don't Stop Dragons
Everyone has (or is at least assumed to have) a mobile phone these days. And since our mobile phones are directly associated with us, our phones are often used as a stand-in for us when our identity needs to be verified. This is usually done via a text message, but sometimes with a phone call.| Firewalls Don't Stop Dragons
Most apps today have a hidden, in-app browser that handles any link you click - bypassing your chosen default browser and privacy settings.| Firewalls Don't Stop Dragons
The Internet of Things (IoT) promises all sorts of cool new features for our previously "dumb" devices, allowing them to be controlled from anywhere on the planet. But because the compete on cost, security is lax or nonexistent. If you're going to bring these devices into your home, you need to keep them walled off.| Firewalls Don't Stop Dragons
Your rights are significantly reduced when crossing the border, even if you're entering your own country. Sadly, there's not a lot you can do about it.| Firewalls Don't Stop Dragons
Learn how differential privacy (adding statistical noise to data) lets us find patterns in the crowd—without revealing anything about the people in it.| Firewalls Don't Stop Dragons
It's tax time again... and so it's also time for tax scams. I'll tell you how to identify scams and protect your sensitive tax info.| Firewalls Don't Stop Dragons
One of the most basic ways we're tracked on the internet is via our IP address. Onion routing can mask your true IP address. I'll explain how to use it.| Firewalls Don't Stop Dragons
The massive increase in sharing of personal data has greatly increased our need for privacy enhancing technologies. I'll explain the most promising ones.| Firewalls Don't Stop Dragons
Browser extensions are helpful, but powerful, and can be malicious. Treat browser add-ons and plugins like software applications. Remove any you don't need.| Firewalls Don't Stop Dragons
I've got a little smorgasbord of info for you this week... a virtual charcuterie board of tips, tricks and treats! Choice Cuts of Content If you haven't tried my podcast yet, now is a great time to dive in - which I'll explain shortly. I put a lot of time and effort into my podcast.| Firewalls Don't Stop Dragons
We're not just tracked as we surf the web, we're being tracked in the physical world, too. Our location can be very revealing. Here are some tips to limit this.| Firewalls Don't Stop Dragons
In the final installment of this series, I'll tell you about a Consumer Reports study and give you some amended recommendations on deleting your OSINT data.| Firewalls Don't Stop Dragons
Now that you've discovered what OSINT information is out there, you need to take steps to delete or at least suppress it. Here's how I did it.| Firewalls Don't Stop Dragons
You shouldn't know any of your passwords. That means using a password manager. But what if your vault is hacked? Here are some clever ideas.| Firewalls Don't Stop Dragons