I have never seen security and privacy checklists used for any other purpose but deception. After pondering this observation, I’m left seriously doubting if comparison checklists have any val…| Dhole Moments
The history of this blog might very well be a cautionary tail (sic) about scope creep. AJ The Original Vision For Dhole Moments Originally, I just wanted a place to write about things too long for …| Dhole Moments
Internet discussions about end-to-end encryption are plagued by misunderstandings, misinformation, and some people totally missing the point. Of course, people being wrong on the Internet isn’…| Dhole Moments
Content Warning: This blog post talks about adult themes and sexuality. If you’re under 18, sit this one out. If you’ve been around the furry fandom for a while, you will notice that di…| Dhole Moments
Towards the end of last year, we learned that a group (allegedly affiliated with the Chinese government, referred to as “Salt Typhoon”) breached T-Mobile and other telecommunications co…| Dhole Moments