Many of us are carrying around some serious digital baggage. In this blog series, I'm going to help you trim the fat - a data diet, if you will. And in the process, improve both your privacy and your security. Digital Baggage The world wide web is over 30 years old now. The internet as| Firewalls Don't Stop Dragons
You should minimize your online accounts. But there are some accounts everyone has, like it or not, and you need to plant your flag before someone else does.| Firewalls Don't Stop Dragons
Email has been around for decade, but wasn't built for security and privacy. There are secure alternatives and my personal recommendation is to try Proton.| Firewalls Don't Stop Dragons
You should never send files that contain confidential or sensitive information to someone on the Internet without protection. You need to encrypt the file itself and you need to make sure you send it using an end-to-end encrypted channel. I'll tell you how to send files securely. (It's really not that hard.)| Firewalls Don't Stop Dragons
It’s time once again for Hacker Summer Camp! This is the name given to a serious for three, world-renowned cybersecurity conferences in Las Vegas, Nevada, that are always held during the same week every year in early August: Security BSides Las Vegas, Black Hat and DEF CON. I came late to this party, but I’ve […] The post Hacker History appeared first on Firewalls Don't Stop Dragons.| Firewalls Don't Stop Dragons
Our mobile phones have become the center of our digital lives. We carry them with us everywhere we go. Let's learn how to keep them physically secure.| Firewalls Don't Stop Dragons
Our mobile phones are now used to ID and authenticate us. SIM swapping allows a hacker to clone your phone and become you. How do you stop it?| Firewalls Don't Stop Dragons
Enabling two-factor authentication for your most important accounts is crucial. But text-based 2FA is not secure. You need to use TOTP codes.| Firewalls Don't Stop Dragons
Everyone has (or is at least assumed to have) a mobile phone these days. And since our mobile phones are directly associated with us, our phones are often used as a stand-in for us when our identity needs to be verified. This is usually done via a text message, but sometimes with a phone call.| Firewalls Don't Stop Dragons
Most apps today have a hidden, in-app browser that handles any link you click - bypassing your chosen default browser and privacy settings.| Firewalls Don't Stop Dragons
The Internet of Things (IoT) promises all sorts of cool new features for our previously "dumb" devices, allowing them to be controlled from anywhere on the planet. But because the compete on cost, security is lax or nonexistent. If you're going to bring these devices into your home, you need to keep them walled off.| Firewalls Don't Stop Dragons
Security and privacy for non-techies. Protect your personal data from criminals, corporations, and other bad actors. Don't get caught with your drawbridge down!| Firewalls Don't Stop Dragons
Well, 2025 is almost half over now. I figured this would be a good time to check in and see how you're progressing. As usual, I put together a long list of ideas at the start of each new year - some options for your privacy and security to-do list. The idea is not to| Firewalls Don't Stop Dragons
I just returned from an international trip. I’m going to integrate these into the original post here, but for now I’ll just relate my recent experience and key takeaways. Background I’ve been rather paranoid about traveling abroad, despite having done it many times before. More specifically, I was worried about returning to the United States […] The post Border Insecurity (Update) appeared first on Firewalls Don't Stop Dragons.| Firewalls Don't Stop Dragons
It's time for another quick and easy 'dragon hack'. Today I'll tell you how to stop people from snooping on your communications. Meet Your Foe: Spying Message Apps Since the dawn of the World Wide Web, we've had proprietary messaging apps: AOL Instant Messenger (AIM), Yahoo Messenger and MSN Messenger were probably the most popular.| Firewalls Don't Stop Dragons
Advertisers user your mobile ad ID to track you everywhere, often correlating it with non-mobile activity. You need to disable these IDs and I'll tell you how.| Firewalls Don't Stop Dragons
Your rights are significantly reduced when crossing the border, even if you're entering your own country. Sadly, there's not a lot you can do about it.| Firewalls Don't Stop Dragons
Learn how differential privacy (adding statistical noise to data) lets us find patterns in the crowd—without revealing anything about the people in it.| Firewalls Don't Stop Dragons
NOTE!! This promotion had ended. It’s been too long since I’ve given away some of my highly-collectible, security-enhancing dragon challenge coins! If you missed out last time, they're back! Runs through the end of April (2025), so jump on this while you can! Read on for details... Dragon Challenge Coins A few years back, I| Firewalls Don't Stop Dragons
It's tax time again... and so it's also time for tax scams. I'll tell you how to identify scams and protect your sensitive tax info.| Firewalls Don't Stop Dragons
It's past time to replace Chrome browser. Try using Firefox with uBlock Origin. Just check out the difference and you'll be amazed.| Firewalls Don't Stop Dragons
One of the most basic ways we're tracked on the internet is via our IP address. Onion routing can mask your true IP address. I'll explain how to use it.| Firewalls Don't Stop Dragons
The massive increase in sharing of personal data has greatly increased our need for privacy enhancing technologies. I'll explain the most promising ones.| Firewalls Don't Stop Dragons
Browser extensions are helpful, but powerful, and can be malicious. Treat browser add-ons and plugins like software applications. Remove any you don't need.| Firewalls Don't Stop Dragons
When New Years rolls around, it's good time to set some privacy and security goals! I have a bunch of great ideas here for your 2025 New Years Resolutions list.| Firewalls Don't Stop Dragons
I've got a little smorgasbord of info for you this week... a virtual charcuterie board of tips, tricks and treats! Choice Cuts of Content If you haven't tried my podcast yet, now is a great time to dive in - which I'll explain shortly. I put a lot of time and effort into my podcast.| Firewalls Don't Stop Dragons
Holiday shopping season is nigh! Here are some great gift ideas that will improve the security and privacy of you and your loved ones.| Firewalls Don't Stop Dragons
Online security tips for everyday people! Don't get lost in the jargon, I'm here to get you the info to keep your computer safe, without the confusion!| Firewalls Don't Stop Dragons
We're not just tracked as we surf the web, we're being tracked in the physical world, too. Our location can be very revealing. Here are some tips to limit this.| Firewalls Don't Stop Dragons
In the final installment of this series, I'll tell you about a Consumer Reports study and give you some amended recommendations on deleting your OSINT data.| Firewalls Don't Stop Dragons
Now that you've discovered what OSINT information is out there, you need to take steps to delete or at least suppress it. Here's how I did it.| Firewalls Don't Stop Dragons
[This is Part 1 in a series – see also Part 2 and Part 3] There are thousands of data brokers who are collecting, collating, correlating and packaging up your personal information, and selling it to pretty much anyone who will pay. Much of this information is available to anyone, if you know where to| Firewalls Don't Stop Dragons
Let's give thanks to groups who fight for our rights, hold our governments and corporations accountable, and work to improve our democratic institutions.| Firewalls Don't Stop Dragons
You shouldn't know any of your passwords. That means using a password manager. But what if your vault is hacked? Here are some clever ideas.| Firewalls Don't Stop Dragons