Let’s Set Up a Free and Open-Source Network HoneypotUse a Raspberry Pi and OpenCanary to help detect network intrudersDec 30, 2024Dec 30, 2024
Anti-Automated License Plate Reader TechniquesDefeating high-tech surveillance with low-tech solutionsNov 27, 2024Nov 27, 2024
The Basics of Securing Your MacMake sure you take advantage of some of Apple’s best featuresNov 23, 2024Nov 23, 2024
How to check your iPhone for PegasusHigh-risk users should be proactive in testing for signs of compromiseNov 7, 2024Nov 7, 2024
Don’t Worry, Usable Security and Privacy are HereToday, there are more tools than ever to help secure your digital life. Here’s a handful of practical options.Nov 7, 2024Nov 7, 2024
A Very Short Case Study of the Removal of a Toxic Big Tech LeaderThis is how employees can win: be prepared.Oct 31, 2024Oct 31, 2024
Better Time Estimation for Software ProjectsEvery team member and project is different. Planning can be really hard to get right.Oct 23, 2024Oct 23, 2024
How to use Hush Line with Proton MailEasily make your secure tips seamlessly work with the leading encrypted email providerOct 22, 2024Oct 22, 2024
5 Tips for Hiring and Applying for JobsHiring is hard. Here are a few things I’ve learned.Jun 6, 2024Jun 6, 2024
Principles of a Tip Line PlatformA research-based way to evaluate whistleblower systemsMay 13, 2024May 13, 2024