Sign in

privacy & security engineering-as-a-service | linktr.ee/z3r0trust
Relevant privacy quote from Laura Poitras, award-winning American documentary film director/producer

Welcome back loyal readers to the most recent resurrection of the z3r0trust Privacy Newsletter, the June 2021 edition. They say the third time’s the charm, so here’s to this newsletter remaining a semi-permanent output of my written volumes of work. Look for it, as usual, at the end of each month if you’re into privacy. I shall spare you the explanations of why I took a break from writing this series and just jump…


2017 Maersk NotPetya ransomware attack

“All war presupposes human weakness and seeks to exploit it.” ― Carl von Clausewitz

We are in the preliminary stages of an undeclared cyberwar. If we’re honest with ourselves, it’s been ramping up to this for the last three decades. We’re in the probing, testing the waters stage of cyberwarfare. The lines are fuzzy, not internationally agreed upon, and very much the Wild West. Nation-state Advanced Persistent Threat (APT) actors are testing the limits of what they can get away with all in the name of cyber espionage and furtherance of their strategic national agendas. …


(image credit: EC Council)

Chances are you’ve already heard about information hiding at some point or another. On the off chance that you haven’t, I offer here a quick down and dirty as to what it is and how it works. Essentially, digital computing inherently makes it trivial to hide information in plain sight by abusing well-known aspects of digital file systems and commonly used internet protocols. Enter the shadowy world of digital steganography, a subject I have researched and written about extensively for several years (i.e., see Additional Resources below). …


Digital Life in 2025, Niels Ole Finnemann, Director of Netlab

Welcome to the March 2021 edition of the z3r0trust Privacy Newsletter. This month I cover invisible beacons in your emails that spy on you, the latest SMS hijacking nonsense that should’ve been addressed years ago, and one of the best privacy smartphones on the market.

Sooner or later, each one of us has to make a decision in life. A decision as to whether we want convenience or privacy in this new digital era. To be clear, it’s often one or the other…


Laura Poitras, galardonada directora y productora de documentales estadounidense

Bienvenidos de nuevo, fieles lectores, a la más reciente resurrección del Boletín de Privacidad de z3r0trust, la edición de junio de 2021. Dicen que a la tercera va la vencida, así que brindaré por que este boletín siga siendo una salida semipermanente de mis volúmenes de trabajo escritos. Búscalo, como siempre, a finales de cada mes si te gusta la privacidad. Me ahorraré las explicaciones de por qué me…


Digital Life in 2025, Niels Ole Finnemann, Director of Netlab

Bienvenidos a la edición de marzo de 2021 del Boletín de Privacidad de z3r0trust. Este mes cubro los píxeles espías de los correos electrónicos, la última insensatez de redirección de SMS que ya debía estar resuelta desde hace años, y les presento a uno de los mejores smartphones en materia de privacidad del mercado.

Tarde o temprano, cada uno tiene que tomar una decisión en determinado momento de la vida. Ésta decisión es si elegimos comodidad…


(Illustration: Aïda Amer/Axios)

“Tampoco ha pasado mal su vida quien la ha pasado en la intimidad”. ~Horacio

Bienvenidos a la edición de febrero de 2021 del Boletín de Privacidad de z3r0trust. Acompáñame mientras continúo este viaje de toda la vida por la madriguera del conejo de la privacidad digital y difundo conciencia por el camino sobre cómo maximizar la privacidad y la seguridad personal en línea.

Hace poco, Arthur Holland Michel publicó un excelente artículo en Wired’s Backchannel en…


Captain of the Blue Team, the CISO (image credit: Cavirin)

Contrary to popular opinion within the cybersecurity industry, not every cybersecurity professional career roadmap ends at becoming a Chief Information Security Officer, or any of the other half a dozen C-Suite roles such as a Chief Information Officer (CIO), Chief Technical Officer (CTO), or Chief Security Officer (CSO), for that matter. It’s not that I have anything personal against CISOs or any other corporate executive role. It’s just that I know for a fact that I am not alone when I say that I would rather remain in a technical information security capacity in my career than have to concern…


(Illustration: Aïda Amer/Axios)

“Nor has he spent his life badly who has passed it in privacy.” ~Horace

Welcome to the February 2021 edition of the z3r0trust Privacy Newsletter. Please join me as I continue this lifelong journey down the digital privacy rabbit hole and I spread awareness along the way on how to maximize user privacy and security online.

There was an excellent article published in Wired’s Backchannel recently by Arthur Holland Michel that discussed how surveillance capitalism is ubiquitous now and how these CCTV surveillance…


Mad Max: Fury Road (Image credit: BusinessInsider)

In 2017, my wife and I bought a ranch-style house that was built in 1957 that sits directly off of a major Los Angeles county thoroughfare street. As a retired Marine, I used my Veterans Administration (VA) home loan to purchase our first home after honorably retiring from the Marines in 2015 after serving 20 years on active duty. Our street is only a 4-lane road, two lanes running North/South each, but it stays busy all day and night. “Welcome to homeownership in a metro,” I could imagine my neighbors saying.

The windows and insulation in the walls of our…

꧁༒☬z3я0тяυѕт☬༒꧂

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store