Becoming Virtually Untraceable โ€” 14_3ND_G4M3.exe

credit

Obligatory Privacy Rant

The โ€œMind Your Own Business Actโ€

Security vs. Privacy: License Plate Reader edition

Featured Privacy Tactics, Techniques, & Procedures

Low-Tech Security: Evasion and Anonymity Tip

Truer words have never been spoken. Credit: Charles Spurgeon

Sim-Jacking Relies on Criminals Collecting Your Information

Evilginx is an application that provides a MITM framework to bypass 2FA; credit: ProDefense.org
An example of a standard Google SMS text message verification code for a user to authenticate
Security keys are a low-tech protection against phishing/SIM-jacking attacks; credit: CNet

Additional Privacy Resources

--

--

--

the salty chronicles of one bumbling infosec engineerโ€™s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Why We Believe in Hadrian

GDPR and Privacy by Design: what developers need to know

How XDR Gives 360 Degree Protection For Cyber Security?

How XDR Gives 360 Degree Protection For Cyber Security?

Threat Hunting for the Most Common MITRE ATT&CK Techniques (Part 1)

DSAR probing โ€˜attackโ€™ from Princeton researchers

{UPDATE} Bartender Simulator Hack Free Resources Generator

@MilkyWayDefi is ready to take off and will DOMINATE the #CryptoVerse VERY SOON! ๐Ÿš€

Is Freedom From Censorship a Double-edged Sword?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
๊ง๐“Šˆ๐’†œ๐Ÿ†‰3๐Ÿ†๐Ÿ…พ๐Ÿ†ƒ๐Ÿ†๐Ÿ†„๐Ÿ†‚๐Ÿ†ƒ๐’†œ๐“Š‰๊ง‚

๊ง๐“Šˆ๐’†œ๐Ÿ†‰3๐Ÿ†๐Ÿ…พ๐Ÿ†ƒ๐Ÿ†๐Ÿ†„๐Ÿ†‚๐Ÿ†ƒ๐’†œ๐“Š‰๊ง‚

the salty chronicles of one bumbling infosec engineerโ€™s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet