Becoming Virtually Untraceable (Eps1.0_B4s!c_T3chn1qu3s.onion)

Liam Neeson in “Taken 3” image courtesy of Fandango
Image courtesy of CSO

1. Consider if it’s Worth Owning a Cell Phone

2. TAILS I Win, Heads You Lose!

3. Your Entire Life Fits On a USB Stick

4. Encrypt Everything!

5. Use a Virtual Private Network Every Time You Connect to the Internet

6. Scour the Internet for Your Personal Information on a Monthly Basis

7. Lock Your Credit Down.

8. Stay Clear of All Social Media

9. Use “Old School” Tactics

10. An Entire Industry Collecting Data on You

11. Enemy of the State?

Will Smith & Gene Hackman in the movie Enemy of the State. Image courtesy of thehollywoodnews.com

12. Don’t Save Data Locally, Instead Use Cloud-based Services

In Closing

Additional Privacy Resources

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Why Taking a Technological Step Backwards May Better Protect America’s Critical Infrastructure…

Transport Layer Security Is Not A Substitute For Virtual Private Networks

Wealth partners with CoinMarketCap to give out 2,000,000 WLT !!

Incident Response and Threat Emulation in Corporate Environments

Is Your Phone Lost? How to Deal with A Lost or Stolen Phone

Are You As An Infosec Leader Ready To Sit At the Executive Adult Table?

{UPDATE} Ramirez Rumble Hack Free Resources Generator

Merkle Swap | Convert ESN to ETH ERC20 (Part-3 – Claim Your Tokens)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Are You Cyberpunk Enough Now to Unplug from the Mainstream?

Who did call a runtime broker, and why is it running on my computer?

When thinking of phishing, you might think of ‘Winning the Nigeran lottery’ or ‘Paying a small…

On Cyberwarfare & the Effectiveness of Indicting Foreign Criminal Hackers