Becoming Virtually Untraceable (Eps2.0_!nt3rm3d14t3_T3chn1qu3s.pdf)

The quintessential “Hacker” in a hoodie image (Hint: Hackers don’t always look like this)

Conceptually Speaking…

Scenario 1

Scenario 2

Image of how file hashing works courtesy of HowToGeek.com

Silly Rabbit, Browser Cookies Aren’t for Eating

Cryptographic Erasure & Self-Encrypting Devices

Foreign Travel

Map of compliant States courtesy of DHS.gov

Self-Destructing Email & Signal SMS

Untraceable Forms of Payment

The Disinformation Campaign

DNA Ancestry

Cave Man Style: Why Going Low-Tech Isn’t All-Bad

“Let’s Get Physical, Physical”

One Person’s Trash is Another Person’s Treasure

Additional Resources

In Closing

Additional Privacy Resources

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store