Information Removal: A Strategic Approach

My friend Drew has written a fantastic guide to removing personal information from the internet. For several years this guide appeared on on a website that he recently took down. Rather than lose some of the extremely valuable work Drew created and gave to the community, he asked me to republish some of it here. I am only too happy to do so. This article is the first of some select works from HidingFromTheInternet.com. Continue reading “Information Removal: A Strategic Approach”

O&O Shutup 10: Multipurpose Windows 10 Tool

One of my favorite security tools for Windows 10 is one that I also have a hard time categorizing. It is incredibly versatile and touches a lot of different aspects of security. This tool is called O&O ShutUp10. If you’re a Windows 10 user and you aren’t using this, you should definitely give it a look. Continue reading “O&O Shutup 10: Multipurpose Windows 10 Tool”

Tools I No Longer Recommend: Ring Doorbell

There was a time, not too long ago, that I really liked the Ring Doorbell. I’m pretty sure I spoke positively about it on the podcast I used to do, and I may have even written about it. The device was a doorbell that alerted your smartphone. It had a built-in camera, allowing you to answer your door from anywhere you had an internet connection. Whether at the office, across the country, or in another country, when your doorbell rang you could answer it. Continue reading “Tools I No Longer Recommend: Ring Doorbell”

Five Steps to Protecting Your Home Address

Achieving comprehensive personal privacy is a complicated goal involving a lot of complex, discrete steps. On this blog I spend a lot of time focusing on the highly specific, individual steps. Often we fail to provide a lot of context for why we’re doing them, or how they fit into the bigger picture. This was called to my attention recently when an old friend contacted me. He has a legitimate safety reason to wish to be more private, and asked me for advice. Unfortunately, I don’t have a single blog post I could offer him that effectively introduces the basic steps of protecting your home address. Continue reading “Five Steps to Protecting Your Home Address”

ProtonMail Five Years Later, Part III: Security Features

I have been using ProtonMail full-time for over five years, and recommending it for almost six. This blog is littered with references to it, along with several incremental updates. A lot has changed since ProtonMail’s beginnings; this post will cover some features of ProtonMail’s premium plans: aliases and custom addresses, custom domains, multiple users, and more. Continue reading “ProtonMail Five Years Later, Part III: Security Features”