Yesterday’s post covered the initial device setup for my Private iPod Phone. Today’s post will go through the settings that impact privacy and security. The goal of these settings is to make the device as inherently hardened as possible. These changes are designed to lower the footprint of the iPod by limiting the amount of information it transmits, making it less trackable, and generally less “noisy”. These are all important factors to me when creating my ultra-private iPod phone. Many of these settings can also be applied to your iPhone. Continue reading “My Ultra-Private iPod Phone 3”
Since beginning the Lock Safari series of articles I have been asked by several of you about physical security books. Today’s post will quickly cover the four most useful volumes in my library that pertain to physical security. Some of these books are quite costly; I am not suggesting you need them all. For this reason I have broken them down into categories. Exactly half of these books deal with defeating lock through lock picking or other methodology. I believe an understanding of these techniques is crucial to understanding how to counter them. This doesn’t mean you need to be a master locksmith or expert lock picker – you don’t. But if you understand the principles of how these exploits work, you can better understand how to protect your home.