Information Removal: A Strategic Approach

My friend Drew has written a fantastic guide to removing personal information from the internet. For several years this guide appeared on on a website that he recently took down. Rather than lose some of the extremely valuable work Drew created and gave to the community, he asked me to republish some of it here. I am only too happy to do so. This article is the first of some select works from Continue reading “Information Removal: A Strategic Approach”

O&O Shutup 10: Multipurpose Windows 10 Tool

One of my favorite security tools for Windows 10 is one that I also have a hard time categorizing. It is incredibly versatile and touches a lot of different aspects of security. This tool is called O&O ShutUp10. If you’re a Windows 10 user and you aren’t using this, you should definitely give it a look. Continue reading “O&O Shutup 10: Multipurpose Windows 10 Tool”

Columbia SC Surveillance Safari

I used to spend a lot of time in South Carolina’s capital city. I had regular work trips to Columbia, usually lasting two to three weeks at a time. I hadn’t been back in several years, but recently I had the opportunity to spend a weekend there, and something has changed. Columbia has implemented a very broad public surveillance system. This post will touch on the Columbia SC surveillance system and discuss some of the implications this raises. Continue reading “Columbia SC Surveillance Safari”

3DSC 2.21 – Request Your Free Annual Credit Report

Identity theft is an increasingly common crime. The fallout from an identity theft can be financially ruinous. If you are not already doing so, you should request your free annual credit report(s). Continue reading “3DSC 2.21 – Request Your Free Annual Credit Report”

3DSC 2.20 – Initiate a Credit Freeze

Identity theft is an incredibly invasive and potentially devastating form of crime.  It can cost tens of thousands of dollars, ruin credit, and consume countless hours of time.  One of the best tools for preventing identity theft is what is known as a credit freeze (sometimes called a security freeze).    Today’s task is to initiate a credit freeze for yourself and all members of your family, including your children.  If your children have a social security number they, too are vulnerable to identity theft. Continue reading “3DSC 2.20 – Initiate a Credit Freeze”

Blur Privacy Service

I’ve mentioned the Blur privacy service a lot in the past but I’ve yet to fully review it. This post will serve as review, how-to, and as a chance to point out some important security features of the service. So what is Blur and why would you want to use it? That is hard to put into a single sentence. Most importantly for me, Blur offers a one-stop location from which I can mask my email address, my phone number, and my credit card. Unlike Pay With Privacy which I detailed last week, Blur is not a single-function service. Continue reading “Blur Privacy Service” Protect Your Bank Accounts

It is no secret that I am a major fan of Blur, the privacy service that allows you to mask your email address and phone number. One of my favorite features of Blur is credit card masking – the ability to create one-time-use credit card numbers that are billed to your real credit card. A new service has come along that allows you to create one-time use credit card numbers. The service is a little bit different than Blur, and has some advantages and disadvantages. It is called Continue reading “ Protect Your Bank Accounts”

Private Internet Access for Android

This installment of the Private Internet Access series will deal with the PIA Android app. Private Internet Access for Android is, quite frankly, much more flexible than the iOS version. Unlike the iOS version, Private Internet Access for Android allows you access to almost all of the settings you have on desktop. It also allows you to deal with the VPN on a per-app basis. Continue reading “Private Internet Access for Android”

Smartphone Cellular Interface Security

This article is the second in a multi-part series about the security and privacy of a smartphone’s various radios. In last week’s post I talked about security and privacy surrouding smartphone Wi-Fi. In this post I will discuss the smartphone cellular interface. Because of the complexity of the cellular radio, this article took a little more time than usual to write. There are a number of security and privacy concerns here. Continue reading “Smartphone Cellular Interface Security”