Android is one of the greatest tracking tools in the world. Google (the do good company that has more evil than the devil itself) is embedded deeply into Android and so probably knows more about than your own mother does. It starts when you turn on your cellphone and you get invited to create a new Google account or,&n...
 After covering iOS in our last entry, we are focusing on Android and most specifically on Samsung devices...which could be a little tricky!Let us start by stating that we think that Samsung is awesome! if you have a top of the line device like the Note 10 or the S10 series, then you have not only a great camera but many ex...
Before we dig deeper into Android and other phone manufacturers, let's get iOS out of the way. The newest iOS has a chip which submits your location to Apple every time you switch off your phone.even if you have location services on or off! And it will pinpoint your whereabouts even if you are using a VPN or ...
Welcome to Chapter 5 of the Privacy Cookbook, and since you've made it this far, or you are just tuning in, it probably indicates that you are someone who really cares about their privacy! And so you should, so welcome and let's now take a look at cellphone security starting with the dreaded metadata! So what is m...
Happy new year from the Privacy Advocate. I am back, alive and kicking and ready to push on with Chapter 5. Before I get stuck in, let me briefly explain what will happen in this chapter what will probably be one of the most relevant, concerning and interesting sections of the Privacy Cookbook.And that is because it is all about mobi...
As we all know, not many things stand still forever, so as part of our continuing commitment to help you take back your privacy we will be circling back to update and add to The Privacy Cookbook........today we publish a new sub-section from Chapter 1 on Google........and next week we will return with Chapter 5 covering cellphone sec...
Following on from yesterday's open letter from The Privacy Advocate, principal author of The Privacy Cookbook, in which he explained the where, why and wherefore of the project . Given that it has been a major achievement for Decentralize.Today over the past few months, we thought that re-running the first chapter in our year end round up...
Over the past three months, Decentralize.Today has been publishing a step-by-step guide to regaining and retaining control of your privacy and property on all devices, media and networks in the comprehensive guide that is growing into The Privacy Cookbook.The principal author and architect of the book, The Privacy Advocate, shares below an open let...
Lets be honest, Algo, which we covered in the last chapter of the Privacy Cookbook, is probably the best and easiest solution to get your own VPN installed, up and running. However that doesn't mean there aren't other solutions that are only a click or a few lines of script away!Some are provided directly by cloud servers and an...
​We promised you an even easier solution than we proposed in Chapter 4.3 (OPENVPN) so today we cover a setup that allows IKEv2 with strong encrypto (AES-GCM, SHA2 and P-256), and WireGuard with a built-in ad and tracking blocker!This solution is called Algo VPN! https://github.com/trailofbits/algoIt is an extremely easy setup an...
​Today we have a look on how to install OpenVPN+Pi.hole on a digitalocean. Remember it is best if you can pay with crypto but unfortunately there are not many good crypto powered solutions out there! Hetzner is great and gives way more traffic than digitalocean, but they ask for an ID even after payment was been made. This is kind of...
Since the inception of the Great Firewall of China (GFW), people there have needed to bypass that restriction in order to access many of the Internets' most popular sites and apps.VPNs are commonly used to access blocked content and services, however, in 2012, for a variety of reasons, a developer created Shadowsocks (SS) to circumvent Internet cen...
Be aware.....using a VPN is not without risks and you need to appreciate what it will and what it won't do for you.It will not keep your browser history secret, it will not provide security for non-secure (HTTP) traffic, it will not provide anonymity.However, if what you are after is to mask your activities from your internet se...
The district court in Munich has ruled that Facebook is using patented technologies that are the property of Blackberry (RIM). Although these are not hugely significant technologically in the application of their apps, it does affect everything Facebook has on the market in Germany.Millions of Germans use Instagram, WhatsApp and Facebook every day ...
Ok,,,,,so you have seen Mr.Robot, or read the news or maybe just developed a common sense that when you are on a public WiFi, that this is potentially a very serious treat to your privacy whether it be your local Starbucks, or an Airport WiFi, wherever......You can be spied upon by others on the network or by the WiFi provi...
Today's Privacy Cookbook is all about browser security. Lets start with Chrome or Chromium! If it is your main browser, do the following.....use your browser to go to https://www.mozilla.org, to download the latest Firefox and after doing that delete Chrome! Congrats you have fixed the first issue!Now lets go to step 2Let's install a...
Today we're going to talk about uBlock Origin and if you've followed the previous chapters on ad-blocking articles here is a little extra information for you. Even if you are using either of the two ad blocking apps (AdGuard Home or Pi-Hole) please use uBlock Origin additionally on top of it. Alternatively if you are a more advanced ...
AdGuard Home is the next step up when it comes to blocking ads, trackers and all the other nasty BS what haunts the interwebs!We have nextDNS covered as a possible cloud solution, we have an in-house solution with Pi-hole and today we have a look at an open source solution that we use personally.Why AdGuard Home over P...
​Today we're following up on ad and bad-blockers with a supplemental section on the Pi-hole!In the last entry of the Privacy Cookbook we talked about hostfiles. They're easy to compile and install on Windows, MacOS and Linux and you can use them as well with DNSCloak on iOS. However, there are better ways to do this, one of which would be...
​The internet is one scary place. Most people wouldn't know that as they go to their favourite website that they have no idea what else is connecting to their device. I have a crazy example: my Samsung Note 10 had most of the requested connections coming all day from Samsung.com.cn and from Baidu.com. I've never been to mainland Chin...