As I've  mentioned before, Linux is the way to go when you don't want to be spied on by your laptop. Perhaps you'd like Tails, as described in a previous section of this Chapter, if you are paranoid and don’t care that you don’t have a OS where you can boot up and continue from where you left off.No worries as the...
Take in all of a subject's experience, from phone numbers dialled and e-mail messages viewed to every breath taken, step made and place gone A quote from the LifeLog wiki.Talk about coincidences. On the same day that Facebook was founded, the Pentagon killed off the LifeLog project. But was it just shifted sideways and resurrected as Facebook? The ...
We started this Chapter with Windows and with Mac, explaining how to harden and secure both of these operating systems as much as practical, then spiced it up with a look at toughening Linux (ok, a bit technical but necessary as the way to a more private and secure Linux OS)  BUT... these might not be everyone's c...
Before we jump into Tails and QubesOS, let's get a hardening guide out to make your Linux system as secure and private as possible.Physical System Security1. Configure BIOS to disable booting from CD/DVD, External Devices, Floppy Drive in BIOS.2. Enable BIOS password and protect GRUB with a password to restrict physical access to&nbs...
In my latest piece on corporate 'misbehavior', I am taking a look at Alphabet Inc. Never heard of them? Well, that's because it is a company that does nothing - basically. However, founded in 2016, it is the holding company for all of the various companies, operations, services, projects and assets created, owned and/or controlled by the founders o...
​Many of today's internet users are on Windows and the rest are on Mac (truish!). And Mac is great, of course, when you also have an iPhone but then you're probably too far down the rabbit hole to get out. Windows, on the other hand, is so so deep that even rabbit couldn’t find it's way out! We covered b...
Before we jump into secure Linux distribution and what options you have to make your computer really secure, let's cover off MacOS. Firstly, I recommend to start with a fresh copy of your OS. Even though this step is optional for you, I strongly recommend you to do so.Boot into Recovery Mode Hold command + R when you boot u...
Today, as we kick off a major new initiative from the annals of the Privacy Cookbook, we feature an Open Letter from the Privacy Advocate...   I believe that the Privacy Cookbook is a great tool for helping to drive things toward a better, safer, more secure and more private internet, DNS, cellphone and PC setup in future. Even as we publ...
In the second article on corporate maleficence, I will be taking a look at the Apple Inc.Apple has shown itself to be a complete poodle when it comes to its relationship with China. During the recent mass demonstrations in Hong Kong, it pulled a crowd-sourced app from it's App Store which allowed users to track the locations of both Police and...
Before we dig deeper into Android and other phone manufacturers, let's get iOS out of the way. The newest iOS has a chip which submits your location to Apple every time you switch off your phone.even if you have location services on or off! And it will pinpoint your whereabouts even if you are using a VPN or ...
The Privacy Cookbook kicks on in Chapter 6 with PCs, where we will cover the set-up on desk & laptops. This is a big chapter as we try to cover everything from the best Operating Systems to Firewalls to DNS to VPN to Metadata protection to encrypting data and emails. Yes, it will be a long one.We want to ...
We've reached the final section of Chapter 5 of the Privacy Cookbook which deals with one final area (and it is quite significant) namely some guidance, suggestions and recommendations for those who do not root their devices and prefer/chose to use them as delivered.Firstly and very frankly, we implore you to always use an Android driven smartphone...
Today we would like to introduce you to GnuPG encryption on Android for FairEmail and within mail on iOS. Before we do this I'd like to mention you can use TutaNota or ProtonMail (sadly on Android you won't get push notifications, as the app relays on Google Services) which both offer email encryption out of the box. But le...
​If you've been following this last chapter then you will realize that we try to get you away from both Google and iCloud services as much as possible. That said, you still need some other ways to stay organized but with privacy and security.Let's now dig into what to use to have your phone experience remain on&nb...
​I think we can all agree that if you want a cellphone that is 100% private then don’t use a cellphone!Cellphones will (very nearly) always be tracking devices! Simple as that! Now the question is what do you really need it for? Is it social media? And if so, is it something like Twitter? If yes, why not look at someth...
​Having previously covered Samsung specific phones and stock android, let's go the extra mile and talk now about rooted phones. On XDA developers forum you can find almost every phone and see how to root it to find your perfect customized ROM. If you are up for a new phone, consider one that is is compatible with GrapheneOS...
Android is one of the greatest tracking tools in the world. Google (the do good company that has more evil than the devil itself) is embedded deeply into Android and so probably knows more about than your own mother does. It starts when you turn on your cellphone and you get invited to create a new Google account or,&n...
 After covering iOS in our last entry, we are focusing on Android and most specifically on Samsung devices...which could be a little tricky!Let us start by stating that we think that Samsung is awesome! if you have a top of the line device like the Note 10 or the S10 series, then you have not only a great camera but many ex...
Welcome to Chapter 5 of the Privacy Cookbook, and since you've made it this far, or you are just tuning in, it probably indicates that you are someone who really cares about their privacy! And so you should, so welcome and let's now take a look at cellphone security starting with the dreaded metadata! So what is m...
Happy new year from the Privacy Advocate. I am back, alive and kicking and ready to push on with Chapter 5. Before I get stuck in, let me briefly explain what will happen in this chapter what will probably be one of the most relevant, concerning and interesting sections of the Privacy Cookbook.And that is because it is all about mobi...