Our Articles


Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles… Read More


Freeze Vs Lock Part2


Freeze Vs Lock Part1



Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will… Read More

Credit Freeze Part#1 Brief explanation so were all on the same page.
When you barrow money for different items in your life… Read More

Our Reviews


Best Secure Messaging App Brief explanation so were all on the same page.
Every day in… Read More


Hand of woman using smartphone on wooden table,Space for text or


Item Tracker Tags


Business, Technology, Internet and network concept. VPN network



Best Secure Messaging App Brief explanation so were all on the same page.
Every day in our modern society people communicate using… Read More

Item Tracker Tags We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point… Read More

VPN vs. Tor, How Do They Stack Up. What is the differences between VPN and Tor. Read More

In The News


Protect Yourself From Fraud Are you doing everything you can to not be a victim of fraud?… Read More


allstate-logo


How-hackers-hack


Logo-Bank-of-the-West


Logo-Bank-of-the-West



Protect Yourself From Fraud Are you doing everything you can to not be a victim of fraud? Check over our quick list to be sure. Read More

How Hackers Hack Your Accounts Password & Ways To Avoid Being Hacked Do you know how hackers get people’s information? This article will educate you on the most used methods… Read More

16 Ways You May Be Exposing Yourself to Fraud If you think filing your taxes is a nuisance now, imagine doing it after a scammer steals your identity… Read More

9 Tips for Safer Online Income Tax Filing If you think filing your taxes is a nuisance now, imagine doing it after a scammer steals your identity… Read More

4 Investment Scams The variety of investment scams out there is limited only by the imagination of the con artists who create… Read More

How to Avoid Unwanted Photos on Social Media If you spot an unwanted photo of you on your News Feed, there are things you can do Read More

A 73-year-old lured her perspective scammer to her house and had him arrested A 73-year-old knew she was being scammed. So she lured the scammer to her home and had him arrested,… Read More

Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than… Read More

A Hacker Shares His Biggest Fears A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley… Read More

Does Homeowners Insurance Cover Theft And Break-Ins? Some types of insurances cover theft and Breakins. In this article Allstate talks about the different… Read More

Rental car ripoffs Three cars, three teams wearing hidden cameras, and one car rental company location with a long history… Read More

Locksmith ripoffs: Hidden camera investigation Who do you call when you’re locked out of your home? A locksmith. But industry experts tell us some of… Read More

How Your Cell Phone Spies on You. Edward Snowden goes on Joe Rogan’s Podcast to talk about technology and privacy. Read More

It’s this SHOCKINGLY Easy to Steal a Car!? Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft… Read More

How hackers could use smart home devices to spy on you (Marketplace) Are Your Security Cameras Spying on you? Watch this shocking video investigation. Read More

Hacking Police Body Cameras Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a… Read More

Former NSA Hacker Reveals 5 Ways To Protect Yourself Online In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting… Read More

Is Your Car Safe From Hackers? An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996… Read More

Privacy and smartphone apps: What data your phone may be giving away (CBC Marketplace) Your apps you could be giving companies permission to track your location, read all your texts, access… Read More

Synthetic Identity Fraud: A New Kind of Costly ID Theft You’ve Never Heard Of Do you know what Synthetic Identity Fraud is? How do you make sure your not a victim of it? Read More

Georgia Family Says Nanny Found on Care.com Stole Their Identities Do you know who is watching your kids and who is left alone in your house? This family thought they knew… Read More

North Coast insurance agents on protecting home, finances from fire It doesn’t matter that the State Farm agent in Lower Lake, a 35-year veteran of the industry, has been… Read More

Car Hackers cause massive vehicle recall Recent news of cars being hacked has caused a massive recall of 1.4 million vehicles. But the debate… Read More

In Cyber Security, All Eyes on Car Hacking As cars have gotten more and more computerized they have greatly improved, but they have also sadly become… Read More

Blues plans will offer free, perpetual credit and fraud protection Blue Cross and Blue Shield plans, reacting to a series of massive cyberattacks that exposed millions… Read More

Moving company scams: What you need to know. If you are planning to move what should you be on the look out for? Read More

What to Do If Your Personal Data Is Stolen What to Do If Your Personal Data Is Stolen Read More

Top hacker shows us how it’s done You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and… Read More

Technology


I got hacked by an iPhone Cable. You think you’re hiding your location. You use a VPN. You turn… Read More


How Big Tech Finds Your Exact Location -- Even When You're Hiding It


Item Tracker Tags


Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries


Who's Spying on Your Phone in 2020?



I got hacked by an iPhone Cable. You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big… Read More

Item Tracker Tags We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point… Read More

Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than… Read More

Who’s Spying on Your Phone in 2020? (Part 1) This is intended to be a multipart series on who’s spying on your phone. There are multiple parties spying… Read More

How Big Tech Finds Your Exact Location — Even When You’re Hiding It You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big… Read More

Big Tech is Targeting You Big Tech is collecting information on your every thought. Google has created belief maps that can actually… Read More

We have Been Chipped and Nobody Cares. – 2022 You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big… Read More

How Your Phone Works! Tech Secrets How does a mobile phone work? What is the technology involved? Why do some phones not work for some carriers?… Read More

Time to De-Google! Best Privacy Phone? 2022 is coming and it’s time to reassess the best phone choice for this coming year. The winner is the… Read More

Two Factor Authentication is a Big Tech Scam! You Must Resist! You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big… Read More

Google Watches ALL Your Devices! How to Stop It. You may think you’re protecting a computer with a VPN, Location turned off and various privacy strategies,… Read More

Is Linux Ready for Primetime? Desktop Distro Shootout! Using a Virtual Machine, we will test out 9 Linux Distros and see how they fare with user friendliness… Read More

Switch to Linux? The Real Privacy OS Should you Switch to Linux? We will discuss how Linux is made and how its organization actually influences… Read More

Vax Card Checks in Restaurants are Truly Zucked Up! This is NOT an Anti-Vax video. Vaccination Card Checks at restaurants here in Los Angeles truly a zucked… Read More

Windows 11. A Privacy Review Let’s do a deep dive on the elements of Windows 11 that impact on privacy. We’ll discuss Microsoft ID,… Read More

Apple M1 Hype vs Privacy – Which Wins? I was faced with the decision of buying an Apple Macbook with an M1 chip but had to balance it against… Read More

A Hacker Shares His Biggest Fears A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley… Read More

How many Spy Cameras are Recording you right now? Spy Cameras are getting smaller and harder to detect each year. Do you know what to look for so your… Read More

A New Phone Spy Tool? The IMU Here comes a new tracking device once again misused for evil purposes. The Inertial Measurement Unit… Read More

Defending Your Privacy with Disinformation – Top 3 Tips Defensive disinformation is a great tool against the data mining activities of governments and the big… Read More

How to do End-to-End Encryption without an App (Intro to GPG) Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about… Read More

How Device Fingerprinting Reveals Your Real Identity What is device fingerprinting? How is it different from browser fingerprinting? How can this be used… Read More

Is Protonmail Safe for Security and Privacy? Is Protonmail a safe email platform for security and privacy?
This video explains the risks of emails… Read More

Linux Phone vs. De-Googled Android AOSP – Which is better for Privacy? There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled)… Read More

Perimeter Radar Alarm Electronics Project for Intrusion Detection This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry… Read More

Creating a Disinformation Plan/OPSEC to Protect Your Security and Privacy This video is about managing DISINFORMATION for your benefit. Are you a YouTube creator? Are you big… Read More

My Dope Advanced Home Network Setup for Privacy and Security! I’ll be describing a unique advanced network setup for a home that has convenient privacy and security… Read More

Why You Have No Privacy, and How to Get It Back. (Mostly.) Big tech is constantly building a profile on you using many different sources. At a certain number of… Read More

Mysterious Binary Blobs that make your Phone Unsafe What are these binary blobs that make your phone unsafe? Find out some real dangers with proprietary… Read More

Can LInux Phones Succeed? The critics are out and some people are saying that Linux phones have no chance of gaining traction…. Read More

Most Secure, Private and Usable Linux Distro Discussing the different Linux distros that are focused on security and privacy but can be used as a… Read More

How Holidays Ruined My Internet Privacy (and how I fixed it) The Holiday season is starting once again and this reminds me of how my family ruins my privacy each… Read More

My New GNU/Linux Phone is Coming Soon! (Pinephone) I just ordered my Pinephone from Pine64. This is the Braveheart edition and it is slated to arrive in… Read More

Privacy. That’s NOT iPhone! Apple released a new ad program that has the headline ‘Privacy. That’s Iphone’. We will debunk this… Read More

Review of a Made for Linux Ultrabook – Star Labtop Mk III Full review of a Made for Linux Latop – the Star Labtop Mk III from StarLabs Systems. This is an ultrabook… Read More

Is loading the Android Custom ROM – LineageOS Safe for Privacy? Is it a good idea to change your Android phone to LineageOS (a custom ROM build over Android Open Source… Read More

5 Ways Tech Crimes are Getting Creepier As the world gets more and more advanced criminals exploiting technology to victimize people becomes… Read More

5 Ways Tech Crimes are Getting Creepier As the world gets more and more advanced criminals exploiting technology to victimize people becomes… Read More

Best Privacy Focused Laptops (Linux) in 2019 (4th Quarter) What are the best laptops in late 2019 with a privacy focus? These are hard to find and especially when… Read More

How Your Cell Phone Spies on You. Edward Snowden goes on Joe Rogan’s Podcast to talk about technology and privacy. Read More

How to Install GNU/Linux UBPorts Ubuntu Touch on Oneplus One (and Nexus 5) Here’s a guide to installing Ubuntu Touch from UBports, a GNU/Linux mobile platform forked from the original… Read More

Why wait till 2020 to get a GNU/Linux Phone? You can get one today! Do you have to wait until 2020 to get a GNU/Linux Phone? Are you waiting on the Librem 5 or the Pinephone…. Read More

Comparing Linux Phones: Librem 5 and Pinephone Comparing the Librem 5 vs Pinephone specifications. Also a comparison against an iPhone. Discussion of… Read More

Is Encrypted DNS Good for Privacy? New changes coming to the Internet! Google about to start Encrypted DNS, or DNS over HTTPS (DoH), or… Read More

Backdoor to your Phone – Part 2 Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control… Read More

Backdoor to your Phone – Part 1 Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control… Read More

Setting Up Your New Computer Safely Learn how to setup up your brand new computer safely to prevent malware and viruses. These techniques… Read More

It’s this SHOCKINGLY Easy to Steal a Car!? Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft… Read More

5 Cybercrimes That Scored Millions and Got Away with It We are not trying to glorify any criminal act. But it is important to talk about them so people can learn… Read More

Stealing Data Over Open WiFi The data goes… through, the pineapple? *zooms in super-tight on face* *then zooms in super-tight on… Read More

USB Drive That Steals Files Computer and technology crimes are wrong and we do not encourage them. But it is important to know what… Read More

Hacking Police Body Cameras Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a… Read More

Former NSA Hacker Reveals 5 Ways To Protect Yourself Online In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting… Read More

Using Credit Card Skimmers What are Credit Card Skimmers and how do they work? What can you do to be less likely to be a victim? Read More

Is Your Car Safe From Hackers? An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996… Read More

Why People Still Fall for the Nigerian Email Scam Brian stumbled onto the perfect get-rich-quick scheme! Then some men in suits showed up, and this informative… Read More

Detecting a Wire and Hidden Spy Cams Jason started getting really paranoid so we all unanimously decided to do an episode about detecting… Read More

Hacking With SQL Injection Attacks (and Where to Practice Them Safely) What is an SQL Injection and could your IT Department be vulnerable to it? Read More

Easily Accessing the Hidden Deep Web What is the Dark Web? How do people access it? Read More

Why You Need a Burner Phone Brian and Jason talk about the ins and outs of burner phones. Read More

Top hacker shows us how it’s done You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and… Read More

Privacy


Item Tracker Tags We all loose things in our busy modern day lives. Maybe some… Read More


Item Tracker Tags


Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries


Who's Spying on Your Phone in 2020?


A Hacker Shares His Biggest Fears



Item Tracker Tags We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point… Read More

Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than… Read More

Who’s Spying on Your Phone in 2020? (Part 1) This is intended to be a multipart series on who’s spying on your phone. There are multiple parties spying… Read More

A Hacker Shares His Biggest Fears A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley… Read More

How many Spy Cameras are Recording you right now? Spy Cameras are getting smaller and harder to detect each year. Do you know what to look for so your… Read More

A New Phone Spy Tool? The IMU Here comes a new tracking device once again misused for evil purposes. The Inertial Measurement Unit… Read More

Defending Your Privacy with Disinformation – Top 3 Tips Defensive disinformation is a great tool against the data mining activities of governments and the big… Read More

How to do End-to-End Encryption without an App (Intro to GPG) Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about… Read More

How Device Fingerprinting Reveals Your Real Identity What is device fingerprinting? How is it different from browser fingerprinting? How can this be used… Read More

Is Protonmail Safe for Security and Privacy? Is Protonmail a safe email platform for security and privacy?
This video explains the risks of emails… Read More

Linux Phone vs. De-Googled Android AOSP – Which is better for Privacy? There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled)… Read More

Perimeter Radar Alarm Electronics Project for Intrusion Detection This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry… Read More

Creating a Disinformation Plan/OPSEC to Protect Your Security and Privacy This video is about managing DISINFORMATION for your benefit. Are you a YouTube creator? Are you big… Read More

My Dope Advanced Home Network Setup for Privacy and Security! I’ll be describing a unique advanced network setup for a home that has convenient privacy and security… Read More

Can LInux Phones Succeed? The critics are out and some people are saying that Linux phones have no chance of gaining traction…. Read More

Most Secure, Private and Usable Linux Distro Discussing the different Linux distros that are focused on security and privacy but can be used as a… Read More

How Holidays Ruined My Internet Privacy (and how I fixed it) The Holiday season is starting once again and this reminds me of how my family ruins my privacy each… Read More

My New GNU/Linux Phone is Coming Soon! (Pinephone) I just ordered my Pinephone from Pine64. This is the Braveheart edition and it is slated to arrive in… Read More

Privacy. That’s NOT iPhone! Apple released a new ad program that has the headline ‘Privacy. That’s Iphone’. We will debunk this… Read More

Is loading the Android Custom ROM – LineageOS Safe for Privacy? Is it a good idea to change your Android phone to LineageOS (a custom ROM build over Android Open Source… Read More

Best Privacy Focused Laptops (Linux) in 2019 (4th Quarter) What are the best laptops in late 2019 with a privacy focus? These are hard to find and especially when… Read More

How Your Cell Phone Spies on You. Edward Snowden goes on Joe Rogan’s Podcast to talk about technology and privacy. Read More

Backdoor to your Phone – Part 2 Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control… Read More

Setting Up Your New Computer Safely Learn how to setup up your brand new computer safely to prevent malware and viruses. These techniques… Read More

It’s this SHOCKINGLY Easy to Steal a Car!? Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft… Read More

Hacking Police Body Cameras Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a… Read More

Is Your Car Safe From Hackers? An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996… Read More

Top hacker shows us how it’s done You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and… Read More

Personal Defense


Avoiding Civil Disturbances! OG is back and in this installment he shares some riot survival… Read More


Freeze Vs Lock Part2


Freeze Vs Lock Part1



Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will… Read More

Credit Freeze Part#1 Brief explanation so were all on the same page.
When you barrow money for different items in your life… Read More

Technology


Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles… Read More


Freeze Vs Lock Part2


Freeze Vs Lock Part1



Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will… Read More

Credit Freeze Part#1 Brief explanation so were all on the same page.
When you barrow money for different items in your life… Read More