Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles… Read More
Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will… Read More
Credit Freeze Part#1 Brief explanation so were all on the same page.
When you barrow money for different items in your life… Read More
Best Secure Messaging App Brief explanation so were all on the same page.
Every day in… Read More
Best Secure Messaging App Brief explanation so were all on the same page.
Every day in our modern society people communicate using… Read More
Item Tracker Tags We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point… Read More
VPN vs. Tor, How Do They Stack Up. What is the differences between VPN and Tor. Read More
Protect Yourself From Fraud Are you doing everything you can to not be a victim of fraud?… Read More
Protect Yourself From Fraud Are you doing everything you can to not be a victim of fraud? Check over our quick list to be sure. Read More
How Hackers Hack Your Accounts Password & Ways To Avoid Being Hacked Do you know how hackers get people’s information? This article will educate you on the most used methods… Read More
16 Ways You May Be Exposing Yourself to Fraud If you think filing your taxes is a nuisance now, imagine doing it after a scammer steals your identity… Read More
9 Tips for Safer Online Income Tax Filing If you think filing your taxes is a nuisance now, imagine doing it after a scammer steals your identity… Read More
4 Investment Scams The variety of investment scams out there is limited only by the imagination of the con artists who create… Read More
How to Avoid Unwanted Photos on Social Media If you spot an unwanted photo of you on your News Feed, there are things you can do Read More
A 73-year-old lured her perspective scammer to her house and had him arrested A 73-year-old knew she was being scammed. So she lured the scammer to her home and had him arrested,… Read More
Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than… Read More
A Hacker Shares His Biggest Fears A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley… Read More
Does Homeowners Insurance Cover Theft And Break-Ins? Some types of insurances cover theft and Breakins. In this article Allstate talks about the different… Read More
Rental car ripoffs Three cars, three teams wearing hidden cameras, and one car rental company location with a long history… Read More
Locksmith ripoffs: Hidden camera investigation Who do you call when you’re locked out of your home? A locksmith. But industry experts tell us some of… Read More
How Your Cell Phone Spies on You. Edward Snowden goes on Joe Rogan’s Podcast to talk about technology and privacy. Read More
It’s this SHOCKINGLY Easy to Steal a Car!? Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft… Read More
How hackers could use smart home devices to spy on you (Marketplace) Are Your Security Cameras Spying on you? Watch this shocking video investigation. Read More
Hacking Police Body Cameras Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a… Read More
Former NSA Hacker Reveals 5 Ways To Protect Yourself Online In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting… Read More
Is Your Car Safe From Hackers? An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996… Read More
Privacy and smartphone apps: What data your phone may be giving away (CBC Marketplace) Your apps you could be giving companies permission to track your location, read all your texts, access… Read More
Synthetic Identity Fraud: A New Kind of Costly ID Theft You’ve Never Heard Of Do you know what Synthetic Identity Fraud is? How do you make sure your not a victim of it? Read More
Georgia Family Says Nanny Found on Care.com Stole Their Identities Do you know who is watching your kids and who is left alone in your house? This family thought they knew… Read More
North Coast insurance agents on protecting home, finances from fire It doesn’t matter that the State Farm agent in Lower Lake, a 35-year veteran of the industry, has been… Read More
Car Hackers cause massive vehicle recall Recent news of cars being hacked has caused a massive recall of 1.4 million vehicles. But the debate… Read More
In Cyber Security, All Eyes on Car Hacking As cars have gotten more and more computerized they have greatly improved, but they have also sadly become… Read More
Blues plans will offer free, perpetual credit and fraud protection Blue Cross and Blue Shield plans, reacting to a series of massive cyberattacks that exposed millions… Read More
Moving company scams: What you need to know. If you are planning to move what should you be on the look out for? Read More
What to Do If Your Personal Data Is Stolen What to Do If Your Personal Data Is Stolen Read More
Top hacker shows us how it’s done You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and… Read More
I got hacked by an iPhone Cable. You think you’re hiding your location. You use a VPN. You turn… Read More
I got hacked by an iPhone Cable. You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big… Read More
Item Tracker Tags We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point… Read More
Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than… Read More
Who’s Spying on Your Phone in 2020? (Part 1) This is intended to be a multipart series on who’s spying on your phone. There are multiple parties spying… Read More
How Big Tech Finds Your Exact Location — Even When You’re Hiding It You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big… Read More
Big Tech is Targeting You Big Tech is collecting information on your every thought. Google has created belief maps that can actually… Read More
We have Been Chipped and Nobody Cares. – 2022 You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big… Read More
How Your Phone Works! Tech Secrets How does a mobile phone work? What is the technology involved? Why do some phones not work for some carriers?… Read More
Time to De-Google! Best Privacy Phone? 2022 is coming and it’s time to reassess the best phone choice for this coming year. The winner is the… Read More
Two Factor Authentication is a Big Tech Scam! You Must Resist! You think you’re hiding your location. You use a VPN. You turn off location permissions, and still Big… Read More
Google Watches ALL Your Devices! How to Stop It. You may think you’re protecting a computer with a VPN, Location turned off and various privacy strategies,… Read More
Is Linux Ready for Primetime? Desktop Distro Shootout! Using a Virtual Machine, we will test out 9 Linux Distros and see how they fare with user friendliness… Read More
Switch to Linux? The Real Privacy OS Should you Switch to Linux? We will discuss how Linux is made and how its organization actually influences… Read More
Vax Card Checks in Restaurants are Truly Zucked Up! This is NOT an Anti-Vax video. Vaccination Card Checks at restaurants here in Los Angeles truly a zucked… Read More
Windows 11. A Privacy Review Let’s do a deep dive on the elements of Windows 11 that impact on privacy. We’ll discuss Microsoft ID,… Read More
Apple M1 Hype vs Privacy – Which Wins? I was faced with the decision of buying an Apple Macbook with an M1 chip but had to balance it against… Read More
A Hacker Shares His Biggest Fears A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley… Read More
How many Spy Cameras are Recording you right now? Spy Cameras are getting smaller and harder to detect each year. Do you know what to look for so your… Read More
A New Phone Spy Tool? The IMU Here comes a new tracking device once again misused for evil purposes. The Inertial Measurement Unit… Read More
Defending Your Privacy with Disinformation – Top 3 Tips Defensive disinformation is a great tool against the data mining activities of governments and the big… Read More
How to do End-to-End Encryption without an App (Intro to GPG) Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about… Read More
How Device Fingerprinting Reveals Your Real Identity What is device fingerprinting? How is it different from browser fingerprinting? How can this be used… Read More
Is Protonmail Safe for Security and Privacy? Is Protonmail a safe email platform for security and privacy?
This video explains the risks of emails… Read More
Linux Phone vs. De-Googled Android AOSP – Which is better for Privacy? There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled)… Read More
Perimeter Radar Alarm Electronics Project for Intrusion Detection This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry… Read More
Creating a Disinformation Plan/OPSEC to Protect Your Security and Privacy This video is about managing DISINFORMATION for your benefit. Are you a YouTube creator? Are you big… Read More
My Dope Advanced Home Network Setup for Privacy and Security! I’ll be describing a unique advanced network setup for a home that has convenient privacy and security… Read More
Why You Have No Privacy, and How to Get It Back. (Mostly.) Big tech is constantly building a profile on you using many different sources. At a certain number of… Read More
Mysterious Binary Blobs that make your Phone Unsafe What are these binary blobs that make your phone unsafe? Find out some real dangers with proprietary… Read More
Can LInux Phones Succeed? The critics are out and some people are saying that Linux phones have no chance of gaining traction…. Read More
Most Secure, Private and Usable Linux Distro Discussing the different Linux distros that are focused on security and privacy but can be used as a… Read More
How Holidays Ruined My Internet Privacy (and how I fixed it) The Holiday season is starting once again and this reminds me of how my family ruins my privacy each… Read More
My New GNU/Linux Phone is Coming Soon! (Pinephone) I just ordered my Pinephone from Pine64. This is the Braveheart edition and it is slated to arrive in… Read More
Privacy. That’s NOT iPhone! Apple released a new ad program that has the headline ‘Privacy. That’s Iphone’. We will debunk this… Read More
Review of a Made for Linux Ultrabook – Star Labtop Mk III Full review of a Made for Linux Latop – the Star Labtop Mk III from StarLabs Systems. This is an ultrabook… Read More
Is loading the Android Custom ROM – LineageOS Safe for Privacy? Is it a good idea to change your Android phone to LineageOS (a custom ROM build over Android Open Source… Read More
5 Ways Tech Crimes are Getting Creepier As the world gets more and more advanced criminals exploiting technology to victimize people becomes… Read More
5 Ways Tech Crimes are Getting Creepier As the world gets more and more advanced criminals exploiting technology to victimize people becomes… Read More
Best Privacy Focused Laptops (Linux) in 2019 (4th Quarter) What are the best laptops in late 2019 with a privacy focus? These are hard to find and especially when… Read More
How Your Cell Phone Spies on You. Edward Snowden goes on Joe Rogan’s Podcast to talk about technology and privacy. Read More
How to Install GNU/Linux UBPorts Ubuntu Touch on Oneplus One (and Nexus 5) Here’s a guide to installing Ubuntu Touch from UBports, a GNU/Linux mobile platform forked from the original… Read More
Why wait till 2020 to get a GNU/Linux Phone? You can get one today! Do you have to wait until 2020 to get a GNU/Linux Phone? Are you waiting on the Librem 5 or the Pinephone…. Read More
Comparing Linux Phones: Librem 5 and Pinephone Comparing the Librem 5 vs Pinephone specifications. Also a comparison against an iPhone. Discussion of… Read More
Is Encrypted DNS Good for Privacy? New changes coming to the Internet! Google about to start Encrypted DNS, or DNS over HTTPS (DoH), or… Read More
Backdoor to your Phone – Part 2 Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control… Read More
Backdoor to your Phone – Part 1 Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control… Read More
Setting Up Your New Computer Safely Learn how to setup up your brand new computer safely to prevent malware and viruses. These techniques… Read More
It’s this SHOCKINGLY Easy to Steal a Car!? Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft… Read More
5 Cybercrimes That Scored Millions and Got Away with It We are not trying to glorify any criminal act. But it is important to talk about them so people can learn… Read More
Stealing Data Over Open WiFi The data goes… through, the pineapple? *zooms in super-tight on face* *then zooms in super-tight on… Read More
USB Drive That Steals Files Computer and technology crimes are wrong and we do not encourage them. But it is important to know what… Read More
Hacking Police Body Cameras Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a… Read More
Former NSA Hacker Reveals 5 Ways To Protect Yourself Online In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting… Read More
Using Credit Card Skimmers What are Credit Card Skimmers and how do they work? What can you do to be less likely to be a victim? Read More
Is Your Car Safe From Hackers? An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996… Read More
Why People Still Fall for the Nigerian Email Scam Brian stumbled onto the perfect get-rich-quick scheme! Then some men in suits showed up, and this informative… Read More
Detecting a Wire and Hidden Spy Cams Jason started getting really paranoid so we all unanimously decided to do an episode about detecting… Read More
Hacking With SQL Injection Attacks (and Where to Practice Them Safely) What is an SQL Injection and could your IT Department be vulnerable to it? Read More
Easily Accessing the Hidden Deep Web What is the Dark Web? How do people access it? Read More
Why You Need a Burner Phone Brian and Jason talk about the ins and outs of burner phones. Read More
Top hacker shows us how it’s done You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and… Read More
Privacy
Item Tracker Tags We all loose things in our busy modern day lives. Maybe some… Read More
Item Tracker Tags We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point… Read More
Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than… Read More
Who’s Spying on Your Phone in 2020? (Part 1) This is intended to be a multipart series on who’s spying on your phone. There are multiple parties spying… Read More
A Hacker Shares His Biggest Fears A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley… Read More
How many Spy Cameras are Recording you right now? Spy Cameras are getting smaller and harder to detect each year. Do you know what to look for so your… Read More
A New Phone Spy Tool? The IMU Here comes a new tracking device once again misused for evil purposes. The Inertial Measurement Unit… Read More
Defending Your Privacy with Disinformation – Top 3 Tips Defensive disinformation is a great tool against the data mining activities of governments and the big… Read More
How to do End-to-End Encryption without an App (Intro to GPG) Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about… Read More
How Device Fingerprinting Reveals Your Real Identity What is device fingerprinting? How is it different from browser fingerprinting? How can this be used… Read More
Is Protonmail Safe for Security and Privacy? Is Protonmail a safe email platform for security and privacy?
This video explains the risks of emails… Read More
Linux Phone vs. De-Googled Android AOSP – Which is better for Privacy? There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled)… Read More
Perimeter Radar Alarm Electronics Project for Intrusion Detection This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry… Read More
Creating a Disinformation Plan/OPSEC to Protect Your Security and Privacy This video is about managing DISINFORMATION for your benefit. Are you a YouTube creator? Are you big… Read More
My Dope Advanced Home Network Setup for Privacy and Security! I’ll be describing a unique advanced network setup for a home that has convenient privacy and security… Read More
Can LInux Phones Succeed? The critics are out and some people are saying that Linux phones have no chance of gaining traction…. Read More
Most Secure, Private and Usable Linux Distro Discussing the different Linux distros that are focused on security and privacy but can be used as a… Read More
How Holidays Ruined My Internet Privacy (and how I fixed it) The Holiday season is starting once again and this reminds me of how my family ruins my privacy each… Read More
My New GNU/Linux Phone is Coming Soon! (Pinephone) I just ordered my Pinephone from Pine64. This is the Braveheart edition and it is slated to arrive in… Read More
Privacy. That’s NOT iPhone! Apple released a new ad program that has the headline ‘Privacy. That’s Iphone’. We will debunk this… Read More
Is loading the Android Custom ROM – LineageOS Safe for Privacy? Is it a good idea to change your Android phone to LineageOS (a custom ROM build over Android Open Source… Read More
Best Privacy Focused Laptops (Linux) in 2019 (4th Quarter) What are the best laptops in late 2019 with a privacy focus? These are hard to find and especially when… Read More
How Your Cell Phone Spies on You. Edward Snowden goes on Joe Rogan’s Podcast to talk about technology and privacy. Read More
Backdoor to your Phone – Part 2 Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control… Read More
Setting Up Your New Computer Safely Learn how to setup up your brand new computer safely to prevent malware and viruses. These techniques… Read More
It’s this SHOCKINGLY Easy to Steal a Car!? Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft… Read More
Hacking Police Body Cameras Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a… Read More
Is Your Car Safe From Hackers? An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996… Read More
Top hacker shows us how it’s done You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and… Read More
Avoiding Civil Disturbances! OG is back and in this installment he shares some riot survival… Read More
Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will… Read More
Credit Freeze Part#1 Brief explanation so were all on the same page.
When you barrow money for different items in your life… Read More
Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles… Read More
Credit Freeze Part #2 Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will… Read More
Credit Freeze Part#1 Brief explanation so were all on the same page.
When you barrow money for different items in your life… Read More










