Apple M1 Hype vs Privacy – Which Wins?

Apple M1 Hype vs Privacy - Which Wins

I was faced with the decision of buying an Apple Macbook with an M1 chip but had to balance it against the privacy risks of Apple products. In order to properly weigh these risks, each one of us must truly understand the full extent of the Apple privacy risk, which in some cases surpasses Google.

Find out exactly what disgusting things Apple does and why it’s hard to justify supporting them and their fake mantra that iPhone is Privacy.

A New Phone Spy Tool? The IMU

A New Phone Spy Tool? The IMU

Here comes a new tracking device once again misused for evil purposes. The Inertial Measurement Unit (IMU) was initially developed for phones to allow for immersive games where you tilt and twist and shake the phone as game input. Then it moved it to being used for fitness by tracking the amount of physical activity you do and count your steps. But no sensor goes unobserved by the evil ones who will take advantage of these to track your every move.

Find out what the IMU sensor can do and how it can affect you. Find out how this can be evaded or if it can be evaded at all.

Defending Your Privacy with Disinformation – Top 3 Tips

Defending Your Privacy with Disinformation - Top 3 Tips

Defensive disinformation is a great tool against the data mining activities of governments and the big Internet companies like Google, Facebook, and Apple. Learn about this powerful capability that can be used by the little guy to make the data collected by the big entities become useless.

This is like asymmetric warfare. Simple tools with a big effect.

Learn about the 3 things you need to do to implement disinformation that will trip up the AI.

How to do End-to-End Encryption without an App (Intro to GPG)

How to do End-to-End Encryption without an App (Intro to GPG)

Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about GPG (GNU Privacy Guard – which is an Open source implementation of PGP) and you will learn how to use the Public Key infrastructure to encrypt anything end to end, even while you post in social media, private messages, and email. There’s no limit to where this can be used. This will explain the use of GPG in a simple way, without command line instructions, or even requiring the use of a specific app and a clear explanation of how it works without the technical jargon.

Is Protonmail Safe for Security and Privacy?

Is Protonmail Safe for Security and Privacy?

Is Protonmail a safe email platform for security and privacy?

This video explains the risks of emails in general and then discusses the specifics of Protonmail (which are the same as Tutanota, Startmail and other privacy email platforms). Are you in fact made safer by these platforms?

Would Snowden or John McAfee use these email platforms? Let’s find out.

What is the safest email option?

Linux Phone vs. De-Googled Android AOSP – Which is better for Privacy?

Linux Phone vs. De-Googled Android AOSP - Which is better for Privacy?

There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled) Phones. Which are better?

These two types of devices operate on different privacy principles and this video gets into how one type of device deals with data exclusion while the other approach deals with data disinformation.

Linux Phones can be Ubuntu Touch (Nexus 5, Oneplus One), Pinephone (Ubuntu Touch, Debian/Phosh, Nemo/Sailfish, etc.), Librem 5 (Phosh, Ubuntu Touch) and many new ones coming out soon.

AOSP (De-googled) include LineageOS with No GAPPS, /e/ Foundation. GrapheneOS, and my own BraxROM. These are all fine. They just use different devices. All have no Google on them and are built in a similar way.

Perimeter Radar Alarm Electronics Project for Intrusion Detection

Perimeter Radar Alarm Electronics Project for Intrusion Detection

This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry PI (3B+ or 4B). The device will detect movement within a radius of 12 feet (4 meters) from the device with a spherical detection region. It is meant to draw a line in the sand so you clearly mark instrusions. This is different from a camera which has so much noise from everyday activity that you cannot actually tell if you have an intrusion.