How to do End-to-End Encryption without an App (Intro to GPG)

How to do End-to-End Encryption without an App (Intro to GPG)

Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about GPG (GNU Privacy Guard – which is an Open source implementation of PGP) and you will learn how to use the Public Key infrastructure to encrypt anything end to end, even while you post in social media, private messages, and email. There’s no limit to where this can be used. This will explain the use of GPG in a simple way, without command line instructions, or even requiring the use of a specific app and a clear explanation of how it works without the technical jargon.

Is Protonmail Safe for Security and Privacy?

Is Protonmail Safe for Security and Privacy?

Is Protonmail a safe email platform for security and privacy?

This video explains the risks of emails in general and then discusses the specifics of Protonmail (which are the same as Tutanota, Startmail and other privacy email platforms). Are you in fact made safer by these platforms?

Would Snowden or John McAfee use these email platforms? Let’s find out.

What is the safest email option?

Linux Phone vs. De-Googled Android AOSP – Which is better for Privacy?

Linux Phone vs. De-Googled Android AOSP - Which is better for Privacy?

There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled) Phones. Which are better?

These two types of devices operate on different privacy principles and this video gets into how one type of device deals with data exclusion while the other approach deals with data disinformation.

Linux Phones can be Ubuntu Touch (Nexus 5, Oneplus One), Pinephone (Ubuntu Touch, Debian/Phosh, Nemo/Sailfish, etc.), Librem 5 (Phosh, Ubuntu Touch) and many new ones coming out soon.

AOSP (De-googled) include LineageOS with No GAPPS, /e/ Foundation. GrapheneOS, and my own BraxROM. These are all fine. They just use different devices. All have no Google on them and are built in a similar way.

Perimeter Radar Alarm Electronics Project for Intrusion Detection

Perimeter Radar Alarm Electronics Project for Intrusion Detection

This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry PI (3B+ or 4B). The device will detect movement within a radius of 12 feet (4 meters) from the device with a spherical detection region. It is meant to draw a line in the sand so you clearly mark instrusions. This is different from a camera which has so much noise from everyday activity that you cannot actually tell if you have an intrusion.

My Dope Advanced Home Network Setup for Privacy and Security!

My Dope Advanced Home Network Setup for Privacy and Security!

I’ll be describing a unique advanced network setup for a home that has convenient privacy and security options. I set these as objectives for the network. (1) Automatic VPN access – wired or wireless, (2) Non-VPN access wired-or wireless, (3) Ad-Blocking with Pi-Hole, (4) Wired alternatives. It’s not expensive to set up (normally it would be) and avoids rewiring an entire house with CAT 6 cabling. This setup discusses a wired VPN router with integrated pi-Hole support and wired extension solutions.