How to do End-to-End Encryption without an App (Intro to GPG)

How to do End-to-End Encryption without an App (Intro to GPG)

Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about GPG (GNU Privacy Guard – which is an Open source implementation of PGP) and you will learn how to use the Public Key infrastructure to encrypt anything end to end, even while you post in social media, private messages, and email. There’s no limit to where this can be used. This will explain the use of GPG in a simple way, without command line instructions, or even requiring the use of a specific app and a clear explanation of how it works without the technical jargon.

Is Protonmail Safe for Security and Privacy?

Is Protonmail Safe for Security and Privacy?

Is Protonmail a safe email platform for security and privacy?

This video explains the risks of emails in general and then discusses the specifics of Protonmail (which are the same as Tutanota, Startmail and other privacy email platforms). Are you in fact made safer by these platforms?

Would Snowden or John McAfee use these email platforms? Let’s find out.

What is the safest email option?

Linux Phone vs. De-Googled Android AOSP – Which is better for Privacy?

Linux Phone vs. De-Googled Android AOSP - Which is better for Privacy?

There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled) Phones. Which are better?

These two types of devices operate on different privacy principles and this video gets into how one type of device deals with data exclusion while the other approach deals with data disinformation.

Linux Phones can be Ubuntu Touch (Nexus 5, Oneplus One), Pinephone (Ubuntu Touch, Debian/Phosh, Nemo/Sailfish, etc.), Librem 5 (Phosh, Ubuntu Touch) and many new ones coming out soon.

AOSP (De-googled) include LineageOS with No GAPPS, /e/ Foundation. GrapheneOS, and my own BraxROM. These are all fine. They just use different devices. All have no Google on them and are built in a similar way.

Rental car ripoffs

Rental car ripoffs

Three cars, three teams wearing hidden cameras, and one car rental company location with a long history of complaints and overcharging. What happens when we send in our Marketplace team with some savvy consumers to fight back against those extra fees?

Perimeter Radar Alarm Electronics Project for Intrusion Detection

Perimeter Radar Alarm Electronics Project for Intrusion Detection

This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry PI (3B+ or 4B). The device will detect movement within a radius of 12 feet (4 meters) from the device with a spherical detection region. It is meant to draw a line in the sand so you clearly mark instrusions. This is different from a camera which has so much noise from everyday activity that you cannot actually tell if you have an intrusion.