Time flies like an arrow - Fruit flies like a banana

Smart firewalls for your home

With so much new tech being introduced to our homes every year, it’s not a surprise that some extra security maintenance needs to be implemented. In general, I’m pretty low maintenance (like I don’t even buy clothes that require me to take them to a dry cleaners), so I don’t have too many smart devices […]

End of Privacy Is Here

Privacy is for paedos. Google knows what you’re looking for. Facebook knows what you like. The CIA knows how to use your TV/Smartphone to spy on you. Your communications are being monitored 24X7. Still think you have privacy? If you still think you have privacy, 21-year-old Russian photographer Egor Tsvetkov will convince you to think […]

The benefits of shadow IT

Shadow IT is the use by employees of unauthorised cloud applications and services, such as Dropbox, Google Docs and OneDrive. This definition does not imply these apps and services are inherently dangerous or insecure, simply that they have not been authorised for use by the IT department and so are often invisible to security controls. This […]

The CIA didn’t break Signal

There’s been one particularly misleading claim today: That the CIA’s in-house hackers “bypassed” the encryption used by popular secure-chat software Signal [and WhatsApp, but who uses that?] By specifically mentioning these apps, news outlets implied that the agency has a means of getting through the protections built into the chat systems. It doesn’t. Instead, it […]


Jitsi – another ES approved app. Jitsi is an audio/video Internet phone and instant messenger written in Java. It supports some of the most popular instant messaging and telephony protocols such as SIP, Jabber/XMPP, AIM, ICQ, MSN, Yahoo! Messenger.  

Vanish © 2016       All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved. Frontier Theme