Make me invisible

New Opera browser


Opera is a web browser developed by Opera Software. The latest version is available for Microsoft Windows, OS X, and Linux operating systems, and uses the Blink layout engine. Now with a built-in ad blocker and free VPN. Opera, Portable Edition is a lightweight, customizable browser designed for speed. It’s the popular Opera™ web browser […]

How Police Trace Cellphones


A cellphone is one of the most trackable devices under the eye of American law enforcement. “Buying a burner phone correctly isn’t easy,” says Nicholas Weaver, a security- and privacy-focused computer science researcher at Berkeley University, referring to the pre-paid phones often used by criminals and terrorists. A phone carrier technique called a tower dump, […]

Tor and VPN routers


In our contemporary modern surveillance world, the traditional centralized VPN server model, I would argue, has become maybe a little challenged … if what people want is true privacy and surveillance avoidance, the concern is that this is not unlike the trouble that Tor exit nodes are known to have … We know that intelligence […]

Tracking EXIF data


What many people are unaware of is that most digital cameras, and smartphones, that shoot in JPG or TIFF formats write information on where a photograph was taken, when, and the camera used, every time the virtual shutter opens. That data is written in the “exchangeable image file format” (EXIF) standard. Criminals have started to […]

The back door to your Android


Do you own an Android Smartphone from Xiaomi, HTC, Samsung, or OnePlus? If yes, then you must be aware that almost all smartphone manufacturers provide custom ROMs like CyanogenMod, Paranoid Android, MIUI and others with some pre-loaded themes and applications to increase the device’s performance. But do you have any idea about the pre-installed apps […]

Sidestepping your lockscreen


Recently it has been discovered that a locked (or unlocked) Windows or OSX machine will automatically install any network drivers that are plug and play, thus honoring DHCP settings from this Ethernet adapter. This can apparently send privileged tokens to a sniffer in the USB dongle and allow the attacker to log them. Does anyone […]

Blue Hydra


My new neighbor was using AirDrop to move some files from his phone to his iMac. I hadn’t introduced myself yet, but I already knew his name. Meanwhile, someone with a Pebble watch was walking past, and someone named “Johnny B” was idling at the stoplight at the corner in their Volkswagen Beetle, following directions […]

Vanish © 2016 Frontier Theme