Time flies like an arrow - Fruit flies like a banana

Different Ways of Using Tor

Recent events have brought into question the reliability and safety of the Tor network. Predominantly, the main issue is the repeated incidences of internet users using Tor to facilitate criminal activities and evade law enforcement agencies. Although Tor browser is still the go-to tool when looking for anonymity on the internet, there are other tools […]

Double VPN

Double VPN is a technology that hides online activity behind several servers inter connected via VPN-tunnel. A client is connected to one server which in turn redirects traffic to the second server, with that the traffic is subjected to several encoding steps. I saw a reminder of this in an “advertorial” published in the March 2017 […]


The first edition of Cobbler (“Mono”) is now available. I wrote it as I did not feel comfortable with either cloud-based or local, browser integrated password managers. Cobbler looks just like a standard text editor, but it can store any type of sensitive information in a tiny fixed-size encrypted and authenticated container. Examples of sensitive […]


When you protest for a cause, alongside thousands of people, it is very likely that the mobile network will stop working on everyone’s smartphone. This happens because there are too many smartphones in a small space and the mobile network can’t handle so many connections from the same place. When this happens, you can no […]

Signal video

Even as the encryption app Signal became the go-to private communications channel for activists, journalists, politicians, and more, its encrypted calling feature remained less than perfect. It lacks video, often drops calls, and doesn’t always integrate with your phone’s existing features. A Signal update gradually rolling out now upgrades the calling features and adds video, […]

A beginner’s guide to encryption

Encryption keeps some of your most vital data safe. It protects your credit card information from being stolen by anyone eavesdropping on your Internet traffic when you make purchases online. It’s also used to keep medical information secure, protect free speech, and defend against surveillance. Increasingly, encryption is becoming widely available by default on consumer […]

Secret Service unlocks phone data

At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations. When it comes to breaking into phones, it’s tougher to access devices that aren’t as popular as iPhones or Samsungs, according to investigators. Most forensics technology developers […]

Lineage OS

You’ve probably read the news articles. If you haven’t, please see the following: So, yes, this is us. LineageOS will be a continuation of what CyanogenMod was. This is the definition of open. A company pulling their support out of an open source project does not mean it has to die.

Vanish © 2016 Frontier Theme