Time flies like an arrow - Fruit flies like a banana


A secure smartphone solution

Government officials in the Netherlands are leaving their own smartphones at home when travelling to other countries, switching instead to an old-school “dumb” phone that has no Internet connection and lacks support for apps. The “dumb phone” moniker, however, deserves a series of quotes because the Sectra Tiger lineup of handsets has been specifically developed […]

How should I store a physical written copy of my password?

You need to take your threat model into account. Will people destroy a house to get your backup password? Will anybody even look for it? Discussed here… I’m paranoid so I think everyone is after me. Found this useful – Karbon Titan 11.6L Digital Fireproof Safe The digital component allows me to let others […]

FBI answers one of my questions

My last post finished with This, of course, is good news for all of us law abiding citizens that just want to secure our personal/private/financial details. Now all we need to know is there a particular piece of hardware [eg. iPhone] or software [KeePass] that is the most used by all of these budding criminals/terrorists? […]

WPA3 WiFi Standard Announced

People say “every kick in the ass is a step forward.” Well, Belgian security researcher Mathy Vanhoef gave the WiFi Protected Access (WPA) standard a huge kick in the ass last fall when it disclosed details about KRACK, a vulnerability in the WPA2 WiFi protocol used by billions of devices. The step forward came today […]

UMatrix extension usage guide

For those of you wondering, uMatrix is a point-and-click matrix-based privacy tool, offered in the form of a Web extension for both Firefox and Chrome, and it can be used to control what domains can do while you browse. In essence, it is somewhat similar to Noscript, although the primary focus is not specifically on […]

The A-Z of 2018 Threatscape Predictions

We should all be listening to what these cybersecurity thought leaders are predicting will be shaping the threatscape in 2018… Here at IT Security Thing we end up travelling all over the world to listen to what the great and the good of the cybersecurity industry have to say. It’s a tough job, etc etc. […]

Amazon wants a key to your house

I gave a key to go into my house and drop off packages when I’m not around. After two weeks, it turns out letting strangers in has been the least troubling part of the experience. Once Amazon owned my door, I was locked into an all-Amazon world. When Amazon first floated the idea of Amazon […]

Haven: Keep Watch

Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy. It is an Android application that leverages on-device sensors to provide monitoring and protection of physical spaces. Haven turns any Android phone into a motion, sound, vibration and light detector, watching for unexpected guests and […]

Vanish © 1999 – All information on this blog is hereby released into the public domain, with no rights reserved. Frontier Theme