What the Zuck!
Evangelizing About the Erosion of Privacy


What the Zuck!
Evangelizing About the Erosion of Privacy

Defensive Resources


VPN

A Virtual Private Network (VPN) is the number one defensive tool against Man-in-the-Middle attacks, HTTPS spoofing (by employers), and location tracking. This is the most important item in your toolkit.
VPN

A Virtual Private Network (VPN) is the number one defensive tool against Man-in-the-Middle attacks, HTTPS spoofing (by employers), and location tracking. This is the most important item in your toolkit.
Changing Online Habits

Any software or hardware solution isn't going to solve a behavior problem. There needs to be changes in habits in order for privacy to be maintained.
Changing Online Habits

Any software or hardware solution isn't going to solve a behavior problem. There needs to be changes in habits in order for privacy to be maintained.
Brax.Me - Social Media with No Footprint

There is no defense if you plaster your personal information permanently on the Internet. The Internet is unforgiving with its immense capacity to remember everything. So a planned approach of hiding your Internet footprint is an essential part of a defensive strategy.
Brax.Me - Social Media with No Footprint

There is no defense if you plaster your personal information permanently on the Internet. The Internet is unforgiving with its immense capacity to remember everything. So a planned approach of hiding your Internet footprint is an essential part of a defensive strategy.
Password Tips

Learn how to make your passwords resistant to hacking.
Password Tips

Learn how to make your passwords resistant to hacking.
Password Manager

Using a Password Manager to keep your passwords unique.
Password Manager

Using a Password Manager to keep your passwords unique.
How Big is Your Password Haystack?

Understanding how to keep hackers at bay with password complexity
How Big is Your Password Haystack?

Understanding how to keep hackers at bay with password complexity
TOR Browser

Learn about the unique capabilities of the TOR Browser
TOR Browser

Learn about the unique capabilities of the TOR Browser
TOR Wifi Router

Learn about the unique capabilities of the TOR Browser
TOR Wifi Router

Learn about the unique capabilities of the TOR Browser
Encrypted Email

Learn about the unique capabilities of the TOR Browser
Encrypted Email

Learn about the unique capabilities of the TOR Browser
Browser Isolation

Learn how to defeat the data collection attempts of Google and Facebook using supercookies using a technique I coined as browser isolation.
Browser Isolation

Learn how to defeat the data collection attempts of Google and Facebook using supercookies using a technique I coined as browser isolation.
Startpage.com

Change your search engine to Startpage.com and begin to hide your search results. You can also use Duck Duck Go. Startpage.com is a proxy search engine. It searches Google for you but anonymizes your identity.
Startpage.com

Change your search engine to Startpage.com and begin to hide your search results. You can also use Duck Duck Go. Startpage.com is a proxy search engine. It searches Google for you but anonymizes your identity.
Spotting HTTPS Snooping

How to Spot if there's an HTTPS Man-in-the-Middle.
Spotting HTTPS Snooping

How to Spot if there's an HTTPS Man-in-the-Middle.
Preventing Wifi Hacking

How to keep your Wifi Safe.
Preventing Wifi Hacking

How to keep your Wifi Safe.
Disabling Intel AMT

How to disable Intel AMT on Windows.
Disabling Intel AMT

How to disable Intel AMT on Windows.
Disinformation as Defense

How to use disinformation to confuse the surveillance machines.
Disinformation as Defense

How to use disinformation to confuse the surveillance machines.
Transacting in Bitcoin

Using Bitcoin to remove your transaction footprint.
Transacting in Bitcoin

Using Bitcoin to remove your transaction footprint.
Burner Phones

Do Burner Phones work to protect your privacy?
Burner Phones

Do Burner Phones work to protect your privacy?
Which Phones are Safe?

Which is safer, iOS or Android?
Which Phones are Safe?

Which is safer, iOS or Android?
Best Antivirus

Which is the best Antivirus?
Best Antivirus

Which is the best Antivirus?
Preventing DNS Leaks on Windows 10

DNS Leaks on Windows 10
Preventing DNS Leaks on Windows 10

DNS Leaks on Windows 10
Buy VPN
Copyright 2017 Rob Braxman - All Rights Reserved