Cybersecurity

Technical security measures, threat analysis, and defensive strategies for the digital world.

Cybersecurity
Official Tor Browser logo from The Tor Project
4 min read

Browse Like a Ghost: A Beginner’s Guide to the Tor Browser

The Tor Browser (The Onion Router) is built on the Firefox foundation you likely already use, but it is designed with a completely different purpose: uncensored access and privacy. Unlike standard browsers, Tor is built to stop websites from tracking your movements. It accomplishes this by "isolating" every page you visit so ad-trackers, can’t follow you from site to site. It also tackles digital fingerprinting—the sneaky way companies identify you based on your device's unique settings. On Tor

Read More
Cybersecurity
Photo by Le Vu / Unsplash
2 min read

Using Email Subaddressing to Track and Filter Your Inbox

Creating and understanding email Subaddressing. Notice who has shared your email address and learn a method to manage your inbox.

Read More
Cybersecurity
How to prevent someone filing taxes as you, Tax Identity Theft, by requesting a PIN.
2 min read

IRS Identity Protection: PIN Request

Protect your IRS account from others by requesting an Identity Protection PIN.

Read More