Complete Privacy & Security Podcast Episode 020: Using Yubikeys for Enhanced Security
Complete Privacy & Security Podcast Episode 019: PIA Is Here to Discuss VPNs
This post will discuss the security and privacy implications of Find My iPhone. This feature has some excellent benefits, but there are also some concerns around its use.
I admit being deeply distrustful of cloud storage generally. Cloud storage servers containing large amounts of data are natural targets for hackers. This was famously demonstrated with the 2014 breaches of over 100 celebrities’ iCloud accounts. Information stored in the cloud may also be vulnerable in transit, is stored on hardware you do not control, and may be impossible to fully delete.
Complete Privacy & Security Podcast Episode 018: Listener Questions Part III This week we tackle another round of listener questions about digital privacy and security.
Encryption is a hot topic these days. I write about both encryption and physical security on this blog, and some people find this curious. I believe there is a good deal of overlap in these two topics, however. This post will discuss encryption versus physical security, and why each matters in protecting data.
Have you ever wondered if someone had messed with your stuff while you were gone? There is a neat, new way to find out. The Photo Trap app from Escape the Wolf allows you to take a “before” picture and easily compare it with an “after” picture. With the app you can easily tell if anything has been moved. Here’s how it works
The Complete Privacy & Security Podcast Episode 017: Andy Yen of ProtonMail This week we sit down with ProtonMail CEO Andy Yen to discuss secure email communications.
Apple’s iTunes and iCloud applications are both extremely important. Both allow you the ability to conduct backups and do file transfers. Both have some challenges and some slightly different capabilities however. Today I am going to cover some iTunes security features that you should be using.
Michael and I were interviewed by vpnMentor this week. If you’re interested in some backstory on how we got into privacy and security, etc., check it out