Security

2m

Block your computer from making requests to known ad and malware servers.

I read an article on Medium titled How to encrypt your entire life in less than an hour. The article provided a number of tips for staying secure digitally. One of the tips was to use the Tor browser because popular browsers such as Safari and Chrome were not private enough – even in private mode.

What the author didn’t tell you was that it’s possible to increase your privacy without switching browsers using Dan Pollock’s hosts file. A quick look at the file describes exactly what it does…

Safeguard your privacy online. Arm yourself with knowledge and use these tips, tools and techniques to secure your digital life.

I’m no Steve Wozniak but I carry a healthy distrust of computers. After hearing of the Equifax data breach affecting the privacy of more than 145 million Americans, learning Uber paid and tried to cover up the loss of 57 million driver and passenger records, seeing the impact of the hugely problematic SEC database hack on national stock exchanges and, finally, witnessing the Meltdown and Spectre mass surveillance backdoor I’m really starting to feel the gravity this quote from Woz:

Never trust a computer you can't throw out a window.

Steve Wozniak

Securing your cryptocurrency with Google Authenticator? That decision may make you angry one day. But that's okay because Authy is here to save the day.

The first thing you need to learn when you start working with Bitcoin is to set-up 2FA. The most common forms of two-factor auth today are standard telephony and security tokens, which come in both the soft and hard variety.

If we took hard U2F tokens off the table, we’re left with software and telephony. Which of the two would you choose? Well, it depends. Let’s explore.

Connecting devices like the RPi or Apple TV to public networks requiring browser-based auth can be a drag. But that shouldn't stop you from hacking your way in. Find out how.

Imagine your sitting at a coworking cafe in Bali after your last gadget run to Sim Lim Square where you picked up a CCTV Wi-Fi camera to protect your Bitcoin mining rig.

You unbox your new toy only to realize you can’t connect it because the cafe you’re sitting at is using a captive portal.

Gah! What to do… Shell into the device and use wget or curl? Fuggetaboutit.

You reach into your Tortuga carry-on bag, pull out your laptop and do the only sensible thing you can think of—spoof the device’s MAC address.

Here’s how to easily spoof the MAC address of an IoT device using macOS.