Tag Archives: Privacy

Is Blackphone the World’s First NSA Secure Phone?

If you’ve ever used PGP encryption to communicate over the internet, you may be familiar with its creator, Phil Zimmerman… View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , , | 18 Comments

Can Someone Steal Your Online Identity and Become You?

When the average person thinks of getting their identity stolen online, thoughts of credit card fraud typically come to mind…. View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , , , , , | 1 Comment

Protect Your Gear from Thieves with the Pacsafe Z28 Urban Security Backpack

In today’s connected and technology-driven world, it’s hard to go anywhere without the need to take along some pretty expensive… View Article

Posted in Packs | Tagged , , , , , , , , , , , , , , , , | 16 Comments

Make Your Case: How To Run a Self-Surveillance

Survivalists, preppers and even security personnel can be prone to the same shortcomings they often preach to the unprepared, making… View Article

Posted in Mindset | Tagged , , , , , , , , , , , , , | 19 Comments

Silent Circle – Military Level Encryption Brought to Your Phone

My phone started to ring. Was it really who I thought it was? The display said that the connection was… View Article

Posted in Privacy | Tagged , , , , , , , , , , , | 22 Comments

Spokeo and Why You Should Be Concerned about Your Personal Information Bubble

Before we jump into the specifics of what Spokeo.com is and what personal information it’s making available to the world… View Article

Posted in Privacy | Tagged , , , , , , , | 11 Comments

Data Leaks: Location Based Services and Why You Should be Concerned

This entry is part 4 of 4 in the series Data Leaks

4 of 4 in the series Data LeaksThis week we wrap up the Data Leaks series, explaining the ideas, and… View Article

Posted in Privacy | Tagged , , , , , , , , , , | 3 Comments