What we do
- We currently do not use any cookies of our own.
- We do use Google Analytics.
- We do use Google Captcha.
- We do use Amazon affiliate to show purchaseable items like books that are related to the website content.
What we don't
- Sell or handover any information we may have on you, or information that is created when you visit or interact with our website.
Tell Me in English
We don't currently use any cookies of our own. We use Google Analytics, Google Captcha and Amazon Affiliate program.
This site is a reference for Operational Security (OPSEC)
Operations Security deals with identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks and application of appropriate OpSec measures. This page concerns itself mainly with the latter alongside preventive measuers.
Facebook exemplifies the axiom that if a product is free, you aren’t the customer. You are the product.
- Micahel Bazzell
Phishing is type of social engineering attack. It occurs when an attacker masquerading as a trusted entity dupes a victim into opening an email, clicking a link or sharing sensitive information
Protection against cracking and bruteforce attacks
A practice dating back many years.
An attack vector is a threat-surface upon which an attacker may exploit a target device
Parts of the Internet that run on seperate networks/protocols and thus are not indexed by regular search engines.
The (I)nvisible (I)nternet (P)roject. A fully encrypted private network layer.
A peer-to-peer platform for censorship-resistant communication and publishing
The Onion Router. Perhaps the most well known darknet
SSH (Secure Shell) is a protocol used for secure remote access
VPN (Virtual Private Network) provides privacy, anonymity and security to users by creating a connection to a private network across a public network like the Internet
Be aware if your provider saves logfiles or not (they might have their hand forced at some point if they do), or just assume all communication is secretly tapped.
Drive storage refers to the physical storage of information on personal computers, laptops or phones
These alliances share sensitive information with each other. Sensitive information could for example be regular requests of VPN log files from service provider.
Online Resources & Books
Perhaps the best password manager out there. Easy to use and plain-dead simple