If you’re a software developer working ethically you’re almost certainly using GnuPG to sign your work. And if you’ve been at it for any length of time you’ve almost certainly been forced to switch machines. Unless your aim is to create a new identity for each machine you use (please don’t) you need a simple, repeatable strategy moving GPG keys privately. Let me show you how.
One of the motivations behind dual-booting Linux on my MacBook Pro was to take back control of my personal data. Not just because Apple uses faux encryption on iCloud. And not because macOS has been shown to leave users open to eavesdropping exploits. But because when I use my Mac with macOS the operating system gratuitously beams out activity records1, sharing information I’d rather keep private with people I don’t personally know nor have I ever met. And without the ability to shut it off, I find my privacy – the sentient and autonomous nature of my very being – constantly under attack.
In many instances, privacy is threatened not by singular egregious acts, but by a slow series of relatively minor acts which gradually begin to add up.I've Got Nothing to Hide and Other Misunderstandings of Privacy
In this short guide I’ll show you how to encrypt and route your local Internet traffic through a fast, modern, and secure VPN tunnel called WireGuard using a free and open source operating system called Manjaro Linux. I will explain how to install WireGuard on Manjaro, share a simple means of establishing and testing an encrypted Internet connection, and leave you with next steps and personal experience to help further your understanding and gain confidence getting started.
I read an article on Medium titled How to encrypt your entire life in less than an hour. The article provided a number of tips for staying secure digitally. One of the tips was to use the Tor browser because popular browsers such as Safari and Chrome were not private enough – even in private mode.
What the author didn’t tell you was that it’s possible to increase your privacy without switching browsers using Dan Pollock's hosts file. A quick look at the file describes exactly what it does…
Ironically the reason I’m using Manjaro in the first place is because macOS itself had several zero-day vulnerabilities recently, prompting me to perform a serious back-up of macOS and all my files on iCloud.
Thankfully switching browsers is trivial compared to switching operating systems on macOS. So herein I’ll show you how to easily install a few different browsers so you can try them out and decide for yourself which you prefer.
Unless you’ve been living under a rock you already know the guy behind WikiLeaks, who was living at an Ecuadorian embassy in London, was recently arrested and now facing extradition to the United States – the country I’m originally from – and the country which forces tax payers to fund the second-largest stockpile of nuclear weaponry ever created.
But perhaps you didn’t know that WikiLeaks was at one point hosted by Amazon. Yep, right up until political pressure caused them to take it down. Afterall, nothing says freedom like a fear of misbehavior in a country with the highest incarceration rate in the entire world. I suppose Julian Assange’s situation could be worse… Maybe, had he also been practicing Falun Gong in China. But I digress. And there’s no telling what’s going to happen.
I’ve been using DuckDuckGo as my primary search engine since it was introduced to me by a colleague in Chicago. This was before I was able to close my Google account but some time after losing hundreds of photos leaving Facebook. And though I was aware DuckDuckGo maintains a hidden service for Tor users it wasn’t until recently I felt confident enough with my OS security to safely use it.
Rather than just bookmarking and using the DDG onion site, however, I decided to leverage some of the nifty URL params they’ve made available. Following is a quick rundown of the URL params I’m using to customize my DDG search experience for use with Tor. In After Dark fashion I’ve decided to name them “DarkDuckGo”.
Recently, while creating a physical back-up of my Mac, I ended up corrupting the Micro SD card I was using to perform the back-up operation. This translated into a one line cautionary alert inside the related blog post:
Turns out removing an SD card during a 100+ GB 77,000 file transfer from a Mac to an SD card isn’t the best idea – despite what a five year-old might tell you.
After several hours of toiling with Disk Utility, diskutil and dd on macOS the furthest I got was to experience the same issues as another individual who posted on Apple Exchange 3 years ago - their question unresolved, until now.
After hacking Android onto an HD2 previously running Windows Mobile I quickly became challenged with the task of recalling passwords for frequently used apps – apps like Telegram, ProtonMail, Binance, Snapchat you name it.
And although long-term password management may feel like a burdensome task to some a steadfast approach is critical for security and relatively painless for anyone who’s been using a KeePass port the last decade.
I’m no Steve Wozniak but I carry a healthy distrust of computers. After hearing of the Equifax data breach affecting the privacy of more than 145 million Americans, learning Uber paid and tried to cover up the loss of 57 million driver and passenger records and seeing the lasting impact of the Meltdown attack I’m starting to understand the gravity this quote from Woz:
I’m back in Bali after a trip to Anarchapulco and Chicago to pick up my cats. It was my first time back in the United States in over a year. Instead of a warm welcome back to my birth country I was promptly detained by a CBP officer and put in holding room while they ran a background check and attempted to obtain personal information.
After declining to give CBP my address in Bali and questioning them as to whether or not I was under arrest they were kind enough to inform me I was free to go at any time but that my passport belonged to the U.S. government and wasn’t my property.
It would appear surveillance states like post-9/11 USA don’t appreciate having their own citizens outside their visibility. That certainly wouldn’t suit the “Deep State” if such a thing existed now would it? The experience was very disheartening to say the least.