privacy

Moving GPG Keys Privately

3 minute read Published

How to privately move your GPG keys from one machine to another.

If you’re a software developer working ethically you’re almost certainly using GnuPG to sign your work. And if you’ve been at it for any length of time you’ve almost certainly been forced to switch machines. Unless your aim is to create a new identity for each machine you use (please don’t) you need a simple, repeatable strategy moving GPG keys privately. Let me show you how.

Encrypted Internet with WireGuard

9 minute read Enclosure Updated

How to install and configure WireGuard on Manjaro Linux, a step-by-step guide.

One of the motivations behind dual-booting Linux on my MacBook Pro was to take back control of my personal data. Not just because Apple uses faux encryption on iCloud. And not because macOS has been shown to leave users open to eavesdropping exploits. But because when I use my Mac with macOS the operating system gratuitously beams out activity records1, sharing information I’d rather keep private with people I don’t personally know nor have I ever met. And without the ability to shut it off, I find my privacy – the sentient and autonomous nature of my very being – constantly under attack.

In many instances, privacy is threatened not by singular egregious acts, but by a slow series of relatively minor acts which gradually begin to add up.

I've Got Nothing to Hide and Other Misunderstandings of Privacy

In this short guide I’ll show you how to encrypt and route your local Internet traffic through a fast, modern, and secure VPN tunnel called WireGuard using a free and open source operating system called Manjaro Linux. I will explain how to install WireGuard on Manjaro, share a simple means of establishing and testing an encrypted Internet connection, and leave you with next steps and personal experience to help further your understanding and gain confidence getting started.

Beyond Incognito

2 minute read Updated

Block your computer from making requests to known ad and malware servers.

I read an article on Medium titled How to encrypt your entire life in less than an hour. The article provided a number of tips for staying secure digitally. One of the tips was to use the Tor browser because popular browsers such as Safari and Chrome were not private enough – even in private mode.

What the author didn’t tell you was that it’s possible to increase your privacy without switching browsers using Dan Pollock's hosts file. A quick look at the file describes exactly what it does…

Securely Access 08chan on ZeroNet

2 minute read Published

How to use Tor and WireGuard to access ZeroNet without revealing your IP.

Daily Beast reports 8Chan refugees are leaving DARPANet, commonly known as “the Web”, for a new home on ZeroNet and doxxing their IPs in the process.

Getting on the ZeroNet can be done more discretely, however, and it’s not hard if you’re running Linux – even if running Linux on a MacBook Pro:

Alternatives to Firefox on Manjaro Linux

6 minute read Updated

A quick rundown of Firefox browser alternatives you should be aware of.

Last week Firefox suffered multiple zero-day vulnerabilities, prompting renewed interest in a browser discussion thread on the Manjaro Forums.

Ironically the reason I’m using Manjaro in the first place is because macOS itself had several zero-day vulnerabilities recently, prompting me to perform a serious back-up of macOS and all my files on iCloud.

Thankfully switching browsers is trivial compared to switching operating systems on macOS. So herein I’ll show you how to easily install a few different browsers so you can try them out and decide for yourself which you prefer.

Surfing the Uncensorable Web

11 minute read Enclosure Published

Testing the waters of ZeroNet to enjoy a Web without information gatekeepers.

Unless you’ve been living under a rock you already know the guy behind WikiLeaks, who was living at an Ecuadorian embassy in London, was recently arrested and now facing extradition to the United States – the country I’m originally from – and the country which forces tax payers to fund the second-largest stockpile of nuclear weaponry ever created.

But perhaps you didn’t know that WikiLeaks was at one point hosted by Amazon. Yep, right up until political pressure caused them to take it down. Afterall, nothing says freedom like a fear of misbehavior in a country with the highest incarceration rate in the entire world. I suppose Julian Assange’s situation could be worse… Maybe, had he also been practicing Falun Gong in China. But I digress. And there’s no telling what’s going to happen.

DarkDuckGo

2 minute read Published

Improve your search privacy on DuckDuckGo using custom URL parameters.

I’ve been using DuckDuckGo as my primary search engine since it was introduced to me by a colleague in Chicago. This was before I was able to close my Google account but some time after losing hundreds of photos leaving Facebook. And though I was aware DuckDuckGo maintains a hidden service for Tor users it wasn’t until recently I felt confident enough with my OS security to safely use it.

Rather than just bookmarking and using the DDG onion site, however, I decided to leverage some of the nifty URL params they’ve made available. Following is a quick rundown of the URL params I’m using to customize my DDG search experience for use with Tor. In After Dark fashion I’ve decided to name them “DarkDuckGo”.

Unbrick a Micro SD Card using Tails and macOS Mojave

7 minute read Published

Learn to dual-boot a Mac using a second operating system running Linux and use it to troubleshoot hardware problems by unbricking a Micro SD card.

Recently, while creating a physical back-up of my Mac, I ended up corrupting the Micro SD card I was using to perform the back-up operation. This translated into a one line cautionary alert inside the related blog post:

Caution: DO NOT attempt to remove the SD card or adapter during this process.

Turns out removing an SD card during a 100+ GB 77,000 file transfer from a Mac to an SD card isn’t the best idea – despite what a five year-old might tell you.

After several hours of toiling with Disk Utility, diskutil and dd on macOS the furthest I got was to experience the same issues as another individual who posted on Apple Exchange 3 years ago - their question unresolved, until now.

Managing Passwords on Android

2 minute read Updated

How to secure your passwords and keep them synced between devices.

After hacking Android onto an HD2 previously running Windows Mobile I quickly became challenged with the task of recalling passwords for frequently used apps – apps like Telegram, ProtonMail, Binance, Snapchat you name it.

And although long-term password management may feel like a burdensome task to some a steadfast approach is critical for security and relatively painless for anyone who’s been using a KeePass port the last decade.

Secure Your Digital Life

8 minute read Updated

Safeguard your privacy online. Arm yourself with knowledge and use these tips, tools and techniques to secure your digital life.

I’m no Steve Wozniak but I carry a healthy distrust of computers. After hearing of the Equifax data breach affecting the privacy of more than 145 million Americans, learning Uber paid and tried to cover up the loss of 57 million driver and passenger records and seeing the lasting impact of the Meltdown attack I’m starting to understand the gravity this quote from Woz:

How Free Speech Dies

3 minute read Published

On the suppression of free speech in today’s increasingly digital world.

I’m back in Bali after a trip to Anarchapulco and Chicago to pick up my cats. It was my first time back in the United States in over a year. Instead of a warm welcome back to my birth country I was promptly detained by a CBP officer and put in holding room while they ran a background check and attempted to obtain personal information.

After declining to give CBP my address in Bali and questioning them as to whether or not I was under arrest they were kind enough to inform me I was free to go at any time but that my passport belonged to the U.S. government and wasn’t my property.

It would appear surveillance states like post-9/11 USA don’t appreciate having their own citizens outside their visibility. That certainly wouldn’t suit the “Deep State” if such a thing existed now would it? The experience was very disheartening to say the least.