Security of password managers
TL;DR you should still use one.. I had no idea how many services I was using, until I started using a password manager and…
4 min read
TL;DR you should still use one.. I had no idea how many services I was using, until I started using a password manager and…
4 min read
A tech centered overview of contact tracing and it's privacy implications. I also explain the basics of how a reasonable system would work.…
5 min read
Domain Name System [https://en.wikipedia.org/wiki/Domain_Name_System] What is it - DNS keeps records of IP addresses that correspond to domain…
4 min read
What is Tor, how it works and why you may some day need it. I go over the basics and give an overview with links to main topics.…
7 min read
First some advice for the people at home The ProtonMail [https://protonmail.com/] people have published a very good guide/checklist for working form home.…
1 min read
Here is a list of VPN services that I have some reason to believe are trustworthy or more precisely have not yet been proven to…
2 min read
So you want to feel safe surfing in cafes, hotels and conference centres, sure that people will not be able to see what you are doing online. Yet you are smart enough to know that there is nearly equal risk in making an uninformed decision on which VPN service to get.…
2 min read
What you need to know about securing your communication So what are VPNs good for? VPN stands for Virtual Private Network and I believe the…
6 min read
Links for understandable security advice that I agree with. From secure communication to evaluating your risk profile and more..…
3 min read
Update: Zoom has added end-to-end encryption (E2EE). Jitsi has also added E2EE for the latest browsers. Some parts were edited to reflect these changes. The…
5 min read