You have seen this in action/spy/Sci-Fi movies and shows, the protagonists always remove the battery of their phones to make sure it cannot be used. Read more
You have seen this in action/spy/Sci-Fi movies and shows, the protagonists always remove the battery of their phones to make sure it cannot be used. Read more
Stylometry is our personal and unique writing style. No matter who you are, you have a unique finger printable, and traceable writing style. Read more
This is the part where you should watch the documentary “The Social Dilemma” on Netflix. Read more
Tor and VPNs are not silver bullets. Many advanced techniques have been developed and studied to de-anonymize encrypted Tor traffic over the years. Read more
These have been used at least since 2008 using an attack called “Jasager” and can be done by anyone using self-built tools or using commercially available devices such as Wi-Fi Pineapple. Read more
Geolocation is not only done by using mobile antennas triangulation. It is also done using the Wi-Fi and Bluetooth devices around you. Read more
When conducting sensitive activities, remember that: Read more
RFID stands for Radio-frequency identification, it is the technology used for instance for contactless payments and various identification systems. Read more