How to Recover From Being Doxed

If you have never heard of doxing before, it's about time. Carelessness is probably one of the most notorious causes of allowing yourself to be doxed. The best way to avoid being doxed, is to not allow yourself to be doxed in the first place. If you didn't know, doxing is the act of releasing personalable identifiable information to the public, for anyone to see. In the eyes of the perpetuater it is preferable for as many people as possible to see this information. Why would anyone do this? Some do it in the name of Hacktivism (to promote a...


Continue reading...

Decentralization vs. Google (Alphabet)

We can all agree that Alphabet is quite a large conglomerate owning many different companies and working towards various different goals. If anonymity becomes a large enough issue, the internet may experience a movement from search engines/services such as google towards decentralized applications such as YaCy and Synereo. Would a movement like this, however, even be feasible? Yesterday in an article about What The Future of Search may look like, I mentioned that decentralized applications would need to be exceptional at what they do, in order for users to switch from a service they have already been using for years....


Continue reading...

What will the Future of Search be like?

Lets face it, you probably use Google, just like 1.17 billion other people. Out of all the major search engines, Google is by far the largest. It seems every new license agreement we accept is another agreement for Google, or any other entity for that matter, to gather intermittent data on your 'habits'. The categorization of 'habits' grows larger with every new quirky technological advancement. In the future, Google (or now more formally known as 'Alphabet') would be able to collect data on where you are, what temperature you like to keep your home at, when you leave and come...


Continue reading...

What is the XARA Apple Hack and How to Stay Away from it

Hackers are scrambling either defend or exploit the new 0 day vulnerability released by 6 University researchers from Indiana University, Peking University, and Georgia Institute of Technology respectively. In a 13 page report these researchers have discovered a way to bypass Apples multi-level security and steal passwords from natively installed applications on your iOS devices. The best (or worst, depending on your situation) part? The researchers have been contacting Apple about this for the last 6 months, to which Apple has not responded with a patch. In accordance with Apples own policy the hack has been released to the public....


Continue reading...