01. IDENTITY
There are several underlying internet software and infrastructure systems that are created to know your identity and then follow you around. We have practices, methods and tools to eliminate and mitigate this effect.
02. AUTHENTICATION
There are multiple ways to authenticate into the various systems we use. This section lays out the options and how to keep them organized.
03. BROWSERS
Most of the tracking that happens on non-mobile devices is via the browser. We will show you how this happens and how to stop it.
04. PHONE
By far the greatest threat any of us have is our phones. They are a wonderful spy contraption, with amazing vectors for your exploitation. One of the effects we have learned about doing this work, is that the resultant phone is faster and less complex after putting the practices in place.
05. WORKSTATION
Most all of us use laptops, or even some, may use a desktop workstation. Like the mobile devices, these require methods of use that keep us from being exploited, targeted and made less efficient.
06. SERVER
Some of the options require a server to act between multiple devices. This can be as simple as an old laptop left powered up, all the way to high-availability clusters.
07. NETWORK
The network you setup at your office, home and worksite requires some consideration to keep you private and functional.
08. COMMUNICATIONS
The most convenient things are often the most harmful. This is true with mobile phone and texting. It is best to get outside the SMS and iMessage world and into one you can control and keep private.
09. CONFIGURATIONS
How various devices, software, networks and what-nots are configured determines how well things will work and if we leave unintended holes. While this is not a very exciting area, and may seem too miscellaneous, it is a very important part of making and keeping things right. After getting things setup, there must be a practice and place to store those configurations as managed objects for later use.
10. APPLICATIONS
The software applications is where all the work is done. It is then important which ones are selected, learned and then managed.
11. FILE-SYSTEMS & MEDIA
You need a place for files, photos, video, etc. Concerns such as space, encryption, access, syncing, speed and sharing must be expertly dealt with.
12. MEDIA
How you use media is important because it is where you meet the rest of the world. Some people seek to take from you. Let’s block them before they can even get in.
13. CYBERSECURITY
Any computing device and the network it rides on opens massive amounts of places where you can be harmed. Let’s reveal what those are and what realistically can be done.
14. PRIVACY
All of this is for you privacy. This is very complicated. That’s why this stack exists