Posts

Showing posts from January, 2023

Basic Counter Surveillance for Travellers and Tourists.

Note: In this article we've provided some affordable options for those who wish to go a step further in regards to securing their privacy. These are provided through affiliate links, through which we may recieve a small commission. Whilst you wont find commercial counter surveillance devices cheaply on amazon, there are some effective ways to attain affordable peace of mind. When it comes to traveling and staying in a new place, whether it's an Airbnb property or a hotel, there are a number of risks to consider in terms of privacy and security. One of the most common risks is traffic interception, which occurs when someone intercepts the network traffic of a guest, allowing them to see sensitive information such as login credentials and credit card numbers. This can happen through the use of a malicious Wi-Fi network or by hacking into the hotel's network. Some guests have reported finding hidden cameras in their Airbnb properties or hotels, which can be used to spy ...

OSINT. Oh What? How Open Souce Intelligence Connects our World

Image
Jake11 found via OSINT. Jake11 has been extensively tracked providing ELINT data during the ukrainian war. OSINT has become a bit of a buzzword, whilst becoming more blurred on whats actually classified as open source intelligence. Today we'll look quickly at some of the ways open source intelligence connects our world behind the scenes. First, lets get a ChatGPT refresher on just what exactly is defined as open source intelligence, and a quick history of its evolution. Open source intelligence, or OSINT for short, is like a treasure hunt for information. Imagine a group of detectives scouring the streets, looking for clues to solve a mystery. Except instead of physical clues, they're searching for information in the vast expanse of the internet and other publicly available sources. The history of OSINT can be traced back to the early days of intelligence gathering, when spies would sneak into enemy territories to gather information. But with the advent of the internet ...

Online Dating and Metadata: What You Need to Know

Image
Online dating has become a popular way to meet new people, but it also comes with its own set of risks. One of those risks is the potential for metadata to reveal information about your location and habits. In this article, we'll take a closer look at metadata and the other risks associated with online dating apps. First, let's define metadata. Metadata is data that is embedded in a digital file, such as a photo, that provides information about the file and the device used to create it. This metadata can include information such as the date and time the photo was taken, the location it was taken, and the device's unique ID. When you share a photo on a dating app, this metadata can also be shared, potentially revealing information about your location and habits. Location sharing is another potential risk associated with online dating apps. Many dating apps, such as Tinder, allow users to share their location with potential matches. While this can be a convenient feature f...

Social Media: What They Know (and Don't Know) About You

Image
We all know that social media companies track our activity on their platforms, such as the posts we make and the people we interact with. But did you know that they also track your browsing activity outside of the platform, gather location data from your device, and collect information on your contacts and connections? In this article, we'll take a closer look at the data that social media companies collect on their users, and what they do with it. First, let's talk about what social media companies know about your activity on their platforms. They track and store data on the posts you make, the people you interact with, and the pages you visit. This data is used to target ads and recommend content to you. For example, if you've been browsing a lot of posts about hiking, you may start seeing ads for outdoor gear. But social media companies don't just track your activity on their platforms - they also track your browsing activity outside of the platform. They do this ...

Social Media Permissions: Understanding Your Privacy and Whats Given Up.

Image
In today's connected world, social media is an integral part of our daily lives. We use it to connect with friends and family, share our thoughts and experiences, and stay informed about what's happening in the world. Business is now a part of it and some of us even hold positions that are linked to social media and PR. However, as we scroll through our feeds and tap on "like" and "share" buttons, we may not be aware of the extent to which our personal information is being collected and shared by these platforms. One of the most simplistic ways in which social media apps collect our personal information is through the permissions we grant them on our mobile devices. Many apps ask for access to our contacts, camera, microphone, and location, among other things. This allows the apps to collect a significant amount of personal data, which can be used for targeted advertising and other purposes. In some cases, users may not even be aware of the extent of data...

So what is a hacker anyway? A short look at Black hats, White hats and everything in between

Image
The term "hacker" has been around for decades, but its meaning has changed significantly over time. In the early days of computing, a hacker was simply someone who was passionate about technology and loved to tinker with computers and software. These individuals were often self-taught and would spend countless hours exploring the inner workings of technology and discovering new ways to use it. But as the world became more connected through the internet, and computers became a critical part of our daily lives, the meaning of the word "hacker" began to change. It started to take on a more sinister connotation, as individuals began using their knowledge and skills to gain unauthorized access to computer systems and steal sensitive information. Nowadays, there are three main types of hackers: white hat, gray hat, and black hat. White hat hackers are the "good guys" of the hacking world. They use their skills to help organizations and individuals identify an...

So I've officially been breached. What happens next???

Image
So I've officially been breached. What happens next??? Note: While we are going to discuss real hacks, please understand we will do so in an indirect way, without compromising any leaked information. If you're like many Australians, you may have received notification over the past year that you've been involved in some form of data breach or cyber attack. If you have a limited understanding of how this stuff works, it can be intimidating to be in this situation. It's your information in someone else's hands without a clear understanding of what's happening to it or where it's going. While every attack, breach, and compromise scenario is unique, today we will try to cover some of the common scenarios after a breach, and how you can best manage them for yourself. Firstly, it's important to wait for validation of the breach from credible sources. Note that we said credible, not official. You'll usually be able to find this out by being directly ...

ad social bar