Quantcast
Channel: The Confidential Resource » Communication
Browsing all 25 articles
Browse latest View live

Self-destructing IMs and Emails

Big String offers self-destructing IMs and emails so that you won’t leave any evidence of their online communications. It works with many popular IM clients.

View Article



Android Phone Security Risk

Android handsets ‘leak’ personal data Many applications installed on Android phones interact with Google services by asking for an authentication token … Sometimes, found the researchers, these tokens...

View Article

Asymmetric Warfare & Business Continuity

In a previous article, I wrote about a system that created a single point of failure. In a strategic sense, computers and IT as a whole have become a single point of failure in both government and...

View Article

ChangeIP Proxy

ChangeIP, states that its Private Proxy is an encrypted change IP proxy that not only changes your IP address, but also encrypts your Internet browsing sessions to keep you safe and protected. Perhaps...

View Article

Untraceable Phone Number

inumbr provides phone number that you can use to forward calls to any other phone in the U.S..  If you are in Canada forward to a MajicJack.com number for a U.S. location. No one will be able to trace...

View Article


The Three Rules of Privacy & Security

I am not a data security expert, but I have spent many hours a day for almost two decades using the internet and watching it evolve. During that time, I have also observed the growing number of snoops...

View Article

Rule Three – Privacy & Security in Communications

Rule #3, always use encryption when communicating. Secure Communication Every e-mail message will go through numerous servers before it is delivered. At any step in that route the message may be read...

View Article

Rule Three – Privacy & Security for Email

For low-risk communications using web-based “secure” e-mail services that encrypt your messages before sending might be reasonable.  However, when a third-party service or server is used the email...

View Article


Rule Three — Secure Instant Messaging

Both Yahoo and Google offer an encryption option in their IM clients, but they have full access to the original content as they handle the encryption. Your best bet for secure IM communication is to...

View Article


The Dangers of a Bad Pretext

The Daily Mail newspaper in the UK reports that the receptionist who was subjected to a pretext call by two Australian DJs may have committed suicide. In the call at 5.30am on Tuesday impersonating the...

View Article

Secured URL

Secured URL allows you to encrypt a URL with a password. It works like TinyURL. Enter a URL, its password, and choose the expiration date of the resulting encrypted link. The expiration date can be up...

View Article

Tim Horton’s & Investigative Internet Research

An article titled, Tim Hortons apologizes for blocking gay and lesbian news website by The Canadian Press on Friday, July 19, 2013 caught my attention. Tim Hortons is a popular Canadian coffee shop...

View Article

Surveillance in a WiFi World

I sat in a hotel lobby recently enjoying a coffee while waiting for someone. I decided to write an entirely different blog article than this one while I waited. This lobby has convenient tables for...

View Article


Social Media Early Warning System

Today, Social Media (SM) informs about emergencies, scandals, and controversial events before the traditional media. The news media has become a second source that tries to improve the signal to noise...

View Article

Smartphone Security

Losing your smart phone can be more that inconvenience if your are an active private investigator. Over at PInow, Kelly Cory’s article titled How to Keep Your Smartphone Secure offers some sound advice.

View Article


Confidential File Transfers

Google Drive and Dropbox don’t provide privacy. Onionshare is an open-source program that lets you send big files via Tor. When you use it to share a file, it creates a Tor Hidden Service, which is a...

View Article

Anonymize Your Email

Guerrilla Mail is a temporary, disposable email service. It lets you to easily set-up random email addresses. If accessed through Tor, it ensures that no one can connect your IP address with a...

View Article


Critical Thinking

Growing up, my mother always told me not to believe everything I read. This was good advice, but it doesn’t go far enough. Critical thinking is an ancient concept but the actual term began to appear in...

View Article

Rule Three — Secure Instant Messaging

Both Yahoo and Google offer an encryption option in their IM clients, but they have full access to the original content as they handle the encryption. Your best bet for secure IM communication is to...

View Article

Don’t Believe Everything the Government Says

Here are three simple facts: Governments are political. Politics is not about the truth–it’s about getting elected at any cost. Morally vacuous individuals are attracted to the power inherent in...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images