How to Conceal Your Digital Wake

How to Conceal Your Digital Wake

Updated October 2017. In the post on Criminal Activity and Your IP address, I outlined how people use TOR (The Onion Router) in order to conceal their IP address in order to maintain a certain level of anonymity online. But a bare bones use of the TOR system is not...
When Strong Passwords Don’t Matter Part II

When Strong Passwords Don’t Matter Part II

There is something compulsive about a telephone. The gadget-ridden man of our age loves it, loathes it, and is afraid of it. But he always treats it with respect, even when he is drunk. The telephone is a fetish. -Raymond Chandler, The Long Goodbye (1953) Now more...

When Strong Passwords Don’t Matter

Someone, most likely Congressman Anthony Weiner, sent out a picture of a man’s genitalia to the wide world of Twitter. It has resulted in an explosion of coverage in the US media in the past few days. Congressman Weiner’s response to the picture was odd,...

Your Laptop is NOT Private or Secure at US Customs

  The Ninth Circuit has held that it is the right of the United States government to seize a digital device at a border crossing*, transport it to a secondary location, and retain the data from the device indefinitely until it can be accessed. It has been true...