Strava user heatmap reveals patterns of life in western military bases

In November 2017, online fitness tracker Strava published a heatmap of the activity many of its users around the world engage in (and track) daily. But what might have seemed as a harmless sharing of anonymized, aggregated data turned out to reveal pot… Continue reading Strava user heatmap reveals patterns of life in western military bases

Anonymity Stack: Home connection -> VPN -> Whonix(Tor) -> Socks5. Few questions on anonymity

So let’s assume the following:
1. A host machine running a clean BSD-based OS that has no backdoors, malware, spyware or other potentially de-anonymizing harmful software.
2. One home internet connection from an ISP that keeps a close eye … Continue reading Anonymity Stack: Home connection -> VPN -> Whonix(Tor) -> Socks5. Few questions on anonymity

Can an unregistered phone with a prepaid SIM card be traced by the police? [closed]

Let’s say that someone is using an unregistered phone — I mean just a phone that he bought in another country — with a prepaid SIM card. The person is sending messages only on WhatsApp, without making any calls. After he send… Continue reading Can an unregistered phone with a prepaid SIM card be traced by the police? [closed]

Why OPSEC Is for Everyone, Not Just for People with Something to Hide

OPSEC (Operational Security) is a term derived from the U.S. military and is an analytical process used to deny an adversary information that could compromise the secrecy and/or the operational security of a mission. The very process of performing OPSEC or protecting your six from an adversary not only plays a very important role in […]… Read More

The post Why OPSEC Is for Everyone, Not Just for People with Something to Hide appeared first on The State of Security.

The post Why OPSEC Is for Everyone, Not Just for People with Something to Hide appeared first on Security Boulevard.

Continue reading Why OPSEC Is for Everyone, Not Just for People with Something to Hide

Why is Pastebin still widely used by malicious actors for sensitive data dumps, given that it’s public and easily parsable?

If you scrape Pastebin for research or even just out of curiosity, it quickly becomes apparent that there is an abundance of compromised data that is uploaded there by unknown malicious actors.

My question is, why is this st… Continue reading Why is Pastebin still widely used by malicious actors for sensitive data dumps, given that it’s public and easily parsable?

When reading PGP or other encrypted emails, is it wise to unplug my computers ethernet in order to use my private key?

I’ve never used PGP before so my logic may be a bit off.

When receiving an email encrypted with my public key, would it not be best to unplug or disconnect my computer’s internet before decrypting with my private key? That way there can b… Continue reading When reading PGP or other encrypted emails, is it wise to unplug my computers ethernet in order to use my private key?