The following is my translation of “Jokamiehen kyberpuolustus”, Everyman’s Cyber Defence, a short snippet from publicly available document #kyberpuolustus : kyberkäsikirja Puolustusvoimien henkilöstölle (2019) by Laari, Flyktman, Härmä, Timonen and Tuovinen. Source material is encrypted in Finnish and free to download from National Defence University of Finland’s website. I intend no copyright infringement and share this as cyber security awareness material for public interest.Continue reading “Everyman’s Cyber Defence”
How to Setup LinkedIn for Better Privacy and OPSEC
When it comes to privacy and social media platforms, LinkedIn is the necessary evil we have to put up with. While it’s a no-brainer to delete your Facebook account, but as so much of job recruitment revolves around LinkedIn, it’s a lot harder to severe ties with it. Many companies don’t even post their career opportunities anywhere else than on LinkedIn, and prefer applications that come directly through the platform. It’s also a great tool for headhunters to find suitable candidates.
So let’s assume you have a LinkedIn profile, you want to build up your online resume and personal brand, and want to be able to jump on an opportunity if it presents itself. However, you can accomplish all that without revealing every aspect of your professional self for the whole world to see by default. Let’s start of with LinkedIn settings and then move on to behavior on the platform, and other tips.
Continue reading “How to Setup LinkedIn for Better Privacy and OPSEC”
The Best Online Privacy Guides (updated July 2022)
This is a collection of the best, most reputable and generally most acknowledged online privacy guides on the web. The list is updated frequently.
Links are sorted in alphabetical order to avoid any biases, and each of them contains a short snippet quoted from the respective sites. I have not and will not add privacy guides that are created by VPN “review” sites or other such entities that create content just to spam it with affiliate links.
I dare to say that these guides together cover all the bases when it comes to the best privacy practices, OPSEC, and basic online anonymity – even for the advanced users. However, if you think I’m missing a guide, please leave a comment below and I’ll happily review and possibly add it to the list, thank you.
Continue reading “The Best Online Privacy Guides (updated July 2022)”
Controlled Identity Exposure as a Doxxing Countermeasure
Usually when talking about personal data in the context of increasing (online) privacy, the discussion is revolving around either one or two of the following subjects:
- Removing as much of your data as possible
- Populating data about you with disinformation
What I see talked about less (or barely at all) is the active management of your online data and the controlled method of data disclosure. Maybe some dismiss this as a no-brainer, but in my opinion there’s some easy and powerful wins to be gained by giving this third subject the attention it deserves.
Continue reading “Controlled Identity Exposure as a Doxxing Countermeasure”
I Have Been Pwned… Five Freaking Times and Counting!
When I started drafting this blog post a while back, the title was “I Have Been Pwned Twice Already”. That number has since risen to five, and I’m assuming it will continue to rise as old breaches come to light and some long forgotten accounts get popped. So far, no immediate harm has been caused to me from these breaches, and I’ll contribute that silver lining to the reactive and since then proactive steps I’ve taken to ensure that’s the case now and in the future. This is how also you can harden your online presence against these (inevitable) breaches.
Continue reading “I Have Been Pwned… Five Freaking Times and Counting!”
10 OPSEC Tips That Everyone Should Follow
Following in the footsteps of two great guides, “10 Commandments for a Safer Internet” and “0x0A Hack Commandments”, I was inspired to give something back to the community. For the average Joe, operational security – or OPSEC for short – is basically just about risk management through identifying specific pieces of information requiring protection, and employing measures to protect them. Sounds intimidating? Don’t worry, because you’re already doing it.
Continue reading “10 OPSEC Tips That Everyone Should Follow”