Have you seen ads from your favorite YouTube vloggers about companies that remove your information from data brokers? And have you ever wondered what data brokers are? Simply put, they are companies that collect information about you (like your email…
A few months ago, I saw someone on Twitter talk about the time he experienced SIM swapping on his iPhone. He ended up losing access to his Apple account, but did get his cell phone number back. Let me explain…
In my last post, Social Media Afterlife, I talked about what can happen to your social media accounts after you’re gone. In the U.S., the Revised Uniform Fiduciary Access to Digital Assets Act allows an executor access to someone’s digital…
When you write your will, you will spend a lot of time cataloging all of your possessions and thinking about how to distribute them. The obvious things would be physical assets like real estate, cars, and money. But what about…
January 2022 update: I published this a month before Covid-19 hit the US. Broadband internet makes it possible for many people to work and learn from home. It also made it possible to for houses of worship to keep operating,…
In my post How to Use Tor, I showed you the basics of using the Tor Browser. But Tor is more complicated than that, and setting up a super-secure connection is harder than you think. Using the Tor Browser can…
In my post The Greatest Enemies of Electronic Devices, I promised to show you the necessary computer tools to clean and repair your machine. Most of them are inexpensive and readily available outside of specialty stores. Required Computer Tools Microfiber cloths: These can…
“I operate my firm, C.A. Goldberg, PLLC, with one fundamental rule: if one of my clients has been harmed, somebody must pay. It’s as simple as that.” This quote is from the beginning of Carrie Goldberg’s book Nobody’s Victim. Goldberg tells…
What comes to mind when you hear the phrase “military grade”? Something strong and tough? Protection against disaster and destruction? That’s why marketers use it. So many products – from smartphone cases to notebooks – are labelled as military grade….
As I noted in 2015: Government agencies have always had an uneasy relationship with encryption technology. The tragic events [of the November 2015 Paris attacks] only deepened that distrust. Many countries around the world proposed restricting or banning encryption. But would such…
Recent Comments