Your Ideal Home in the Middle of Nowhere
After spending three years on the road living in a camper van, Foster Huntington continued his unconventional lifestyle by building a two-story treehouse. Foster, like many others, are finding freedom, tranquility, and adventure in living off the grid in unconventional homes.
“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle