T-Minus AI

  • On ·
  • By ·

In T-Minus AI: Humanity’s Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented perspective that’s easy to comprehend. A recognized national expert and the U.S. Air Force’s first Chairperson for Artificial Intelligence, Kanaan weaves a compelling new view on our history of innovation and technology to masterfully explain what each of us should know about modern computing, AI, and machine learning.

Kanaan also illuminates the global implications of AI by highlighting the cultural and national vulnerabilities already exposed and the pressing issues now squarely on the table. AI has already become China’s all-purpose tool to impose authoritarian influence around the world. Russia, playing catch up, is weaponizing AI through its military systems and now infamous, aggressive efforts to disrupt democracy by whatever disinformation means possible.

America and like-minded nations are awakening to these new realities, and the paths they’re electing to follow echo loudly, in most cases, the political foundations and moral imperatives upon which they were formed.


Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech

The Long Game

  • On ·
  • By ·

The Long Game: China’s Grand Strategy to Displace American Order

For more than a century, no US adversary or coalition of adversaries has ever reached sixty percent of US GDP. China is the sole exception, and it is fast emerging into a global superpower that could rival, if not eclipse, the United
States. What does China want, does it have a grand strategy to achieve it, and what should the United States do about it?

In The Long Game, Rush Doshi draws from a rich base of Chinese primary sources, including decades worth of party documents, leaked materials, memoirs by party leaders, and a careful analysis of China’s conduct to provide a history of China’s grand strategy since the end of the Cold War. Taking readers behind the Party’s closed doors, he uncovers Beijing’s long, methodical game to displace America from its hegemonic position in both the East Asia regional and global orders through three sequential “strategies of displacement.”


Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech

Extreme Privacy

  • On ·
  • By ·

Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events. The information shared in this volume is based on real experiences with his actual clients, and is unlike any content ever released in his other books.


Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech

Sandworm

  • On ·
  • By ·

A New Era of Cyberwar and the Hunt for
the Kremlin’s Most Dangerous Hackers

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businesses—from drug manufacturers to software developers to shipping companies. At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.


Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech

Tools and Weapons

  • On ·
  • By ·

The Promise and the Peril of the Digital Age

Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world, you bear a responsibility to help address the world you have helped create. This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation.

In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world’s largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech’s relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying “Microsoft memoir,” the book pulls back the curtain remarkably wide onto some of the company’s most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.


Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech

Privacy is Power

  • On ·
  • By ·

Why and How You Should Take Back Control of Your Data

Every minute of every day, our data is harvested and exploited… It is time to pull the plug on the surveillance economy.

Governments and hundreds of corporations are spying on you, and everyone you know. They’re not just selling your data. They’re selling the power to influence you and decide for you. Even when you’ve explicitly asked them not to.

Reclaiming privacy is the only way we can regain control of our lives and our societies. These governments and corporations have too much power, and their power stems from us–from our data. Privacy is as collective as it is personal, and it’s time to take back control.

Privacy Is Power tells you how to do exactly that. It calls for the end of the data economy and proposes concrete measures to bring that end about, offering practical solutions, both for policymakers and ordinary citizens.


Money should not be an excuse to delay taking control of your safety and freedom. So Operation Privacy has made it FREE and accessible to
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It's focused on the research and development of privacy and
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Forget about credit card fraud, data breaches, or having to update billing information at all the services you use when a card gets hacked. Foil
The only modern smartphone you can (truly) own. Smartphones have become the single most significant piece of technology in our lives, a gateway to the

Cyber Privacy

  • On ·
  • By ·

Who Has Your Data and Why You Should Care

Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our data is being used—sometimes against us—by the private sector, the government, and even our employers and schools. It explains the trends in data science, technology, and the law that impact our everyday privacy.

It’s high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us.

This book is for readers who want answers to three questions: Who has your data? Why should you care? And most important, what can you do about it?


Money should not be an excuse to delay taking control of your safety and freedom. So Operation Privacy has made it FREE and accessible to
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It's focused on the research and development of privacy and
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Forget about credit card fraud, data breaches, or having to update billing information at all the services you use when a card gets hacked. Foil
The only modern smartphone you can (truly) own. Smartphones have become the single most significant piece of technology in our lives, a gateway to the

The Watchman Guide to Privacy

  • On ·
  • By ·

Reclaim Your Digital, Financial, and Lifestyle Freedom

Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from digital privacy and asset protection to international nomadism and privacy during the COVID lockdowns. Equally important, it presents hundreds of real examples, arguments, and historical contexts for why privacy is the most important thing one can preserve.


Money should not be an excuse to delay taking control of your safety and freedom. So Operation Privacy has made it FREE and accessible to
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It's focused on the research and development of privacy and
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Forget about credit card fraud, data breaches, or having to update billing information at all the services you use when a card gets hacked. Foil
The only modern smartphone you can (truly) own. Smartphones have become the single most significant piece of technology in our lives, a gateway to the

The Encyclopedia of Country Living

  • On ·
  • By ·

The Original Manual for Living off the Land & Doing It Yourself

The definitive book of basic skills and country wisdom for living off the land, being prepared, and doing it yourself–whether it’s on a farm or homestead, in the suburbs or city.

From homesteaders to urban farmers, and everyone in between, there is a desire for a simpler way of life—a healthier, greener, more self-sustaining, and holistic approach to modern life.


Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech

Dawn of the Code War

  • On ·
  • By ·

America’s Battle Against Russia, China,
and the Rising Global Cyber Threat

With each passing year, the internet-linked attacks on America’s interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The “Code War” is upon us.

In this dramatic book, former Assistant Attorney General John P. Carlin takes readers to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies. Today, as our entire economy goes digital, from banking to manufacturing to transportation, the potential targets for our enemies multiply. This firsthand account is both a remarkable untold story and a warning of dangers yet to come.


Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
  • 1
  • 2