Browsed by
Month: August 2015

Private Internet Access for iOS

Private Internet Access for iOS

During the writing of Your Ultimate Security Guide: iOS I had the opportunity to work with a lot of products that I probably wouldn’t have otherwise considered.  One of these is Private Internet Access for iOS (affiliate link).  Though over the years I have used a virtual private network on my iPhone and other mobile devices, and I have used Private Internet Access rather heavily, I had never used the two together until recently.  The Private Internet Access app for…

Read More Read More

ProtonMail Update: v2.0

ProtonMail Update: v2.0

My favorite encrypted email service, ProtonMail has moved into a new phase in its beta rollout.  Last week ProtonMail rolled out beta version 2.0.  The full details can be found on the ProtonMail blog, but there are several significant upgrades that I would like to point out here. Encrypted Attachments to Outside Users:  ProtonMail now allows you to encrypt attachments and to outside users, not just to other ProtonMail users.  This is one of the features I wrote that I…

Read More Read More

Your Ultimate Security Guide: iOS

Your Ultimate Security Guide: iOS

I am thrilled to announce the upcoming August 20th release of Your Ultimate Security Guide: iOS!  The second book in the series, Your Ultimate Security Guide: iOS is intended to help the layman with both basic digital security and in the development of a comprehensive digital security perimeter.  Written in plain English, Your Ultimate Security Guide: iOS takes a step-by-step approach to enhancing mobile device security, and will help you reclaim some privacy in both the physical and digital realms. Some…

Read More Read More

Paper v. Plastic: The Case for Cash

Paper v. Plastic: The Case for Cash

The adage that I’ve used several other times on this blog, my books, and one that is nearly a personal credo: convenience is inversely proportional to security.  This seems to apply equally well to personal privacy.  Said another way, the more convenient something is, the more personal privacy and control of your identity you are probably sacrificing.  Credit and debit cards are one such convenience.  Though it is certainly more convenient to swipe a credit card for purchases that in…

Read More Read More