Select Page
How To Set Up A Raspberry Pi NAS

How To Set Up A Raspberry Pi NAS

Because why buy something meant for the job when you can just throw a bunch of other stuff and hopefully get a working thing? A Raspberry Pi NAS is affordable and easy to set up, all you need is a Raspberry Pi and some digital storage. Installing Ubuntu Server...

Too Many Subscriptions

Too Many Subscriptions

I recently got an Apple Watch (Series 3 42mm, in case you’re interested) with cellular, so I can still get calls and messages when away from my iPhone. During the set up process, a prompt popped up to set up cellular service for my Apple Watch. As that was the whole...

Why I Went Static With Jekyll

Why I Went Static With Jekyll

Most of my writing nowadays goes onto the Medium platform. I write something, hit publish, and Medium does everything else from hosting and even bringing views to my posts. But, I’m currently working on a project that needed a website; something that Medium wouldn’t...

Asymmetric Encryption

Asymmetric Encryption

When you think of the term “encryption”, you’re likely thinking of what is known as symmetric encryption. With symmetric encryption, you encrypt data with a password, and use the same exact password when you need to decrypt the data. This works fine when you’re...

How Secure Is Your iPhone?

How Secure Is Your iPhone?

We all spend more time than we care to admit staring at our iPhone screens and mindlessly typing away. Everything from contacts to messages and images are things we would rather not have the world see. Boot Process The iPhone is designed with security in mind,...

The No Encryption Dystopia

The No Encryption Dystopia

Yet again, the US government is proposing that “warrant-proof” encryption be made illegal. Attorney General Barr essentially states that encryption as it currently stands allows criminals to completely hide their communications from the government. While that...

The Problems With End-to-end Encryption

The Problems With End-to-end Encryption

What Is End-to-end Encryption? End-to-end encryption is a way to ensure only the sender and recipient of a message can see it. The message is encrypted on the sender’s device and can only be decrypted once it reaches the recipient. Although the message may be sent...

How Secure Is iCloud?

How Secure Is iCloud?

iCloud is what makes all the magical features of backups and syncing happen, on Apple devices anyways. But, just how secure is your information stored in Apple’s cloud? “In Transit” vs “At Rest” These two terms are rather important for understanding the remainder...

How Secure is Apple’s iMessage?

How Secure is Apple’s iMessage?

Of all large tech companies, Apple seems to have a pretty good track record of respecting and protecting the privacy of their users. But, iMessage in particular may be a different story. Before I continue, it’s important to mention that this only applies to iMessage...

The Need For Strong Encryption

The Need For Strong Encryption

Yet again, there is at least talk in the United States government of a ban on end-to-end encryption. The premise for such a ban is that certain forms of encryption make it impossible for the FBI, NSA, and other government agencies to do their job properly,...

Recently Published

Newsletter

Sign up here to be one of the first to know when we publish a post, as well as other exclusive blog updates.