Because why buy something meant for the job when you can just throw a bunch of other stuff and hopefully get a working thing? A Raspberry Pi NAS is affordable and easy to set up, all you need is a Raspberry Pi and some digital storage. Installing Ubuntu Server The first thing you’ll need to do … Read more How To Set Up A Raspberry Pi NAS
I recently got an Apple Watch (Series 3 42mm, in case you’re interested) with cellular, so I can still get calls and messages when away from my iPhone. During the set up process, a prompt popped up to set up cellular service for my Apple Watch. As that was the whole point of choosing an … Read more Too Many Subscriptions
Most of my writing nowadays goes onto the Medium platform. I write something, hit publish, and Medium does everything else from hosting and even bringing views to my posts. But, I’m currently working on a project that needed a website; something that Medium wouldn’t fit the requirements of. So, I needed to choose a platform … Read more Why I Went Static With Jekyll
When you think of the term “encryption”, you’re likely thinking of what is known as symmetric encryption. With symmetric encryption, you encrypt data with a password, and use the same exact password when you need to decrypt the data. This works fine when you’re encrypting a file, or maybe even an entire hard drive; however, … Read more Asymmetric Encryption
We all spend more time than we care to admit staring at our iPhone screens and mindlessly typing away. Everything from contacts to messages and images are things we would rather not have the world see. Boot Process The iPhone is designed with security in mind, starting as early as the boot process. Securing the … Read more How Secure Is Your iPhone?
Yet again, the US government is proposing that “warrant-proof” encryption be made illegal. Attorney General Barr essentially states that encryption as it currently stands allows criminals to completely hide their communications from the government. While that point is valid, the modern alternatives are even worse than how things currently stand. Here are just a few of … Read more The No Encryption Dystopia
What Is End-to-end Encryption? End-to-end encryption is a way to ensure only the sender and recipient of a message can see it. The message is encrypted on the sender’s device and can only be decrypted once it reaches the recipient. Although the message may be sent through one or more servers, it’s only stored in … Read more The Problems With End-to-end Encryption
iCloud is what makes all the magical features of backups and syncing happen, on Apple devices anyways. But, just how secure is your information stored in Apple’s cloud? “In Transit” vs “At Rest” These two terms are rather important for understanding the remainder of this post, so it’s important to understand what they mean with regard … Read more How Secure Is iCloud?
Yet again, there is at least talk in the United States government of a ban on end-to-end encryption. The premise for such a ban is that certain forms of encryption make it impossible for the FBI, NSA, and other government agencies to do their job properly, as they can’t see the encrypted data even if they obtain … Read more The Need For Strong Encryption