iSD in the Tech Age!



Net-self-defense, we spend an exorbitant amount of time on our physical defense training and then we forget that our lives are in just as much danger of "Grave Financial Harm" or Financial ruin (Death) as if we are attacked by a street predator. Research and studies show, from the security experts in this field, that Anti-virus and Firewall suites only catch about 5% of the threats out there and those same folks tell us that it is in all probability worse at the Enterprise levels.


My goal here is to educate myself, and by proxy, pass on what I learn to others so that each individual who is connected at any level can take steps to achieve some semblance of security in their electronic on-line lives. We are so deeply imbedded in modern technology that to not take appropriate actions to learn iSD or internet self-defense in the technological age is just foolishness.


My goal is to provide enough of a foundation that readers, like me, can take the appropriate actions, i.e., apply those fundamental principles of technological methodologies to safeguard one of the more important, actually critical, strategies and tactics to defend ourselves from grave economical harm or even economical/financial death or ruin from nefarious predatory hacking processes.


Nothing in this blog is definitive, it is meant to set a foundation of knowledge, understanding and awareness so that you are not one day blindsided by some effort to steal your very life out from underneath you so fast you feel like you have been hit behind the ear and knocked into a daze of confusion, fear and finally anger where your tech-life falls apart and ruins your real life utterly, completely and with no light in sight down that dark, empty and black hole.


Tuesday, March 15, 2016

ToR Alternates

Blog Article/Post Caveat (Read First Please: Click the Link)

I spoke of ToR in other articles as a system that protects the user so they can browse anonymously. Tor has come under attack itself due to some recent security issues and possible compromises. This seems logical since it is apparently used by the dark-verse criminal element. It would be beneficial to them to create loopholes in the system so they can bypass security while putting in backdoors so they can continue to gather data beneficial to their businesses. 

Note: I am making a lot of assumptions and presenting theories that may or may not be true, check and double verify for yourself - one of my recommended security measures for the individual. 

The following is an article that promotes best alternative to Tor browsing in a safe, somewhat, and secure way - anonymously. I am not aware as to just how secure that is but if the cyber-elements of questionable abilities in the dark-verse use it to run their less legal businesses and remain safe and secure from legal and governmental forces it has to be better than most other products “SOLD” to us unsuspecting and gullible soles surfing the iVerse, the “Known Internet Universe.” 

Caution: When seeking such avenues to secure yourself against the more nefarious cyber-criminals of the dark-verse you still have to vet out the software you use simply because, like all software, the coders own it and it can be subverted to allow certain activities that may still expose you. Use caution whenever venturing out into the iVerse of Coder Control. 


Bibliography (Click the link)

Goodman, Marc. “Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It.” Doubleday. New York. 24 February 2015. 



No comments:

Post a Comment