A unique and robust password, enabling 2-factor authentication. -Use a strong password -Use different passwords for different accounts -Don't reuse passwords -Do not grant admin privileges to third-party apps. What is 2-factor authentication? 2-factor authentication is a way to protect your account…

Our digital Privacy Governments and corporations gather, store, and analyze the tremendous amount of data we chuff out as we move through our digitized lives. Often this is without our knowledge, and typically without our consent. Governments Intelligence and law enforcement agencies need…

There is a considerable amount of censorship in Iran, covering both the internet and other means of communication.In the past, many Iranians were using proxy servers like (HTTP, HTTPS, SOCKS5) to bypass online censorship. However, in recent years, the authoritarian government upgrading their methods…

Passwords are the keys to your online life Passwords are supposed to be the primary filter of access of a delicate bit of information. Only those with privileges to enter what’s inside are supposed to have the passphrase, so it should be, long, secure, easy for the person to remember, and hard for…

Summary: This post summarizes the steps you can take to be better protected from threats, minimize online tracking, and improve privacy. When you browse the web, you leave a trail of information behind you. This includes your IP address, browser type, operating system, and more. This data can be…

Some quick math. Your laptop probably has a 500-gigabyte hard drive. That big backup drive you might have purchased with it can probably store two or three terabytes. Your corporate network might have one thousand times that: a petabyte. There are names for bigger numbers. A thousand petabytes is an…