Sign in

think bad, do good | cybersecurity & privacy engineering | keybase.io/d3structo
2017 Maersk NotPetya ransomware attack

We are in the preliminary stages of an undeclared cyberwar. If we’re honest with ourselves, it’s been ramping up to this for the last three decades. We’re in the probing, testing the waters stage of cyberwarfare. The lines are fuzzy, not internationally agreed upon, and very much the Wild West. Nation-state Advanced Persistent Threat (APT) actors are testing the limits of what they can get away with all in the name of cyber espionage and furtherance of their strategic national agendas. …


(image credit: EC Council)

Chances are you’ve already heard about information hiding at some point or another. On the off chance that you haven’t, I offer here a quick down and dirty as to what it is and how it works. Essentially, digital computing inherently makes it trivial to hide information in plain sight by abusing well-known aspects of digital file systems and commonly used internet protocols. Enter the shadowy world of digital steganography, a subject I have researched and written about extensively for several years (i.e., see Additional Resources below). …


A monthly privacy digest curated with experienced security insights. This article is also available in Spanish here.

Digital Life in 2025, Niels Ole Finnemann, Director of Netlab

Welcome to the March 2021 edition of the z3r0trust Privacy Newsletter. This month I cover invisible beacons in your emails that spy on you, the latest SMS hijacking nonsense that should’ve been addressed years ago, and one of the best privacy smartphones on the market.

Sooner or later, each one of us has to make a decision in life. A decision as to whether we want convenience or privacy in this new digital era. To be clear, it’s often one or the other…


Captain of the Blue Team, the CISO (image credit: Cavirin)

Contrary to popular opinion within the cybersecurity industry, not every cybersecurity professional career roadmap ends at becoming a Chief Information Security Officer, or any of the other half a dozen C-Suite roles such as a Chief Information Officer (CIO), Chief Technical Officer (CTO), or Chief Security Officer (CSO), for that matter. It’s not that I have anything personal against CISOs or any other corporate executive role. It’s just that I know for a fact that I am not alone when I say that I would rather remain in a technical information security capacity in my career than have to concern…


A concise monthly privacy digest with experienced security insights. This article is also available in Spanish here.

(Illustration: AĂŻda Amer/Axios)

Welcome to the February 2021 edition of the z3r0trust Privacy Newsletter. Please join me as I continue this lifelong journey down the digital privacy rabbit hole and I spread awareness along the way on how to maximize user privacy and security online.

There was an excellent article published in Wired’s Backchannel recently by Arthur Holland Michel that discussed how surveillance capitalism is ubiquitous now and how these CCTV surveillance…


Un compendio mensual sobre privacidad elaborado con conocimientos expertos en materia de seguridad. Un agradecimiento especial a @151mp137471n por traducir del inglés al español.

Digital Life in 2025, Niels Ole Finnemann, Director of Netlab

Bienvenidos a la edición de marzo de 2021 del Boletín de Privacidad de z3r0trust. Este mes cubro los píxeles espías de los correos electrónicos, la última insensatez de redirección de SMS que ya debía estar resuelta desde hace años, y les presento a uno de los mejores smartphones en materia de privacidad del mercado.

Tarde o temprano, cada uno tiene que tomar una decisión en determinado momento de la vida. Ésta decisión es si elegimos comodidad…


Un conciso resumen semanal sobre privacidad, con información de un experto en ciberseguridad. Un agradecimiento especial a @151mp137471n por traducir del inglés al español.

(Illustration: AĂŻda Amer/Axios)

Bienvenidos a la edición de febrero de 2021 del Boletín de Privacidad de z3r0trust. Acompáñame mientras continúo este viaje de toda la vida por la madriguera del conejo de la privacidad digital y difundo conciencia por el camino sobre cómo maximizar la privacidad y la seguridad personal en línea.

Hace poco, Arthur Holland Michel publicó un excelente artículo en Wired’s Backchannel en…


Mad Max: Fury Road (Image credit: BusinessInsider)

In 2017, my wife and I bought a ranch-style house that was built in 1957 that sits directly off of a major Los Angeles county thoroughfare street. As a retired Marine, I used my Veterans Administration (VA) home loan to purchase our first home after honorably retiring from the Marines in 2015 after serving 20 years on active duty. Our street is only a 4-lane road, two lanes running North/South each, but it stays busy all day and night. “Welcome to homeownership in a metro,” I could imagine my neighbors saying.

The windows and insulation in the walls of our…


The privacy-themed DuckDuckGo internet search engine (credit DuckDuckGo.com)

With a swipe of your thumb or a click of a mouse, you open that internet browser on your computer or your mobile device and search for the information you’re looking for. But what happens to all of those searches…


Un conciso resumen semanal sobre privacidad, con información de un experto en ciberseguridad. Un agradecimiento especial a @151mp137471n por traducir del inglés al español.

(crédito de la imagen: Techweez)

¡Feliz Año Nuevo! Es en enero de 2021 y, a pesar del simbolismo de los nuevos comienzos que llegan con cada año, en el mundo de la privacidad digital se siguen librando muchas de las mismas batallas en torno a la privacidad. Como siempre ha sucedido, los…

𒆜Ian Barwise𒆜

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store