How to: Basics of Using Safing Portmaster

How to: Basics of Using Safing Portmaster

This post was originally published on 1 FEB 2023; it has since been updated and revised. In this guide we look at how to get familiar with using/tweaking Safing Portmaster, an open-source and host-based application firewall available for Linux and Windows machines. TABLE OF CONTENTS About Portmaster Installing Portmaster Running ... Read More
Avoid The Hack: 4 Best Secure Cloud Storage Providers

Avoid The Hack: 4 Best Secure Cloud Storage Providers

| | Cloud, encryption
While convenient, many of the most well-known and popular cloud storage providers have direct access to your files - in some cases, third-parties may have access to your files as well. Encrypted cloud storage providers respect user privacy and use zero knowledge end-to-end encryption implementations to secure user data and ... Read More
How (and Why) to Take Full Advantage of Apple’s New Advanced Data Protection Feature

How (and Why) to Take Full Advantage of Apple’s New Advanced Data Protection Feature

With the iOS 16.2 update, Apple introduced “Advanced Data Protection,” which finally introduced end-to-end encryption (E2EE) for most items backed up or stored in iCloud. Apple has long been criticized, with good reason, over its iCloud service not providing E2EE (where the user has the decryption keys); for years, when ... Read More
Our 3 Best VPN Picks for Privacy and Security

Our 3 Best VPN Picks for Privacy and Security

| | Data Privacy, VPN
Virtual Private Networks (VPNs) weren’t initially designed to be privacy tools. Rather, they were primarily designed to securely connect two physically separate networks. However, in some cases and assuming a number of criteria is met, VPNs can be used as tools to benefit user privacy. Here, you will find avoidthehack’s ... Read More
Switching From Twitter to Mastodon

Switching From Twitter to Mastodon

This post was originally published on 7 NOV 2022; it has since been updated and revised. avoidthehack is actively looking for tips/contributions to this guide in future updates. What is Mastodon? Mastodon is an open-source and decentralized microblogging network. Mastodon is also part of a larger decentralized social media network ... Read More
Avoid The Hack: The Best Pi-Hole Blocklists (2024)

Avoid The Hack: The Best Pi-Hole Blocklists (2024)

| | dns, pihole
This post was originally published on 26 APR 2021; it has since been updated and revised. Looking for solid and maintained blocklists to round out the blocking capabilities of your Pi-Hole install? You've come to the right page. TABLE OF CONTENTS Preface Picking your blocklist(s) 1. Consider your "threat" model ... Read More
Blocking Ads, Trackers, and Malware in Browsers, Devices, and Networks

Blocking Ads, Trackers, and Malware in Browsers, Devices, and Networks

This post was originally published on 18 MAY 2022; it has since been updated and revised. You may hear a lot that you should block ads and trackers, but you may also have a lot of questions, such as (but not limited to): How can you block ads on your ... Read More
How to Get Started Using a Password Manager

How to Get Started Using a Password Manager

Using a password manager can prove highly essential for good password management practices. Broadly speaking, password managers allow users to generate strong passwords - but most importantly they allow users to have unique passwords for their various online accounts, eliminating the need for reusing passwords. This guide is aimed at ... Read More
Avoid The Hack: 8 Best Authenticator Apps/Keys for MFA

Avoid The Hack: 8 Best Authenticator Apps/Keys for MFA

| | 2FA/MFA
Everyone should be using multifactor authentication (MFA) to further secure their online accounts - especially accounts deemed crucial, such as email and bank accounts. Stronger forms of MFA, which involve using an authenticator app or a hardware key, provide an enhanced layer of protection from would be account takeovers. In ... Read More
5 Reasons for Everyone to Use a Secure Email Provider

5 Reasons for Everyone to Use a Secure Email Provider

| | Data Privacy, email
Secure email providers provide enhanced security and privacy over more common, not-so-privacy friendly email providers. Secure email providers are also just as user friendly as their non-privacy-friendly counterparts. Given the decentralized nature of email, users are highly encouraged trying secure email providers for themselves and, where possible, migrate most (if ... Read More

Secure Guardrails