September 18, 2023 Your Face Belongs to Us When the New York Times broke the Clearview AI story in 2020, we suddenly had to face the reality that no one could truly…
September 11, 2023 Remediate Your Network Today I wrap up my four-part series on how to secure your home network. We’ve enumerated our devices, gotten rid of stuff we don’t…
September 4, 2023 Containing Big Data In the US today we’re dealing with a completely unfettered free-for-all of data harvesting. Without meaningful privacy regulations like the EU’s GDPR, our private…
August 28, 2023 Assessing Your Network Security In the third part of my series on securing your home network, we’ll assess your security and privacy vulnerabilities. In prior weeks, we’ve exhaustively…
August 21, 2023 Demystifying AI Unless you’ve been living under a rock, you’ve seen several news stories about AI, machine learning and so-called Large Language Models. While tools like…
August 14, 2023 Hacker Summer Camp 2023 Every summer, hackers from around the US and around the globe descend on Las Vegas, Nevada, for a series of computer security conferences which…
August 7, 2023 Cult of the Dead Cow In the early 1980s, personal computers started entering our homes. Prior to the internet and services like America On Line (AOL), there were online…
July 31, 2023 Less is More Last time, I told you how to enumerate all the devices on your home network. Before we go to the trouble of analyzing and…
July 24, 2023 The Politics of Privacy Despite growing demand from US citizens for privacy protections, the federal government has failed repeatedly to enact basic privacy laws. However, one US state…
July 17, 2023 IoT Inventory The Internet of Things (IoT) has added internet connections to lots of home devices. Each and every one of those devices runs software on…