As I mentioned a few weeks ago, I have recently written a book on digital security. This post is going to kick off a series on digital security (and secure communications – a skill that might become very important for freedom lovers in the near future) that roughly follows the outline of the book. This is completely free information that I make a very good living teaching. I’ve worked hard to put this into plain language (and perhaps even made it enjoyable to read, as well). If you enjoy this content, please consider picking up a copy of Digital Self Defense: The Layman’s Guide to Digital Security when it comes out this spring. Thanks!
Uncensored Tactical Podcast Appearance
I recently appeared on the Uncensored Tactical Podcast. Pat (the host) and I discussed a topic I rarely get to talk about: covert key generation. It was a super fun show, and not a topic I get to talk about with many people.
My Thoughts on Pepper Spray
In my recently published on-body EDC items article, I talked about pepper spray. To be honest, I’m very curious by the talismanic quality of The Gun and how many in the self-defense community completely ignore everything else (not all, but many to be sure). If you’re not carrying pepper spray, here are my best arguments to convince you otherwise. You can expect to see more articles about pepper spray here. I am going to do my best to encourage everyone to consider this tool.
EDC Part I: On-Body Carry Items
This post, covering my on-body EDC items, will probably the be the least informative (but most read) of this entire EDC series I’m doing. The reason: there are a million articles out there explaining why you should have an EDC (everyday carry) system. My perspectives on EDC clothing, the EDC bag / bug out bag / get home bag concept, and vehicle preparedness all offer more original ideas than this one. The on-body EDC ground has been well-trod.
State Concealed Carry Class Review
I recently had to attend my state’s concealed carry class. Most concealed carriers don’t get to attend these classes too often. I haven’t attended one in years, but through a bit of a fluke I had to attend one to one to get my current state’s resident permit. I love training, but was I ever disappointed in the class. Today is going to offer an after-action review of my state concealed carry class.
Five Steps to Protecting Your Home Address
Achieving comprehensive personal privacy is a complicated goal involving a lot of complex, discrete steps. On this blog I spend a lot of time focusing on the highly specific, individual steps. Often we fail to provide a lot of context for why we’re doing them, or how they fit into the bigger picture. This was called to my attention recently when an old friend contacted me. He has a legitimate safety reason to wish to be more private, and asked me for advice. Unfortunately, I don’t have a single blog post I could offer him that effectively introduces the basic steps of protecting your home address.
VMs Part III: Snapshot Management
In the last installment in the virtual machine series, I discussed the basic setup of Ubuntu. Today I am going to talk about snapshots, why they’re important, and how to manage them. This tutorial will walk through my workflow for working with snapshots.
Self Defense Law Folk Lore
Greg Ellifritz recently wrote a post about the phrase, “I’m in fear for my life.” In it he concluded that saying (which is not the same thing as being) you are in fear for your life is, “not a shortcut to provide some sort of instant justification for shooting someone.” I recently got a comment on one of my other blogs (the “gun blog”) that I’m going to talk about today because it is another great example – though a less common one – of ‘self-defense law folk lore.’
ProtonMail Five Years Later, Part III: Security Features
I have been using ProtonMail full-time for over five years, and recommending it for almost six. My contact form forward emails to a ProtonMail account, and any of you that have interacted with me have done so through ProtonMail on my end. A lot has changed since ProtonMail’s beginnings. This post will cover the basics of ProtonMail: how it encrypts your data-in-motion, data-at-rest, and some other features.
ProtonMail Five Years Later, Part II: Tiers & Paid Features
I have been using ProtonMail full-time for over five years, and recommending it for almost six. My contact form forward emails to a ProtonMail account, and any of you that have interacted with me have done so through ProtonMail on my end. A lot has changed since ProtonMail’s beginnings. This post will cover the basics of ProtonMail: how it encrypts your data-in-motion, data-at-rest, and some other features.