Swift | Silent | Deadly


Security


ProtonMail Five Years Later, Part I: The Basics

I have been using ProtonMail full-time for over five years, and recommending it for almost six. My contact form forward emails to a ProtonMail account, and any of you that have interacted with me have done so through ProtonMail on my end. A lot has changed since ProtonMail’s beginnings. This post will cover the basics of ProtonMail: how it encrypts your data-in-motion, data-at-rest, and some other features.

Read More

VMs Part 1: Creating Your First Virtual Machine

It recently occurred to me that in over five years of running this blog, I’ve never given step-by-step instructions for setting up or using a virtual machine (VM). It is likely that a lot of you already use VMs don’t need a tutorial. If that applies to you, please share this with a friend who does. It is equally likely that some of you could use step-by-step instructions. This tutorial will cover creating your first virtual machine.

Read More

OPSEC for Legal Marijuana Consumers

The commercial sale of legal, recreational marijuana in the United States poses some interesting legal problems. Marijuana is completely legal under the laws of some states, but still a Schedule I substance according to federal law. Though the strange detente that has emerged over the past several years has kept things awkwardly civil, the federal government would be legally justified in cracking down on growers, purveyors. . . and consumers.

Read More

Basic Alarm System Best Practices

An intrusion detection system (IDS) system should be an integral part of your home security plan. IDSs are detective security measures that also have a great deal of deterring value. Alarms are far more complicated than most people realize, however. To provide the maximum intended effectiveness, alarms must be carefully installed, tested, and used. These alarm system best practices will help you assess your own system or provide some guidance if having a new one installed.

Read More

The Apricorn Aegis SecureKey Flash Drive

The Apricorn Aegis family of flash drives, HDDs, and SSDs has been around for quite a while. I’ve generally rejected them based on price alone. Recently a customer requested training that included this drive. Since learning the Aegis and its capability, I’m very impressed. If you have compelling data security needs, this product might be for you.

Read More

Useless OPSEC Measure: Vary Your Routes

Trying to vary your routes between home and work is sometimes touted as an OPSEC measure. This is sometimes advocated by law enforcement or military organizations as a measure their members should take. In some instances it may actually be a good idea. I began to think seriously about this, however, when I read a few articles that explicity or implicitly seemed to recommended the practice to average citizens in the prepping or “tactical lifestyle” communities.

Read More

Lock Safari: NYC

I recently had the chance to spend a few days in New York, New York. This was a personal trip, and I covered a lot of ground. This time, I actually managed to focus on the locks I saw, and I saw some good ones on Lock Safari NYC. I noticed some interesting things about New York’s locks.

Read More

Lock Safari: Salt Lake City

I recently had the opportunity to explore another city in my search for rare and interesting locks. Lock Safari Salt Lake City took me through quite a few neighborhoods over a long weekend. Over three days a friend and I covered the Marmalade, 9th and 9th, Temple Square/Downtown, and Sugar House areas of SLC. I found quite a few interesting locks, but not as many as I expected from a city of this size.

Read More