Privacy


Digital Resilience: Redundancy for Websites and Communications

When what seems like half the planet noped out of WhatsApp after its terms of service update, applications like Signal (which I highly recommend) saw an unprecedented increase in user traffic. Signal had so many new users sign up that it overwhelmed their existing infrastructure and lead to a 24-hour-ish

Privacy

WPA Key, WPA2, WPA3, and WEP Key: Wi-Fi Security Explained

Setting up new Wi-Fi? Picking the type of password you need can seem like an arbitrary choice. After all, WEP, WPA, WPA2, and WPA3 all have mostly the same letters in them. A password is a password, so what’s the difference? About 60 seconds to billions of years, as

Cybersecurity

Secure Application Architecture Basics: Separation, Configuration, and Access

Software developers today are encouraged to focus on building, and that’s a great thing. There’s the benefit of maker culture, an attitude of “always be shipping,” open source collaboration, and a bevy of apps that help you prioritize and execute with maximum efficiency. It’s in an environment

Cybersecurity
Secure Application Architecture Basics: Separation, Configuration, and Access

Subscribe

Receive new posts in your inbox.

Success! Check your email to confirm your subscription.