Set up a Pi-hole VPN on an AWS Lightsail instance
Build your own VPN with Pi-hole to block ads and trackers.
There are better options for a privacy-respecting phone
Meet the new, better Apple. Here's how to choose your phone and set it up.
Digital resilience: redundancy for websites and communications
How you can make your digital life more resilient when using services you don't own.
Create a self-hosted chat service with your own Matrix server
A speed-run introduction to Matrix via Dendrite.
So you're the family tech support
Privacy and online security to-dos for the home-for-the-holidays tech support hero.
Outsourcing security with 1Password, Authy, and Privacy.com
Take some work off your plate while beefing up security with three changes you can make today.
Three healthy cybersecurity habits
Three helpful cybersecurity new year resolutions. Happy holidays!
The care and feeding of an IoT device
Why IoT devices are, basically, puppies, and whether or not you should give somebody one for Christmas.
Hackers are Googling your plain text passwords: preventing sensitive data exposure
Why sensitive data controls need to be established long before you think you need them, as demonstrated by Google dorking.