The Danger of SIM Swapping
A few months ago, I saw someone on Twitter talk about the time he experienced SIM swapping on his iPhone. He ended up losing access to his Apple account, but did get his cell phone number back. Let me explain…
Digital Asset Inheritance
In my last post, Social Media Afterlife, I talked about what can happen to your social media accounts after you’re gone. In the U.S., the Revised Uniform Fiduciary Access to Digital Assets Act allows an executor access to someone’s digital…
Social Media Afterlife
When you write your will, you will spend a lot of time cataloging all of your possessions and thinking about how to distribute them. The obvious things would be physical assets like real estate, cars, and money. But what about…
The Internet is a Utility
January 2022 update: I published this a month before Covid-19 hit the US. Broadband internet makes it possible for many people to work and learn from home. It also made it possible to for houses of worship to keep operating,…
Tor is Good But It’s Not Magic
In my post How to Use Tor, I showed you the basics of using the Tor Browser. But Tor is more complicated than that, and setting up a super-secure connection is harder than you think. Using the Tor Browser can…
Computer Tools of the Trade
In my post The Greatest Enemies of Electronic Devices, I promised to show you the necessary computer tools to clean and repair your machine. Most of them are inexpensive and readily available outside of specialty stores. Required Computer Tools Microfiber cloths: These can…
Book Review: Nobody’s Victim
“I operate my firm, C.A. Goldberg, PLLC, with one fundamental rule: if one of my clients has been harmed, somebody must pay. It’s as simple as that.” This quote is from the beginning of Carrie Goldberg’s book Nobody’s Victim. Goldberg tells…
What is Military Grade Encryption?
What comes to mind when you hear the phrase “military grade”? Something strong and tough? Protection against disaster and destruction? That’s why marketers use it. So many products – from smartphone cases to notebooks – are labelled as military grade….
Your Friend Encryption
As I noted in 2015: Government agencies have always had an uneasy relationship with encryption technology. The tragic events [of the November 2015 Paris attacks] only deepened that distrust. Many countries around the world proposed restricting or banning encryption. But would such…
10 IT Blogs That You Should Be Reading
Recently, I was challenged to come up with a top ten list of blogs. So, I decided to make a list of my favorite IT blogs. They cover a wide range of subjects, so I divided them into three sections….
Recent Comments