How to Find and Delete Metadata

iceberg symbolized as metadata

Metadata can be located in any kind of document of piece of data that is created by a user. Just as easy as it can be created, metadata can be deleted and removed. First we must explain what metadata is. What is Metadata? We’ve already discussed this in a previous post, called “How to Remove …

Read more

How To Delete Your Data Off of Social Media

facebook subsidiaries

The most popular social media apps use an abundance of data to sell to advertisers. They get this data from their users by tracking their post’s, demographics, and any interest they talk about or interact with on the platform. There are many people who use social media apps for an extended amount of time and …

Read more

What A Companies Privacy Policy Says About Them

big tech logo's

The concept of privacy policies for companies began to develop in the early days of the internet when people became more aware of the potential risks of sharing personal information online. Initially, companies had few guidelines to follow when it came to privacy policies. However, as the internet became more popular, governments began to take …

Read more

What Do Video Game Companies Do With Your Data?

The video game industry is an industry that has gained a significant amount of wealth and cultural influence over the years with the improvement of technology. They became an industry of this magnitude, because of their innovation and creativity. Multiple generations have grown up on video games and with them getting better and better each …

Read more

The Ultimate Guide to Privacy: How VPNs Work

vpn diagram

Virtual Private Networks (VPNs) have been around for a while, and they’ve come a long way since their utilization in the late 1990s. In the beginning, only large organizations used VPNs to establish secure connections for their employees. However, as technology advanced, VPNs became more affordable and accessible which meant more companies started using them. …

Read more

Middle Man Cyber Attack, It’s More Common Than You Think

man in the middle diagram

Middle Man or Man in the Middle (MitM) cyber attacks are cheap and relativley easy hacks to deploy in public areas that not many people know how to protect against. This attack can result in Eavesdropping on your communication which can gain access to private information like passwords or credit card numbers. Data manipulation which …

Read more

The Most Private VPN Service

When looking for a VPN people try to find the perfect service that makes you Anonymous. But no matter what, through payment or directly putting your name on that account the service you can still be linked to your IP address. The way most VPN’s convince you of security and privacy is through No-log services. …

Read more

How Browser Extensions Affect Your Privacy

honey logo

You ever add an extension that offers all the upside and you don’t know what they get out of it? That is the business model of most browser extensions that you use. The offer you a function but what they get is all your data for free most of the time without you ever knowing. …

Read more

Burner Phones/ Burner Accounts and How To Get Them

A standing phone on fire in a city block, Rainy background, Cinematic

Burner Accounts and Burner Phones has long been the best way to conceal someones identity when engaging in online activity. They allow a large amount of versatility at a low cost. While very their is many benefits for their use, these methods should not be used for every day usage. Also it is important to …

Read more

Steps on How to Never be Found on the Internet

A cartoon of a Man Erasing a computer with a pencil earser, --ar 3:2

Every single person has been there. They sign up for an online account with a random email just so they can view a story, order food or use a service. Eventually a person has multiple emails with many different account attached to it. All of these accounts hold personal information that can either be hacked …

Read more