Monitor Messaging

Communications Security

Electronic communications are an inseparable element of modern life, and offer many benefits. Unfortunately, they also make us vulnerable to surveillance and exploitation by public and private entities. We can limit, protect, and control this exposure without sacrificing the advantages of connectivity.

Cryptocurrency – The Good, The Bad, & The Ugly – The Bad


Cryptocurrency is not hack proof as your money is stored in digital wallets that are a much easier target than blockchain technology. The Bitcoin goldrush has meant that many new to the cryptocurrency scene are investing without fully understanding how the currencies work-and many in the industry do not care. This has left the door open for cybercr...

Continue reading

Cryptocurrency – The Good, The Bad, & The Ugly


Despite its reputation, Bitcoin is not completely anonymous. But the Good News is Cryptocurrency can be purchased and spent anonymously with a few smart steps Because every transaction uses bitcoins from a prior transaction, and the blockchain is public data, every Bitcoin payment has a traceable history that can be viewed by anyone. While addresse...

Continue reading

How The State & Hackers Hack (And How to Stop Them) – Part 5: Evil Twin Hotspot


A fake Wi-Fi hotspot, or "Evil Twin" hotspot, is a Wi-Fi access point set up by a hacker or state spies which mimics a legitimate hotspot including the service set identifier (SSID) provided by a business or organization which is nearby, such as a coffee shop or hotel that provides free Wi-Fi access to its customers. They are often named 'honeypots...

Continue reading

How The State & Hackers Hack (And How to Stop Them) – Part 3: Malware Protection


Now to the big question 'How do I make sure my devices are malware free?' – the answer is twofold: personal vigilance and use of protective tools. Hopefully the previous article helped to improve your personal malware awareness, and some real-world examples below can help cement those risks. Above all else, be extremely cautious with emails, where ...

Continue reading

How The State & Hackers Hack (And How to Stop Them) – Part 2: Classic Malware & Future Trends


Everyone is familiar with the term Malware - but what is it? This article hopes to provide a basic explanation of the various types of malware, the format they take, and future trends. The follow up article will discuss methods to prevent infections. Malware is short for 'Malicious Software' and is specifically designed to DISRUPT, DAMAGE, or gain ...

Continue reading

How The State & Hackers Hack (And How to Stop Them) – Part 1: Password Cracking


This series of articles will attempt to explain, in layman's terms, how Hackers – either underground criminals or state level wrongdoers – gain access to an individual or company's digital life. Many of the phrases and terminology can be confusing so we hope to explain things in clear, simple language. Cyber hacking is on the rise, and the enemy is...

Continue reading

Harden Digital Life Series – Part 5: Managing Privacy

A short word on how to establish a desired privacy baseline which reflects your privacy needs and balances those with practicality. In an ideal world everyone could choose to conduct everything online anonymously – but we live in a very imperfect world and the effort required to get close to privacy nirvana can be overwhelming, cumbersome, and some...

Continue reading

Harden Digital Life Series – Part 4: Encrypted Email


Understanding and adopting encrypted email is a vital step in hardening your digital life. End-to-end, zero knowledge, open source, encrypted email is not overly complicated to use. But you need to understand the positive, negatives, and essential tightening steps. Later articles will go more in-depth on how to lock down ProtonMail and Tutanota. PR...

Continue reading

Harden Digital Life Series – Part 3: Lock Down Your iPhone


"APPLE IS EVIL!" That may be true, but the tech is hard to let go for many, especially with so few decent alternatives that have a better privacy record out there. Many will find some of the following setting changes to be too impractical and that is normal and fine, everyone should make their own changes - balancing their threat level with ease of...

Continue reading

Harden Digital Life – Part 2: The Power of Self-Destruct Messaging


If a phone, tablet, or laptop only store 24 hours of communication then how useful is that to the enemy? In contrast, how useful are months or years of someone's private messages? Many have their own favorite ways to communicate securely on messaging apps, but all will agree on this basic concept - encryption really works. Encrypted messaging, stor...

Continue reading
standing-tall.png

To guide, inspire and prepare Wyomingites and their fellow Americans to act against existential threats to their liberties and to Western Civilization from radical revolutionaries and Emperors who have no clothes.

Copyright © 2025 Stand Tall and Strong.