The Internet is surely broken, and privacy is in danger of being lost for good. To make matters worse, the average user is lost when it comes to how the Internet works and who / what is connected to their supposedly private network.
Now usher in the Internet of Things (IoT) era and consider that network devices may ship with data gathering provisions, corporate back doors, and security holes.
Add to this the fact that data collection is a multi-billion dollar business, which is expanding at a rapid rate. It's now the corporate norm to mine customer data and apply artificial intelligence to classify each user. We can only begin to imagine how this trove of mined data may be used in ways we didn't expect or want and never authorized.
It's a dismal situation, but all is not lost. And privacy need not be dead.
At Mind Chasers, our sole mission is to help home and business owners take control of their network.
Read more about us here....
Recent articles related to privacy, security, & networking:
|Build a BTC Thermal Pad using SMD Window Approach on Altium||BTC thermal pads present a myriad of challenges. A recent approach to BTC PCB land pattern design is the use of an SMD Window. This article shows the construction of such a land pattern and will track its progress|
|Review of SGMII Concepts||The Serial Gigabit Media Independent Interface (SGMII) is a popular Gigabit Ethernet PHY interface, and it holds various advantages over both GMII and RGMII. This article reviews some of the core SGMII concepts with the help of oscilloscope screen shots from our Rohde & Schwarz RTO1044.|
|Install Embedded Linux Built with Yocto Project||Summary of steps used to install and boot embedded Linux image on an SSD. Image was built with Yocto Project using mainline Linux kernel and custom image.|
|Install jQuery Mobile demos on Ubuntu||The jQuery team has recently announced that 1.5 alpha is available for testing. This article documents the steps we took to set up the demo site on one of our Ubuntu 16.04 Linux machines for testing and patching.|
|Create a Network Honey Pot with (Python) Sockets||Use Python3 sockets to create a honey pot for the detection of malicious activity on a network|