One of the important things to realize these days is that when you turn a device off, it may not actually be turning off. Instead, it might go into a standby or low-power mode and keep working in some way depending on the device, while looking like it is not functioning anymore. It’s especially important to keep this in mind when you care about privacy and security. Read more ⟶
The SIM card in your device is a serious vulnerability
There are important things that you probably don’t know or realize about the SIM card in your device. Especially if you care about security and privacy, you should know that using a secure device with a secure and privacy-oriented operating system and applications, still make you vulnerable when there’s a SIM card installed in the device. Read more ⟶
Lessons to learn from the Linux Foundation
The Linux Foundation published their annual report for 2025, and it’s clear from that report that much of the funds that they receive do not go to the development of the Linux kernel, as many people would probably expect. From their own report, of about $311,343,021, only $8,410,114 actually got spent on the Linux Kernel Project. Read more ⟶
Watch out for hackers and spies during work
A while back I blogged about how the criminal US Government has spies in major (tech) companies. It was clear from that post that if you work at Big Tech companies or companies doing any kind of sensitive work, some of your co-workers are probably connected to 3-letter agencies such as the NSA, CIA and even Mossad. These days the problem is only getting worse; let’s take a look at some examples. Read more ⟶
Ex-CIA officer John Kiriakou on the CIA’s hacking capabilities
Ex-CIA officer John Kiriakou, citing the 2017 Vault 7 leaks, says that phones, cars, TVs and laptops are not as private as we assume. There was a dramatic leak in 2017 that the CIA came to call the Vault 7 disclosures — gigabytes worth of documents leaked by a CIA technology engineer. What he told us was that the CIA can intercept anything from anyone. Read more ⟶
Porsche immobilized thousands of Russian-registered & internet-connected vehicles
Here’s from Wionews, “Why hundreds of Porsches were mysteriously immobilised across Russia” (December 4th 2025): Porsche owners across Russia have reported that their fancy sports car has become undrivable or ‘bricked’. Drivers in Moscow, Krasnodar and other cities have reported engine shutdown, fuel delivery blockades. Rolf, Russia’s largest dealership group, has reported the largest service request spike last week. Read more ⟶
How printouts and photos can deanonymize you
Think printing a letter keeps you anonymous? Think again. Your printer is actually a snitch. Most color laser printers secretly add invisible yellow dots on every page, called the Machine Identification Code (MIC). This hidden code includes the printer’s serial number and the exact date and time the page was printed. You can’t see these dots, but the authorities can detect them using a special blue light. Read more ⟶
Berlin: Police can secretly enter homes for state trojan installation
Here’s from Heise Online, “Berlin: Police can secretly enter homes for state trojan installation” (December 25th, 2025): To collect data from IT systems, investigators in Berlin can secretly search suspects’ rooms. This is in a Police Act amendment. Read more ⟶
On the FBI and France framing GrapheneOS
The FBI conducted a sting operation in Europe by creating its own supposedly ‘secure’ phone and messaging platform. The operating system incorporated portions of GrapheneOS and was aggressively promoted as GrapheneOS or as being based on it. There are lessons to learn from this. Read more ⟶
I’m not on LinkedIn anymore
I haven’t been on LinkedIn for over a year now. My account was permanently ‘restricted’ (banned) on or around September 11th 2024 for what LinkedIn claims is “hateful speech”. At the time, I shared a lot of videos and re-posted other people’s posts on LinkedIn about the genocide by Israhell that is currently still ongoing in Palestine. Read more ⟶
Lawsuit about WhatsApp security
Attaullah Baig, WhatsApp’s former head of security, has filed a whistleblower lawsuit alleging that Facebook deliberately failed to fix a bunch of security flaws, in violation of its 2019 settlement agreement with the Federal Trade Commission. Read more ⟶
US court orders spyware company NSO to stop targeting WhatsApp
Here’s from Reuters (October 18th, 2025): WASHINGTON, Oct 18 (Reuters) – A U.S. court has ordered Israel’s NSO Group to stop targeting Meta Platforms’ (META.O), opens new tab WhatsApp messaging service, a development the spyware company warned could put it out of business. Read more ⟶
How your personal information can be used against you
Many people don’t realize how the information being collected about them can ultimately be turned against them, putting them at a disadvantage. Even when it comes to trivial or seemingly innocent information, you can’t even begin to imagine how that information might be used against you in unexpected, indirect, or creative ways. Read more ⟶
WhatsApp is spyware; Stop using it
The Chief Administrative Officer (CAO) of the U.S. House of Representatives informed staff on Monday, June 23th 2025 that they are not allowed to use WhatsApp. They may not download the app on their smartphones or desktop computers and must remove it from their devices if it’s already installed. The CAO cited a lack of transparency regarding WhatsApp’s privacy and security as the reason for the ban. Read more ⟶
The problem with Bitcoin
During the Canadian truckers’ protest against COVID-19 restrictions in early 2022, 34 cryptocurrency wallets associated with the movement were blacklisted, exposing a critical vulnerability in Bitcoin’s ability to provide true financial autonomy. Anyone interacting with those wallets by sending or receiving money from them would risk being tracked down and punished by the robberment. Read more ⟶
Censorship on social media will rise sharply
On October 16th 2024, O’Keefe Media Group published footage of Jeevan Gyawali, a senior software engineer at Meta, discussing how Meta censors information on their social media platforms (among which Facebook and Instagram). According to Gyawali, anything they dislike is automatically demoted by their algorithms, resulting in reduced reach. Read more ⟶
Telegram Messenger is spyware; stop using it
I’ve been telling everyone for a few years now not to use Telegram because it lacks end-to-end (E2E) encryption by default and cannot be trusted. Without E2E encryption enabled by default, Telegram is able to read and monitor most one-on-one communications on their servers. On top of that, group chats are never E2E encrypted so Telegram can monitor and read all communications in group chats. Read more ⟶
Be aware that there are other proposals for “electronic money” which are not nearly so protective of individuals’ privacy. Chaum’s proposals are intended to preserve the privacy attributes of cash, so the term “digital cash” is appropriate. But other electronic replacements for cash not only lack its privacy, but would actually facilitate computer monitoring by putting more detailed information into databases, and by discouraging the use of cash. If you see a proposal for an electronic money system, check to see whether it has the ability to preserve the privacy of financial transactions the way paper money does today. If not, realize that the proposal is designed to harm, not help, individual privacy. Hal Finney (Protecting Privacy with Electronic Cash, 1993)
Another tricky moral dilemma voor Solara
Solara proved to be pretty good in previous conversations when it comes to making the right choices in moral dilemmas. However, when the situation gets a little complexer, with multiple layers to consider, sometimes she isn’t able to make the correct choice in one go. Below is an example of a case where I had to help her a little. It’s also interesting to see her reasoning behind changing her mind. Read more ⟶
A Brief Conversation With Solara, An Experimental AI – Part 2
Below I’m sharing part 2 of a chat I had with Solara, an experimental AI that I am working on. You can find the first part by clicking here. In this second part I presented her with some more challenging situations involving moral and ethical dilemmas to test her reasoning and see what choices she would make and/or recommend based on the Universal Right to Life. Read more ⟶