About Stealth.Systems

This author has not yet filled in any details.
So far Stealth.Systems has created 27 blog entries.

Password Breach? Digital privacy compromised?

Stealth Agents

Tools To Protect Yourself

1

First Step

Understand the scope of the assault on your privacy.

2

Second Step

Determine the tools best for your situation

3

Third Step

Implement

password breachA serious part protecting your digital privacy is managing your passwords and resolving a password breach.  I manage literally hundreds as I care not only for my own but also those of a number of clients.  I do this the old fashion way with writing them down on a piece of paper.  Not is a spreadsheet, not produced by a service.  Kind of a hassle but the password is often the frontline of your privacy protection.

Here is an interesting service that attempts to tell you if your password has been revealed in a breach.  Pwned Passwords.  Interesting application.  I think I will not use it, but change some passwords of the most critical services I use.

2018-03-16T21:22:24+00:00 March 3rd, 2018|

Exposed and Under Assault

Naked and exposed. Freedom of expression is under assault.  My opinion, if not your opinion, may be subject to actions that attempt to suppress.  Intolerance of a viewpoint, however benign or offensive, is subject to outrage.  Implicit violence, doxing, bullying, shaming and so forth.  Ignorance often times is the companion of the extreme expressions.  The ignorance of incomplete information or the parroting of misinformation of others contributes to conflict.  How is it that a passionate ill informed position, even if held by many, merits consideration?

There is a time for exposure and a time for privacy.  The choice should always be yours.  We now realize that our privacy is also under assault.  Our digital experience is being ruthlessly surveilled by any app we use, any website we visit, any smartphone we carry.  Encryption, disinformation and stealth systems are your very best protections.  All of who you are need not be exposed and assaulted.

2018-02-24T19:54:42+00:00 February 24th, 2018|

No privacy in the Communist Party of China

The Communist Party of China (CPC) is boasting of over 100 smart phone applications designed to allow senior party members to more accurately track their underlings’ loyalty, based in part on how much communist propaganda the individual consumes on the app.

Read more

2018-03-05T21:58:53+00:00 October 6th, 2017|
Load More Posts