Prime Numbers and YOUR Digital Privacy

I remember 50 years ago thinking in math class… what’s the deal with these Prime numbers….A prime number (or a prime) is a natural number greater than 1 that cannot be formed by multiplying two smaller natural numbers. Like so what….now these decades later it is at the core of successful encryption.

We have all have become crops with data to harvest. Each piece of data a kernel of corn which upon analysis offers up even it’s DNA. Every moment online our presence is being scraped (raped) clean of all personal information. For tracking you, your digital assets are even being “fingerprinted” in spite of other substantial efforts to cloak yourself… ugh.   Websites, Social Medias, emails etc.  The harvesters are tech companies, corporations, financial, governments, hackers, political operatives.  Who is good? Who is bad?  What is true? What is false? Are things really more nuanced? As far as protecting your privacy, it should not make a difference… like free speech, you have the right to privacy.

Getting a handle on this is largely possible.  Both for general everyday situations and for specific intents.  It may also be somewhat possible to retrieve and reduce what is “out there” on you.   Purge Google Facebook etc.  Resist WeChat.

Hackers are getting better.  Social Engineering for access is always getting smarter.    I had one phishing email this year that had actual old user name and password, and was able to send it to my associated email at the time.  It implied I had been hacked and a ransom is being asked.  Gave me pause…but realizing that a few online services I had used…like yahoo had been hacked and this info could have been taken from there I ignored the message…though nice try. Not.

The collapse of bitcoin, i think, is that what was thought to be a private and secure means for financial transactions is now almost the opposite. The on and off ramps for converting to currency like dollars are closely monitored.  If one or more of the “anonymous” transactions becomes known, a competent sleuth can follow the trail of transactions and reveal what was once thought hidden.

Uber is not being scrutinized right now for the data it is scrubbing off you.  How about their application for a patent that determines who is likely a drunk passenger and who is not.  Attempted to be done not just by time, date and location, but even more intimate data such as how you are handling the phone.  Or WeChat, possibly the most powerful and ominous app out there.  The PRC of China may assign you a social credit score.

Password systems   I use secure passwords.  I record my passwords NOT on a spreadsheet, or with a service that automates it but in a paper journal written by hand.  My Apple computer has a keychain that will help autofill from an encrypted file many of those passwords.  My main computer is locked down with full encryption and password access.  I have not gone to 2 factor encryption.  I have 4 or 5 password for my own use that vary in complexity and age.  I categorize them as good better and best and use them accordingly.  I may add a new password once a year unless there is an indication otherwise.

Encryption works!  You gotta know about the keys and how secure they are and who has them.  I think only YOU should have them.  Not encrypted and salted away by a provider with ability to retrieve on demand.

My servers and hosting technology is robust and secure.  Using advance hosting tech. Defense occurs at many points, first and foremost DNS.  Active scanning of incoming traffic and successfully deterring substantial dangers long before they are near your online data.

I wonder if maximizing dis or false information for scrubbing can be helpful.  Does it need to scale to be so?

Fighting Back….  Purging Google, Facebook WeChat “Social Credit Score”

Turning off Cellphone more often…

Own a domain.

Password Breach? Digital privacy compromised?

Stealth Agents

Tools To Protect Yourself


First Step

Understand the scope of the assault on your privacy.


Second Step

Determine the tools best for your situation


Third Step


password breachA serious part protecting your digital privacy is managing your passwords and resolving a password breach.  I manage literally hundreds as I care not only for my own but also those of a number of clients.  I do this the old fashion way with writing them down on a piece of paper.  Not is a spreadsheet, not produced by a service.  Kind of a hassle but the password is often the frontline of your privacy protection.

Here is an interesting service that attempts to tell you if your password has been revealed in a breach.  Pwned Passwords.  Interesting application.  I think I will not use it, but change some passwords of the most critical services I use.

Exposed and Under Assault

Naked and exposed. Freedom of expression is under assault.  My opinion, if not your opinion, may be subject to actions that attempt to suppress.  Intolerance of a viewpoint, however benign or offensive, is subject to outrage.  Implicit violence, doxing, bullying, shaming and so forth.  Ignorance often times is the companion of the extreme expressions.  The ignorance of incomplete information or the parroting of misinformation of others contributes to conflict.  How is it that a passionate ill informed position, even if held by many, merits consideration?

There is a time for exposure and a time for privacy.  The choice should always be yours.  We now realize that our privacy is also under assault.  Our digital experience is being ruthlessly surveilled by any app we use, any website we visit, any smartphone we carry.  Encryption, disinformation and stealth systems are your very best protections.  All of who you are need not be exposed and assaulted.