security(5/0)

Send files safely to anyone in the world

What if you need to send sensitive information to a person on the other side of the planet? What if they need to send something to you? Here we’ll explore a simple options available to you. Email Many email providers, such as Outlook and Gmail, encrypt sent email traffic by default. If both the sender and receiver email providers support TLS (Transport-Level Security), such as when one Outlook account emails another, then your message cannot be read if intercepted in-transit.…

Most software oppresses humans

Aral Balkan summarizes what I’ve discovered myself after years in technology and business - the prevailing system for generating software in the last decade or so is engineered to create human-oppressing products. As with many of the systemic problems of our society, those with the power to change the system are also those who profit most. The likelihood of real change in the natural order is nil; prayer is essential.

Store secret text in the cloud

I was updating my resume the other day when something creepy happened. Dropbox, where my resume sits, showed me an advertisement for resume assistance. If it’s not clear why this creeped me out, consider: to know the file was a resume, Dropbox needs to scan the entire document. It wasn’t called ‘resume’. the scan is sophisticated enough to accurately determine the contents of what I’ve written. at least some of this data is shared with the owner of the advertisement.…

Police impersonation scam

The frequency and sophistication of malicious scams are on the rise. Victims are left financially and emotionally devastated by these attacks. In technology parlance, a scam that exploits a person is called “social engineering.” The most sophisticated scam I’ve encountered occurred while writing my MBA thesis for a Chicago counseling center. It cost the targeted therapist $3,000 with no possibility of recourse. Here’s the excerpt: 💬 In late 2019, a person impersonating a Chicago police officer left a voice mail for a therapist indicating that one of their clients was involved in a court case and that the therapist should call back immediately.…

Secure managers share their own tools

Managers can be in a world of their own. While common employees do the work assigned them, managers are huddled in rooms making important decisions. Managers have all-day ‘off-site’ meetings to shape the future of the company; common employees meet to plan their week. Common employees are at their desks all day; managers are away from their desks, meeting with one another, reporting to their supervisors, and performing one-on-one meetings with their direct reports.…