1 year agoDEEPLY FLAWED Public Key Infrastructure (PKI) is Supposed to Secure the Internet + Q&ARob Braxman TechVerified
8 months agoTwo Factor Authentication (2FA). The SCAM of the Century. Defensive Strategy 8-21-2024TheWarAgainstYou
2 years agoMobile Carrier IMEI Checks are a Consumer Abuse! How to Fight BackRob Braxman TechVerified
10 months agoAI Killed Encryption. End-to-End Encryption (E2E) is Dead. Killed By New Tech 6-19-2024TheWarAgainstYou
2 years agoMicroG on De-Googled Phones - How it Makes the Phone Functional. Is it Safe?Rob Braxman TechVerified
2 years agoYour Mobile is Leaking Location! A-GPS, SUPL, NLP to Google (and Apple) - CybersecurityRob Braxman TechVerified
2 years agoAre You Getting Correct Privacy Advice? Understanding Your Threat ModelRob Braxman TechVerified
1 year agoAbout Burners, Satellite, KaiOS Phones, and Data only for Privacy + QARob Braxman TechVerified
1 year agoAbout Burners, Satellite, KaiOS Phones, and Data only for Privacy + QARob Braxman TechVerified