Secure Your Devices

224 bookmarks
Newest
Carbon Fiber Ventilator
Carbon Fiber Ventilator
With what appears to be no more than a standard cheap pen in your shirt pocket, you can now have a devastating last-ditch self-defense implement that you can take most anywhere with you. It is constructed from ultra-stiff hollow carbon fiber tubing, and has a penetrating point that is protected and concealed by a pen cap. The pen cap also functions as a handcuff key. The opposite end is covered with a slightly tacky material to enhance the grip. Carbon fiber is a high-tech material which is completely non-metallic, extremely strong, rigid, and way lighter than fiberglass. It's used in advanced aircraft, boats, sports equipment, etc. where performance is everything and cost is secondary. Length: 6". Weight: 0.2 oz. Color: all black. Made in U.S.A. CLICK HERE to see a video review of the Carbon Fiber Ventilator. Check out an alternate version, the Titanium Ventilator. SKU #: CFV
·shomer-tec.com·
Carbon Fiber Ventilator
Slip Jim
Slip Jim
The Slip Jim is a long reach Jim tool for attacking locks with live latches. The long attack  even allows for it to get past most latch covers that are designed to prevent this style of attack.
·sparrowslockpicks.com·
Slip Jim
Filebin
Filebin
Convenient file sharing. Registration is not required. Large files are supported.
·filebin.net·
Filebin
Molly
Molly
Molly is an improved Signal app for Android
·molly.im·
Molly
Canada eSIM | Prepaid Canada data | aloSIM
Canada eSIM | Prepaid Canada data | aloSIM
Looking for Canada data? No matter where you are in the Great White North, a Canada eSIM can keep you online without Wi-Fi.
·alosim.com·
Canada eSIM | Prepaid Canada data | aloSIM
eSIM for Canada
eSIM for Canada
Buy a prepaid eSIM for Canada with instant delivery. Stay connected without roaming fees. Easy & fast.
·prepaid.canadiansim.com·
eSIM for Canada
Resources - Access Now
Resources - Access Now
Resources Access Now’s team of policy experts, advocates, and technologists are finding solutions to help everyone protect themselves from digital threats
·accessnow.org·
Resources - Access Now
How to Securely Wipe a Hard Drive on Your Mac
How to Securely Wipe a Hard Drive on Your Mac
Spread the loveIf you’re planning on selling, donating or disposing of your Mac, it’s important to make sure all of your personal files and information are gone for good. The best way to accomplish this is to securely wipe your hard drive. Here’s how you can do it: 1. Create a backup: Before you start the process, make sure you have a backup of all your important files, so you don’t lose any data you may need in the future. 2. Disable FileVault: If you have FileVault enabled, you’ll need to disable it before wiping your hard drive. You can […]
·thetechedvocate.org·
How to Securely Wipe a Hard Drive on Your Mac
What happens on your Mac, stays on Apple’s iCloud?!
What happens on your Mac, stays on Apple’s iCloud?!
The document discusses vulnerabilities in macOS privacy mechanisms, focusing on unauthorized access to user data such as location, contacts, and calendar through exploitation of iCloud tokens. It highlights attacks via applications like GarageBand and iMovie by manipulating macOS entitlements and dynamic libraries. The conclusion urges users to review their iCloud settings to enhance security.
·slideshare.net·
What happens on your Mac, stays on Apple’s iCloud?!
Cell Phone Unlocking Cellular Telexommunications Industry Association agreement w FCC
Cell Phone Unlocking Cellular Telexommunications Industry Association agreement w FCC
When cell phone users change between compatible wireless service providers, they have the option of "unlocking" their phones to use on their new service provider's network, giving consumers greater freedom and flexibility while increasing incentives for service providers to innovate.
Carriers, upon request, will unlock mobile wireless devices or provide the necessary information to unlock their devices, for customers and former customers in good standing and individual owners of eligible devices after the fulfillment of the applicable postpaid service contract, device financing plan or payment of an applicable early termination fee.
Carriers that lock devices will clearly notify customers that their devices are eligible for unlocking at the time when their devices are eligible for unlocking or automatically unlock devices remotely when devices are eligible for unlocking, without additional fee. Carriers reserve the right to charge non-customers/non-former-customers a reasonable fee for unlocking requests.
Within two business days after receiving a request, carriers will unlock eligible mobile wireless devices or initiate a request to the original equipment manufacturer (OEM) to unlock the eligible device, provide an explanation of why the device does not qualify for unlocking, or why the carrier reasonably needs additional time to process the request.
·fcc.gov·
Cell Phone Unlocking Cellular Telexommunications Industry Association agreement w FCC
GrapheneOS usage guide
GrapheneOS usage guide
Usage instructions for GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
·grapheneos.org·
GrapheneOS usage guide