Harden Windows Defender protection to the highest levels on Windows 11/10

O: Hada de recursos de Seguridad Digital
The 3 Biggest Security Mistakes Linux Users Make
Router Security
Hardening SSH
Mpv – A free, open source, and cross-platform media player (mpv.io)
Prose.sh – A blog platform for hackers (prose.sh)
GitJournal: Mobile first Markdown notes synchronized with Git (gitjournal.io)
Detecting unauthorized physical access with beans, lentils and colored rice (dys2p.com)
revealed in 2014 in the book "Global Surveillance" by Glenn Greenwald that the NSA's "TAO" (Tailored Access Operations) unit has been intercepting and tampering with technical devices in transit since at least 2010.
The relevant factor in this process is the amount of elements on the edge of the sticker. In addition, there are special seal stickers available which break when peeled off. They are probably more suitable for this method.
Glitter nail polish directly
This method is used by Nitrokey, Purism and others, and is safer compared to the previous method in our view. The screws are sealed directly with glitter nail polish. The screws holes are particularly relevant here.
Our favorite so far is sealing screws with epoxy resin and glitter nail polish, where the polish can be in or over the resin.
random mosaic $ rm -r ice
An alternative to sealing is embedding the whole object in a substance whose surface forms a mosaic that is difficult to reproduce and changes when manipulated. It should be as easy as possible to check the mosaic manually or by technical means. The goal is to protect written documents, data carriers, communication devices, hardware wallets and other sensitive objects in such a way that unauthorized access can be detected with greater probability. We distinguish between two use cases: short-term storage and longer-term storage or shipping.
Tailscale SSH (tailscale.com)
RethinkDNS | Fast, secure, configurable, private DNS + Firewall for Android.
¿Qué necesita proteger?
Exposing the Invisible - The Kit — The Kit 1.0 documentation
Exposing The Invisible
GitHub - sensity-ai/dot: The Deepfake Offensive Toolkit
AdBlock Tester: test your AdBlock extensions
uBlock Origin: The Ultimate Review and Guide
Secure Android - CopperheadOS - Copperhead
Prisma D - Juego de seguridad digital
Daily operations - chezmoi
Easily moving Linux installs
What are your Most Used Self Hosted Applications?
Linux Security Hardening Checklist
GitHub - shaurya-007/NSA-Linux-Hardening-docs
There’s a Multibillion-Dollar Market for Your Phone’s Location Data – The Markup
Email is completely insecure by default. | Viget
GitHub - Sycnex/Windows10Debloater: Script to remove Windows 10 bloatware.
GitHub - iamadamdev/bypass-paywalls-chrome: Bypass Paywalls web browser extension for Chrome and Firefox.
GitHub - CISOfy/lynis: Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Security and Privacy of VPNs running on Winndows 10
Top 3: Mullvad IVPN Firefox VPN
Configure DoH on your browser · Cloudflare 1.1.1.1 docs