Check out the latest posts
Privacy Advocate

Privacy Update: PrivSec - Part 2 - threat modeling

In the second part of this series, I'll look at how to identify the level of threat your online presence could present and how you address that. Define the threat A common misconception many people have is to assume that the greatest or only threat comes from 'Big Tech', this...

Big H


TWEETSTORM is an occasional feature on where we share threads , mostly from Twitter, that we think deserve a wider audience, some are informative, some educational, some amusing and others yet are controversial...we dig these out for you so you don't have to! Today's is particularly worrying! The...

Privacy Advocate

Privacy Update: PrivSec - an examination - Part 1

From today and for the next three Mondays, will run a series that will examine in detail the necessity for privacy & security, or PrivSec, whenever and wherever you operate or exist online. It is commonly assumed that the two areas are mutually inclusive but this is not always...

Privacy Advocate

Reading is beautiful

Are you someone who likes to track your reading? If so, then GoodReads may come to mind. However, GoodReads is an Amazon company and tracks a little too much for my liking. Plus, if you follow, you'll know we love Mastodon and that is where Bookwyrm comes in....

You’ve successfully subscribed to Decentralize.Today
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Your link has expired
Success! Check your email for magic link to sign-in.
Please enter at least 3 characters 0 Results for your search