Articles

  • Mass Surveillance Crafting a Blueprint for Global Fear – Exploring Its Beginnings During the Cold War

  • Why to avoid 5 eyes and 14 eyes

    In order to understand what five eye and fourteen eyes are, we have to briefly examine the world during the height of the Cold War. The threat of espionage from sleeper cells or moles was increasingly becoming a concern for many countries. Back then, even with rudimentary technology, secret agencies were convinced that the only way to thwart the looming threat of insiders. Well, how do you do that? You intercept, collect, and monitor everything. This was not an entirely new concept, as similar actions had been taken after World War II. How do you do this on a massive,…

  • Your Metadata Including Your Geo-Location

  • Your Clues About Your Real Life and OSINT

    You need to act and fully adopt a role as an actor would do for a performance. You need to become a different person, think, and act like that person. This is not a technical mitigation but a human one. You can only rely on yourself for that. Ultimately, it is mostly up to you to fool those algorithms by adopting new habits and not revealing real information when using your anonymous identities. Ross Ulbricht: Arrogance or Stupidity? You’ve undoubtedly heard of the Silk Road. What was supposedly the most secure, anonymous, and impenetrable platform was swiftly taken down after…

  • VPNs are just one piece of the puzzle

    It truly makes me so happy to see VPN usage soaring, with so many people finally becoming aware of just how vulnerable their internet traffic is. VPNs used to once be some obscure technology for enterprise applications, or something that only the truly paranoid or devious needed. Now seemingly all of my friends either know about or use VPNs. But unfortunately, VPNs are just one piece of the puzzle. And it’s a very large, and complicated puzzle. Just as privacy efforts have made hudge strides, so to has the technology used to spy on us. While a VPN may encrypt…

  • Uncovering The US’s Dark History of Covert Surveillance

    From the McCarthy era to present times, America has an extensive and dark history of covert surveillance on its citizens. This blog will take a deeper look into the U. S.’s past and present of government surveillance, beginning with J. Edgar Hoover’s pervasive COINTELPRO program, to the NSA’s PRISM program, to the FBI’s Magic Lantern — all with one overarching goal: to monitor its own citizens under the guise of national security. We’ll examine why these activities are often hidden in secrecy, why they are unconstitutional and unethical, and ultimately discuss why it is imperative that we keep our government…

  • First-Time Configuration

    In this tutorial: Important: After the first-time configuration is completed, you will no longer be able to access the wizard. However, all settings can still be changed from the administrator portal. If you wish to instead complete the first-time configuration wizard again, you will need to delete your deployment and start over with a fresh deployment of KUY.io Konnect™. When your intial deployment of Konnect™ access server, either as a self-hosted deployment or as a cloud image is completed, your Konnect™ server will initialize in a first-time configuration mode. This mode continues to be enabled until the first-time configuration is completed.…

  • Starting Konnect™

    In this tutorial: With the system dependencies installed and the docker configuration in place, you are now ready to launch your Konnect™ access server. First, if you haven’t done so already, switch to the installation directory of KUY.io Konnect™ on your deployment host. If you followed our examples in the previous sections (or used any of the pre-built cloud images), that directory is /opt/konnect. If you picked a different directory in the last section, please adjust the commands accordingly. This directory should contain two items: a docker-compose.yml file and a directory called letsencrypt. Launch the Konnect™ server application stack using the docker-compose tool: The above command starts the application stack…

  • Docker Configuration

    In this tutorial: The entire Konnect™ server stack is described by a single bundle file, the docker-compose.yml file, which lists all the services in the stack and their configuration. This allows the system administrator to keep all the required components to run a Konnect™ access server in a single place and makes configuration and deployment of the application stack a breeze! 1. Create a new directory for Konnect™ On the deployment host, we will first create a directory that will hold all base application configuration and runtime data. For the following examples, we will use /opt/konnect, but feel free to use any directory…