In this post I will be talking about decentralyzing, securing, and privatizing your finances. Practicing good opsec, regaining control and security in software and your digital footprint is pointless when you do not go all the way. Though you do not have to go to the extreme, it is still good to explore alternatives to everything, including the unethical and exploitative and surveillanced-based ce... » Continue Reading
Terminal Emulators The terminal emulator is basically which terminal program you are using. Most distributions come with the default desktop-environment terminal, and these are usually good enough. There are many more out there though, some with very useful features. Personally, I highly recommend using the kitty terminal. Kitty is fast, simple, and has a lot of built-in features that make it very... » Continue Reading
In this entry, we will look at some big tech services such as email, word processing, and password managers, and how to move away from the prying eyes of the corporate oligarchs even further. Some of these sections may pertain more to general opsec, but are very important in this topic because degoogling is first and foremost about security and privacy, which is fundamental to good opsec. Tech cor... » Continue Reading
Removing yourself from the big-tech corpo sinkhole is a great move, and I want to show you some feasible alternatives for big services that you can use to harden your privacy and security. You may ask... why would I use any of these alternatives? The answer is because big tech companies are slowly pushing us into a draconian surveillance state. They use your data to profile you based on your inte... » Continue Reading
Introduction I want to go over many of the benefits of learning and using Linux. Linux is a kernal, but for simplicity's sake, think of Linux as an alternative to Windows and MacOS. Linux distributions come in many flavors. You can make it like Windows, like Mac, or something totally different. Distributions are collections of software that run on top of the Linux kernal, and are usually collected... » Continue Reading