Category: digital sec

Could someone have put a keylogger on my old l…

Long story short a few years ago I was complaining to a friend that my laptop was slow as shit. He said he could install linux on it and that it would speed it up. I took him up on the offer and it seemed to not really make a difference.

I got rid of the laptop a few months after the ordeal. I had malwarebytes and would scan about once a week and always clean what it found. A few years after all this I found out the guy was prettt untrustworthy so that raised my suspisions. I never had an issue with any of my logins or had him bring anything up but because of personal beefs between us I’m worried he was keylogging me and saving my data to use as blackmail later. I know this is possible but just wondering if its likely he installed something weird or if its a typical thing people do with linux. To use limux after installation I would have to choose a different option when I booted up. Dont remember much else. I figure I’m either being paranoid or even if I’m not theres nothing I can do now but figured I’d ask to try to reassure myself. Thanks!

Found here

“The dark side of ‘Plane Bae’ and turning stra…

“The dark side of ‘Plane Bae’ and turning strangers into social media content”:

“The dark side of ‘Plane Bae’ and turning strangers into social media content”

From here

I’m trying to cut google completely out of my …

I opened up a gmail account a very long time ago and most of the sites, and services I use on the internet I signed up for using my gmail address. What is the best way to know what sites and services are connected to my gmail account? What is the best way to migrate all my accounts currently attached to gmail to another email service? For those who have been in my situation and successfully cut google out completely what has been your experience with this process?

Found here

Can an individual get fingerprinted through cu…

To be more productive I have blocked recommended videos, related videos, recommended subreddits, YouTube comments, autoplaying videos, and so much more. Can this be used to track me?

Found here

U at Buffalo student information collected, so…

U at Buffalo student information collected, some distributed to third parties.:

U at Buffalo student information collected, some distributed to third parties.

From here

What are the specific precautions you take on …

That simple question. As I get it they should be different, maybe you can’t use Tor browser in you phone or vice versa. If I use Tor browser a VPN is useless? When I should use a VPN? There’s really too much and it’s not in simple words. I need a dummy guide for ptivacy.

Found here

Researchers release app that masks printers’ t…

Researchers release app that masks printers’ tracking dots – Help Net Security:

Researchers release app that masks printers’ tracking dots – Help Net Security

From here

European regulators report sharp rise in data …

European regulators report sharp rise in data protection complaints after GDPR:

European regulators report sharp rise in data protection complaints after GDPR

From here

Apple to close iPhone security gap police use …

Apple to close iPhone security gap police use to collect evidence | Technology:

Apple to close iPhone security gap police use to collect evidence | Technology

From here

Security: The IoT is destroying legal concept …

Security: The IoT is destroying legal concept of privacy warns in-depth report:

Security: The IoT is destroying legal concept of privacy warns in-depth report

From here