Getting started with GPG

Getting started with GPG

Privacy and encryption go together like peanut butter and jelly. At the very heart of most encryption strategies is a set of keys and a key exchange. Most of you have probably already heard of PGP (Pretty Good Privacy) and are confused about GPG. Generate a strong 4096 bit key gpg --full-generate-key List generated keys gpg --list-secret-keys Upload key to default servers gpg --send-keys <your_key_uid> Specify a specific remote server gpg --keyserver hkps://keyserver.ubuntu.com --send…

Read More

Online privacy 101

Online privacy 101

Why should you care about your privacy when you have nothing to hide? Well, the thing is.. everyone has something to hide at some point in their lives. It can be something incredibly insignificant but consider this; everything you do online is being recorded and archived.

Read More

Encrypt all your internet traffic

Encrypt all your internet traffic

Today we'll show you just how to encrypt all your home traffic therefore making sure you're ISP can't easily track your every move. First off, there multiple ways to encrypt your traffic all with varying levels of anonimity and performance penalty. Usually the trade-off is anoniminiy vs performance. It's equally important to note that anonimity doesn't come out of the box. Therefore this is not a post about how to remain anonymous on the web, I'm simply showing you a way to shield your browsin…

Read More

Docker n00b guide

Docker n00b guide

Installation: sudo pacman -S docker docker-compose Add yourself to the docker group: sudo gpasswd -a <USER> docker WARNING: Every user you add to the docker group is root equivalent. NOTE: It takes a reboot for this change to take effect. Enable and start deamon sudo systemctl enable --now docker.service docker.socket Common commands Build a container docker build -t <docker_name> . docker run -d -P <docker_name> OPTIONAL - Name your own docker instance name: sudo docker run -d --n…

Read More