Posts

Encryption Update ** UPDATED **

Image
(Update at the bottom) So, the NSA and IAD just released an advisory memo directed at US government entities and NGOs/Corporations that deal with classified material. In a nutshell, they are raising the minimum required encryption level for top secret data effective immediately. So instead of referring to the NSA's Suite B cryptography, we will now refer to what they are calling the Commercial National Security Algorithm Suite. The changes are as follows: Former Suite B standards - RSA-2048                                       (Key exchange/Digital Sig) - ECDH/ECDSA P-256                    (Key exchange/Digital Sig) - AES-128                                         (Symmetric encryption) - Diffie-Hellman 2048       ...

First GroundRod 2 Student Review

I just received a very humbling course review from one of the students from my recent GroundRod 2 course in Arizona. Here it is.... *** Praise for GroundRod2 * K is the Marcus Aurelius of Cyber Privacy and Security. * Groundrod2 (GR2) was awesome. If you thought Groundrod1 was good, GR2 is even better * K is an incredible instructor. He offers a wealth of experience and expertise related to privacy, security and liberty. The course is not just for those who like to be prepared, people who live off-grid, etc. GR2 is a hands-on, cyber security “boot camp” for freedom-loving Americans who cherish their constitutional rights. The training course is immersive, takes place in a small class environment while the goal for students is to leave with cutting-edge skills they can immediately apply in their daily life. * K’s classes can be understood by individuals as well as both the business and the technical side of any organization. By way of example, K’s military and technical ...

Upcoming Courses

Image
GroundRod 2 is here and covers the following: - Review of GroundRod Primer skills - Discussion of current events as they relate to privacy, security and liberty - In depth study of the Invisible Internet Project / I2P - Setting up anonymous mail service via I2P - Exploration of Zeronet and other distributed networking systems - Setting up and using Retroshare with extra anonymity - The latest in encryption techniques, including ECC - Setting up open source router firmware - Metadata analysis - Testing secure alternatives to Skype and other mainstream teleconferencing software - The latest in crypto-currency trends, techniques and software - Real-world tradecraft application - Setting up resilient, "Ministry of Truth" proof websites - Hands on training for SEPIO laptop owners - and tons more......... *************************** These are the current course dates. Contact me if you want to reserve a seat or if you wish to host a course in y...

VERUS Phone Sale

Image
I had several requests to do a sale on the phone as well, so here ya go... $ 50 bucks off next five Verus phone orders until Christmas.

Laptop Holiday Sale

****** I have one compact SEPIO laptop left in stock and ready to ship in time for Christmas. I am also going to knock $100 bucks off the price of the next five laptops sold.  Offer expires on December 17th. *** EDIT: I also have a small number of 15 inch SEPIOs with the Ultra High Definition/4K screens if anyone is interested. ***  ******

Info on the SEPIO Operating System

Image
I have received a lot of questions regarding the SEPIO laptop and operating system, which run from "how is this system more secure than any other linux system?" to "what the heck is the SEPIO OS?" So let me try to answer some of the questions... First off my mission goals with this system: To create an easy to use yet extremely secure OS that anyone can easily migrate to from Windows or Mac. The defensive measures of the system should require little to no user intervention in order to keep the system safe from outside attack. The applications should cover all the users basic needs (video, music, editing, email, browsing, messaging, documents, etc) without having to search for extra software. It must have a full suite of security tools such as encryption software, crypto-currency wallets and tools, TOR/I2P/VPN access, peer 2 peer secure messaging. We use the model of   Anonymity + Security = Privacy   and personal privacy is a cornerstone of individual l...

Still think Apple is a friend to privacy?

Image
Feeling good about that iPhone in your pocket? More Apple spying for .gov