Discussion about this post

User's avatar
Bonnie M's avatar

Jason I appreciate you so much. Just pulled a dozen apps off my phone I haven’t used in ages.

I have NO idea why some of them thought they needed access to my camera or photo roll, but they don’t anymore! 🙏🏻

The peace of mind that your simple and clear explanations bring me… I’m very appreciative. Looking forward to upgrading my subscription when I’m able to do so. Your insights are worth it.

Expand full comment
Amercanius's avatar

Being in IT for 30 years working on federal and private contracts you pick up good policies. When i install windows I use the NIST checklist to secure it. Never save PWs in the browser. Use a local install of PW repository. I use email rules to block unwanted mail. PI-hole DNS container to block domains. No Meta, Google etc. Foreign countries are blocked.

VPN for private financial transactions.

Sometimes sites don’t work but with a VPN. My thinking is if they don’t accept enhanced security on my side why would I trust their site.

FWIW

Expand full comment
22 more comments...

No posts