Tag: Privacy

Mainstream Media Hides REAL ID Privacy Provision

Mainstream Media Hides REAL ID Privacy Provision

South Carolina’s legislature, in its effort to comply with the federal REAL ID Act standards tightening the security surrounding driver’s licenses, wisely included a provision allowing citizens to “opt out.” Those choosing to opt out won’t be able to fly… 0 Shares | | Posted in Constitution, Liberty, Liberty, News, Politics & Government
“Your location has been shared 5,398 times by 10 apps in the last 14 days.”

“Your location has been shared 5,398 times by 10 apps in the last 14 days.”

That’s what one recent study participant was told with his new app that detects location sharing. He was shocked, and took immediate action to restrict the data on his smartphone. You probably should do the same. With the age of… 0 Shares | | Posted in Computers, Liberty, Liberty, News, Science & Tech
Has PHA or ACO asked for Information and Permission? Who? What?

Has PHA or ACO asked for Information and Permission? Who? What?

Have you received “important” looking mail from your doctor? Beware! It really is from the Accountable Care Coalition (ACO), an out-growth of Medicare, requesting information related to your health. This is under the guise of assisting your medical care givers.… 0 Shares | | Posted in Health, Health, Liberty, Liberty, News, Politics & Government
5 Ways to Start Encrypting Your Online Communications

5 Ways to Start Encrypting Your Online Communications

Digital communications are everything, the way data travels over the internet, the way we browse the web, every email, text message and phone call we make. It is all fed from one provider to another, all over the world with… 0 Shares | | Posted in Computers, Free Speech, Science & Tech
Government Agencies Becoming a Threat to Internet Freedom

Government Agencies Becoming a Threat to Internet Freedom

As the internet becomes larger, and governments are attacking the internet 24/7, security is more vital than ever. The internet is a large place filled with many great things, as I am sure you all know. While its a great… 0 Shares | | Posted in Computers, Free Speech
Sovereign Certainty of Conscience

Sovereign Certainty of Conscience

The prayers of supplication, the seeking of direction from the source of all wisdom are a call into the heart of “God” consciousness, and a laying bare of our souls. Supplication of the sovereign’s soul beseeches wisdom and patience, the… 0 Shares | | Posted in Constitution, Firearms, Free Speech, Home, Liberty, Lifestyle, Medicine, Mental Health, Parental Rights, Vaccines
The Importance of a Secure Email Provider

The Importance of a Secure Email Provider

The Importance of a Secure Email Provider With the recent NSA spying allegations everywhere, we know nothing is secure. Our emails, phone lines, and anything electronic is always watching and tracking us. A secure email provider isn’t crucial, but it… 0 Shares | | Posted in Computers, Liberty
How the Internet is going dark and we are winning the Cyber War

How the Internet is going dark and we are winning the Cyber War

How the Internet is going dark and we are winning the Cyber War It seems everyday we are loosing our liberties. It appears that the knots around our necks get tighter and tighter. Sometimes I feel I can’t do anything… 0 Shares | | Posted in Computers, Liberty, Liberty, Politics & Government
Google: You Have ‘No Legitimate Expectation of Privacy’

Google: You Have ‘No Legitimate Expectation of Privacy’

A recent document, filed by Google’s lawyers revealed, that users who send emails to Gmail have “no reasonable expectation of privacy”. The brief was filed on July 13th 2013 in response to a class action complaint against Google to the… 0 Shares | | Posted in Business, Computers, Liberty, News, Science & Tech
How to encrypt your hard drive, and why you should

How to encrypt your hard drive, and why you should

How to encrypt your hard drive, and why you should Encryption…? What is that? “Encryption is the process of encoding messages in such a way that eavesdroppers cannot read it, but that authorized parties can.” Now this may sound like… 0 Shares | | Posted in Computers