Suspicion Search Results

How To: Stay as Anonymous as Possible Online

There are lots of people who want to stay anonymous online, and lots of reasons they want to do this. Staying anonymous on the internet isn't easy, and it's probably possible to trace almost anyone with enough time and resources. A lot of people think that they're completely secure with just one method of cover. For example, a lot of people thought anyone using the Tor network was nearly untraceable, but then things like this often cast doubt on just how secure these networks are. Unless you ...

How To: Know Who's Not Who They Claim to Be Online

All kinds of people pretend to be someone they're not on the internet, including scammers, people attempting to wind others up, hackers and web predators. Almost all of these people will leave bases uncovered and they're all easy to expose when you understand how to. Here are my favorite ways of finding out when somebody is lying quickly. Image Search

How To: Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private chat without clicking the link. Canary tokens come in several useful types and can be used even through URL shorteners.

How To: Use a Virtual Burner Phone to Protect Your Identity & Security

Every time you make a call or send a text, you're giving the recipient your phone number. This can be quite the security vulnerability, opening yourself up to scammers, spammers, and the feds. In this how-to, we'll look at what a burner phone is, why you might want one, and how to get started using a free second phone number on your regular smartphone.

How To: Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of a communication by compromising some entrance and exit nodes. Once both are compromised, it is much easier to correlate traffic with a particular individual.

How To: Hide Any App on Your iPhone in Plain Sight

If there's an iOS app you want to hide from your iPhone's home screen, there are a few built-in ways to do so in iOS 14, but there is a clever workaround you can use in older iOS versions. Plus, it also works in iOS 14 as a way to disguise app icons instead of just hiding them, so no app is what it seems.

Extreme Frugal Living: Tips For Living In Your Car

Whether you really need to pinch pennies for a long road trip or are really at the end of your rope with your financial and living situation, desperate times call for desperate measures--and sometimes that involves living in your car for an extended period of time. It is certainly not easy, but with the right equipment and know-how, making your car your abode is certainly possible if you make the continuous effort to keep things clean, be smart about where you park your car and avoid arousing...

News: Flaw in Wal-Mart Returns System Allows Major Thefts to Go Unnoticed

We love tearing apart security here at Null Byte. Several years back, upon returning items to Wal-Mart due to a malfunction, I noticed something very peculiar about the way their overall procedure goes. I brought the item up to the desk, and the woman asked if it didn't work, which I responded affirmatively. Without a moment's notice, she takes it right off to the defective items area and asks if I would like cash or store credit.

How To: Trick Your Twitter Followers into Thinking You're Somewhere Besides Where You Really Are

There are plenty of reasons not to use location information when you tweet, whether you're trying to stay safe or just don't want your crazy ex showing up while you're in line at the grocery store. But a new website called 'Please Don't Stalk Me' could actually make broadcasting your location work to your advantage—it lets you tag your tweets with any location you choose, anywhere in the world. Playing hooky? Send a tweet from 'home' to take care of any suspicion from your boss and coworkers....

News: Airport mayhem

Disguise yourself how ever you like. Go to an airport. Have your suitcase full of fake illegal items such as powder (drugs), crushed up leaves (weed), guns and Knives dynamite make sure everything looks as real as possible and also something metal to set off the detector (so they search your bag).

Next Page