Using Negotiation Techniques to Get What You Want

Using Negotiation Techniques to Get What You Want

Negotiation is discussion aimed at reaching an agreement, and is not limited to communication with criminals and bad guys. Using negotiation techniques in our daily life with peers, friends and family can be beneficial because the rules of negotiation are basically the rules of how to better communicate. Chris Voss, former lead hostage negotiator for the FBI, was recently interviewed by Eric ... Continue Reading...

FireChat: Chat Off Grid

FireChat Chat Off the Grid

Firechat is a new iPhone app that allows nearby users to chat and share photos (anonymously, should you choose) without an internet connection. Using WiFi and Bluetooth, it enables users to communicate phone to phone (node to node) through a mesh network capability characteristic to Apple's iOS 7 Multipeer Connectivity Framework. Though this is the first implementation of a wireless mesh ... Continue Reading...

Rules for Dealing with Police

Rules for Dealing with Police

The majority of people waive their rights entirely during a police encounter, don't be one of them. 10 Rules for Dealing with Police 1. Remain calm and compliant. Do not talk back, and speak in an even tone. 2. You have the right to remain silent. During police encounters the best thing to do is stfu. 3. You have the right to refuse searches. The officer is not obligated to reveal you ... Continue Reading...

Easy Guide to Online Privacy

Easy Guide to Online Privacy

Compulsive sharing of information whether online or in public is not safe from adversaries. Your activities online are surveilled, and personally identifiable information is transmitted to websites when you visit them. You can go to such lengths as Richard Stallman to avoid online surveillance, or adopt our recommend tools and security practices. Online Privacy Have a security mindset and ... Continue Reading...

The Best VPNs of 2014

best vpns of 2014

What is a VPN? A Virtual Private Network, or VPN, is a private group of computers networked over a public network, such as the internet. Connecting to a VPN secures and encrypts all of your internet communication, protecting your computer from adversaries, hackers, competitors or eavesdroppers. Synopsis of Best VPNs 2014 Compiled by our friends at greycoder, who created the list by taking ... Continue Reading...

Introduction to Basic Online OPSEC

Introduction to Basic Online OPSEC

Basic Online OPSEC 1. Never assume security, assume it is unsecured. 2. When security is needed, implement proper security practices. 3. Encrypt everything... Email Security 1. Always digitally sign messages. 2. Encourage peers to sign their messages. 3. Always verify suspicious messages before acting. 4. Secure emails with digital encryption such as PGP or GnuPG. 5. Use file encryption ... Continue Reading...