Kürzlich aktualisierte Seiten
Gemeinsame Ökonomien
Siehe auch dieses Buch; https://wiki.aktivismus.org/books/teilen-von-geld-in-einer-gemeinsamen-ok...
Imsi-Catcher
[!toc] Table of Contents An IMSI catcher, also known as Cell-Site Simulator or "Stingray", is ...
Logger
[!toc] Table of Contents Loggers are devices that can be used to ‘log’ or record something. Tw...
Network-Surveillance
[!toc] Table of Contents Monitoring of traffic data This is usually what is meant when people ...
Data-Dogs
[!toc] Table of Contents [!info] TL;DR {static} Data dogs, similar to drug detection dogs, ar...
Meta-Data
[!toc] Table of Contents Here we describe what metadata is and where it can be found. If you j...
Shoulder-Surfing
[!toc] Table of Contents Shoulder surfing is when someone secretly looks over your shoulder to...
Silent-Sms
[!toc] Table of Contents SMS is the protocol by which standard text messages are delivered to ...
Phishing
[!toc] Table of Contents Phishing via email or text message is generally more commonly associa...
Forensics
[!toc] Table of Contents Introduction Forensics is a collective term for fields of work in whi...
Public-Chargers
[!toc] Table of Contents Public “chargers” can be found, for example, in public transportation...
Keepass-As-Group
[!toc] Table of Contents KeePassXC is not actually cloud software, which is one of the reasons...
Confiscation
[!toc] Table of Contents After seizures, there is often a lot of speculation about what inform...
Network-Role-Play
[!toc] Table of Contents This game aims to illustrate the process, but not the functionality, ...
Graphene-Os
[!toc] Table of Contents GrapheneOS is a mobile operating system based on Android. It is ofte...
Clear-Metadata
[!toc] Table of Contents [!tip] Tip {static} If you don't know exactly what metadata is, read...
Messenger
[!toc] Table of Contents While emails are still regularly used for digital communication, mess...
Password-Manager
[!toc] Table of Contents [!info] Info {static} A password manager is an essential tool for en...
Passwords
[!toc] Table of Contents Good passwords are one of the most important countermeasures against ...
Data-Hygiene
[!toc] Table of contents Whether it's network surveillance, digital forensics, or house search...