How to Disappear: Connections

The best way to think about privacy is connections. If you hit enter, send, download, or use your mobile and debit card you create a link. In the disappearing world, the goal is to avoid such connections.

Advertisements

How to Disappear: Cryptocurrency

A few months back I was consulting with a client, and when it got down to the payment, they wanted to pay my fee in digital currency. I explained I do not use cryptocurrency and not a fan, that is from the how to disappear perspective. Such perspective is that there is a lag when it comes to liquidating and having cash on hand. I do not like the aspect that I cannot run to the corner bank and pull money out immediately. Also, there is no insurance if there is a screw-up, like what is happening with Ethereum Wallet. Think about it, there are millions of dollars frozen, and who knows how many people face potential loss. From a how-to disappear perspective this is a huge risk to freedom.

I am not saying digital currency is a bad thing. In the disappearing world it is an excellent place to stash and move your funds but never put your eggs in one basket. Also, keep in mind that the money you stash may not be readily available when most needed; therefore, the cryptocurrency cannot be the “get-a-way’ money but the slow pull money.

For the work to move forward, I had no choice but to set up an account and I was researching Ethereum and Bitcoin. From my non-technical head, I seemed to gravitate towards Ethereum but Bitcoin has that brand name, and that is where I went. If I went with Ethereum, I would now be working for free.

www.FrankAhearn.com

Twitter, Trump & Tunnel Vision

When I speak in public or meet with clients, a problem I discuss is digital tunnel vision, a shortsightedness that I believe has come to exist in the digital age. Corporations spend tremendous amounts of money to protect against outside intrusion. Although, some companies are failing when it comes to protecting against in-house intrusion. Twitter & Trump is an excellent example of inside invasion and digital tunnel vision.

There is no doubt that Twitter spends millions on digital security but my question is how much have they spent on inner-intrusion. Or have they even considered the fact that the wrong person can use them as an information weapon. The action of deactivating Trump’s Twitter account created no dangers, but it could have. The could have here is the real issue and threat. What if a rogue nation bribed the Twitter employee to post a message with far more dangerous words. Disaster could have befallen.

When I first began skip tracing an social engineering in the eighties my tagline was “Information is the greatest tool!” and it is, no doubt. The problem is that information can destroy people and companies. Now we are seeing how it is manipulating and dividing society.

Two items here, I believe companies should have a broader picture of the part they play in the world. Also think about how one employee could be the inner hacker, that lights the fuse of destruction. The curious question now is which organization will be used next as a pawn by an employee?

Frank M. Ahearn
http://www.FrankAhearn.com