Review: Pi-Hole Network-Level Ad and Tracker Blocker, by TavernSandwich

Most privacy minded people do a decent job locking down their computers, phones, and other devices. I hope you’re reading this article on a secure browser (like Firefox with UBlockOrigin) over an encrypted VPN connection. If you are, congrats on being a reasonably savvy internet user! But what about the other people on your network? Are your family members and guests as privacy-minded? It’s rare to find a household where every single person shares the same level of dedication to staying safe online. Wouldn’t it be nice if you could extend some level of protection to the people sharing your …




Semi-Secure Digital Communications for Civilians, by R.T.D.

In times of emergency, many American citizens have found both amateur radio and FRS/GMRS radios very useful to keeping in touch with friends and family as well as keeping local, state, and federal disaster response agencies up-to-date with the latest information on road conditions and disaster area damages. All of those radio communications are made entirely in the clear as there is no need for encryption, obfuscation, or brevity codes for such work. It’s done as a public service to assist others in times of natural or man-made disasters and just part of being a good neighbor. But just how …




Using Effective Encryption, by ShepherdFarmerGeek

So much has been written by greater minds than mine about secure communication in a crisis. There are many publicly available resources and information on SurvivalBlog and elsewhere. Shifting letters in a message a certain number of characters is nothing new (Caesar Cipher, used in the last century B.C.). Using the SAME count to shift letters is a guaranteed way to have your encryption broken. Using different numbers to shift each letter in a message (a One Time Pad) – when your recipient has the same list of numbers to decrypt the message – is theoretically unbreakable, if you do …




Fade to Gray: Files and Documents – Part 3, by J.M.

(Continued from Part 2. This concludes the article.) Document Tools Being able to store sensitive files and minimizing the chances of someone finding them is useful, but you still need to be able to view and edit the files in a secure and private manner without leaving details on what files you’ve worked on and what they contain all over your system (or the Internet). Many of the commercially available document and file editing tools such as Microsoft Office store a lot of information on what files you’ve worked on and potentially what’s stored inside them (for your own good, …




Fade to Gray: Files and Documents – Part 2, by J.M.

(Continued from Part 1.) Hidden Rooms and Secret Passages VeraCrypt has an extremely useful feature called a ‘hidden volume’, which is what we’ll be using to hide and protect sensitive files. As I mentioned earlier, a volume is basically a chunk of storage (file) that Windows mounts and assigns a drive letter to. What VeraCrypt does is allows you to create a big encrypted file and mount that as a virtual storage volume – ‘virtual’ in this case just means that the volume doesn’t correspond to a unique physical storage device, since the file can be moved anywhere and still …




Fade to Gray: Files and Documents – Part 1, by J.M.

If you’re reading SurvivalBlog it’s a safe assumption you use a computer of some type, and you probably also use your computer for more than just surfing the Internet. One of the nice things about computers is that they make creating, editing, storing and moving large amounts of information a lot easier than trying to do everything with pen and paper, and a decent laptop with some solar panels for charging can operate for years even after the grid goes down. This allows you to easily create, edit and view things like inventories, maps of cache locations, communications SOPs, defense …




Internet Privacy Basics, by Petr

Editor’s Introductory Notes: This article was authored by the teenage son of a long-time SurvivalBlog reader. It is humbling to see that a second-generation of SurvivalBlog readers is now reaching adulthood.  (SurvivalBlog was launched in August of 2005.) Properly, the term internet (with a lower case “I”) generally refers to all interconnected computer networks, whereas Internet (with a upper case “I”) refers to the global network associated with the world wide web (WWW). The dark web refers to dead or abandoned web sites. (That is, sites that have “gone dark.”) The deep web refers to sites that are invisible to …




Your Best Personal Defense In The Ongoing CyberWar, by AJS

One of claimed “time traveler” John Titor’s most alarming predictions was for a war beginning in 2015 between Russia and the United States. The prediction was made on the old Art Bell Coast-to-Coast AM radio show in the 1999-2000 era. The war would eventually go nuclear and be quite destructive resulting in great loss of life. The good news according to Titor was that the country weathered the physical destruction and came out stronger than ever. With some large cities destroyed it eliminated many governmental sectors and urbanite populations dependent upon government handouts. Now, in retrospect we know the war …




JWR’s Recommendations of the Week:

Here are JWR’s Recommendations of the Week for various media and tools of interest to SurvivalBlog readers. The focus is usually on emergency communications gear, bug out bag gear, books and movies–often with a tie-in to disaster preparedness, and links to “how to” self-sufficiency videos. There are also links to sources for both storage food and storage containers. You will also note an emphasis on history books and historical movies. As an Amazon Associate I earn from qualifying purchases. This week I have a special recommendations column devoted to countersurveillance references and products. Books: Claire Wolfe: The Freedom Outlaw’s Handbook: …




Letter: COMPSEC Warning on Windows 10 Updates

Dear Editor: I used to have respect for Kim Komando, but after reading her article about the recent Windows 10 update, I have moved her to my “don’t trust” list. Let me explain: For my own COMPSEC I only connect to the internet wifi while I am actively using it and even then I monitor the data and CPU usage in real time using task manager. That way I know which program(s) are active. About 10 days ago, I detected the Windows 10 update in progress. It eventually took Four Hours of machine time (6X the usual time) and ate …




Guest Article: Seven People You Don’t Want in Your Group, by Kit Perez

Editor’s Introductory Note: This article first appeared in the American Partisan blog. It is re-posted with permission. I get a lot of questions about recruiting. How to do it, when to do it, when not to. While the best way to answer those questions is in an actual class (and there are still a few spots open in the webinar class I’m teaching on it), there are some hard and fast rules about the type of people you want and don’t want in your group. In fact, there’s a list of automatic disqualifications that I tend to use and teach …




Guest Article: Strategic Relocation: Are You Missing Out? by Kit Perez

This article originally appeared in the American Partisan. The concept of strategic relocation is not new, but it’s recently become more popular, as more and more liberty-loving folks get tired of being crammed into crowded public transportation or spending hours on the road in the daily snail-pace commute. For many, the thought of leaving everything can be a bit terrifying, and if you have a family who doesn’t want to leave, you might be thinking that your Big Move is more of a pipe dream than a real possibility, even though you see the death grip on your everyday freedoms …




Preventing the Statists’ Planned Coup de Maître

For more than a decade I’ve been saying that we are living in the age of deception and betrayal. Recent events here in the United States have now proven that, without any doubt. In July of this year, I warned that a new wave of overt Internet censorship was developing. I did so in an article titled: The Internet Gulag: Demonetization, Demonization, and Deletion. à La Nancy Kerrigan On Monday August 6, 2018, at least a dozen social[ist] media web services launched a coordinated deletion attack on InfoWars.com. Four more followed suit, within a few days. This was no coincidence. For …




Letter: Computer Backup Software

Hello SurvivalBlog Readers I would like to ask what system you would recommend for backing up computers? The reason I ask is that recently I had a hard drive crash in which I almost lost all of my data on my computer- including a couple of novels I had been working on. The crash had happened while backing up the computer to an external hard drive. Luckily it looks like my external hard drive did not die and as I’m writing writing this message it is retrieving the files. In addition to an external hard drive what other things would …




The Internet Gulag: Demonetization, Demonization, and Deletion

A wave of Internet censorship is sweeping the globe. This censorship is no longer just the nefarious work of totalitarian nations. Many western nations are experiencing their own brand of censorship that is being promulgated by ostensibly “private” companies. (Although many of these are near-monopoly utilities that could be classified as public accommodations.) The War on Guns Dozens of conservative, pro-gun videobloggers and news outlets have been demonetized by YouTube in the past two years. By flagging these sites as “not family friendly”, viewers must now toggle “Restricted Mode: Off” and even when they do, advertisements are no longer displayed. …