Skip to content

Month: February 2015

Using Tresorit to manage and share confidential data on a Mac

Earlier this year, I described how I used a combination of Espionage and Dropbox to share confidential documents among our family’s Macs. Unfortunately, that approach proved too problematic and I’ve since had to switch to a new approach—based on the Tresorit service—which, while not a perfect solution, does represent an improvement.

How to secure Mac and iOS devices with the Cloak or PIA VPN

A while back, I ran across an article (which for the life of me I can’t find now) in which the author meets with a computer hacker at a public location—a Starbucks coffee shop—and demonstrates the surprising amount of information he can collect by intercepting the traffic between the Starbucks public wifi and the locally connected customers. It is truly scary!