Skip to content
Menu
  • Tactical Hermit Substack
Menu

Category: Technology

TOR Browser Compromised by Feds?

Posted on 12 November 2015 by The Tactical Hermit

Say it ain’t so! EVER SINCE A Carnegie Mellon talk on cracking the anonymity software Tor was abruptly pulled from the schedule of the Black Hat hacker conference last year, the security community has been left to wonder whether the research was silently handed over to law enforcement agencies seeking to uncloak the internet’s anonymous…

Continue reading

Why Your Secure Building Isn’t

Posted on 4 November 2015 by The Tactical Hermit

Better Security through Penetration Testing My book, Red Team: How to Succeed by Thinking Like the Enemy, provides the first in-depth investigation into the work of red teams in the military, intelligence, homeland security and private sectors, revealing the best practices, most common pitfalls, and most effective applications of their work. Below is an adaptation….

Continue reading

Technology and Privacy: Signal, the Crypto App Comes to Android

Posted on 4 November 2015 by The Tactical Hermit

SINCE IT FIRST appeared in Apple’s App Store last year, the free encrypted calling and texting app Signal has become the darling of the privacy community, recommended—and apparently used daily—by no less than Edward Snowden himself. Now its creator is bringing that same form of ultra-simple smartphone encryption to Android. On Monday the privacy-focused non-profit…

Continue reading

“Hamland” Security: Amateur Radio’s Place in Securing the Homeland

Posted on 3 November 2015 by The Tactical Hermit

During times of disaster, homeland security resources at all levels of government are often stretched to capacity. The whole-of-government approach involving local, county, state and federal agencies is sometimes not enough, especially in the realm of communications. That is where a dedicated group of private hobbyists, known as amateur radio operators, or “hams” as they…

Continue reading

It is Time for the U.S. Military to Innovate like Insurgents

Posted on 28 October 2015 by The Tactical Hermit

These three Army captains built a gun that kills drones. It took them ten hours and cost $150. What can the Army learn from them? The recently concluded meeting of the Association of the United States Army (AUSA) has become a yearly tradition for senior military leaders, congressional staff, and members of foreign armies to…

Continue reading

Facebook Friend or Terrorist: Who’s in Your Online Social Network?

Posted on 24 October 2015 by The Tactical Hermit

As a law enforcement officer in Northeast Florida, the arrest of a 19-year-old local man named Shelton Thomas Bell got my attention. In January of this year, Bell was sentenced to twenty years in federal prison for conspiring and attempting to provide material support to terrorists. He burned American flags, recruited support locally, conducted “training…

Continue reading

Teen who Hacked CIA Director’s Email Tells How he Did It

Posted on 21 October 2015 by The Tactical Hermit

A HACKER WHO claims to have broken into the AOL account of CIA Director John Brennan says he obtained access by posing as a Verizon worker to trick another employee into revealing the spy chief’s personal information. Using information like the four digits of Brennan’s bank card, which Verizon easily relinquished, the hacker and his…

Continue reading

Being Anonymous in Public Just got a Little Harder

Posted on 20 October 2015 by The Tactical Hermit

I would like to think my friend Mr. A for sending me this link and picture; he is always on the lookout for interesting “security” issues for the CO and I am grateful for his diligence!-SF   This photo was taken in Canada and shows about 700,000 people.  Pick on a small part of the …

Continue reading

The Chip and Pin Credit Card Hack

Posted on 20 October 2015 by The Tactical Hermit

  THE CHIP-ENABLED CREDIT card system long used in Europe, a watered down version of which is rolling out for the first time in America, is meant to create a double check against fraud. In a so-called “chip-and-PIN” system, a would-be thief has to both steal a victim’s chip-enabled card and be able to enter…

Continue reading

If You’re not Paranoid, You’re Crazy

Posted on 18 October 2015 by The Tactical Hermit

As government agencies and tech companies develop more and more intrusive means of watching and influencing people, how can we live free lives? By Walter Kirn I knew we’d bought walnuts at the store that week, and I wanted to add some to my oatmeal. I called to my wife and asked her where she’d…

Continue reading
  • Previous
  • 1
  • …
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • …
  • 34
  • Next

Tactical Hermit Substack

Recent Post

  • The Texas Summer Electric Bill (Read in the Style of William Faulkner)
  • ISIL Affiliated ADF Slaughters 49 Christians in Brutal Machete Attack in DR Congo
  • Jew’s and Satanic Child Rape and Sacrifice: Not just an Urban Myth
  • The Most Redneck Man in the World
  • White Boy Summer
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme