Privacy & Security Guides
Free in-depth guides explaining the tools, techniques, and concepts behind online privacy and security — written in plain English with no jargon.
What separates a cryptographically secure generator from an insecure one. Entropy tables, features to look for, and how to use generated passwords effectively.
How attackers crack passwords, what breach patterns look like, and a practical framework for securing every account you own.
Step-by-step walkthrough of generating a strong password: choosing length, character sets, and verifying entropy.
SHA-256 vs SHA-512, MD5 deprecation, HMAC authentication codes, and how to verify file integrity using checksums.
How AES-256-GCM works, why PBKDF2 key derivation matters, and what makes a browser-based encryption tool truly secure.
What EXIF data in photos reveals, what PDF metadata discloses, and a complete checklist for removing metadata before sharing files.
Why client-side tools matter, an overview of image, document, and security privacy tools, and how to verify a tool runs locally.
How Base64 works, standard vs URL-safe variants, data URIs, and why Base64 is not encryption.
Privacy risks in JSON APIs, PII in payloads, JWT token inspection, and safe practices for working with sensitive JSON data.
UUID v4 vs v7, uniqueness guarantees, privacy implications of sequential IDs, and when to use UUIDs in applications.