Interested in Infosec & Biohacking. Security Consultant. Love reading and running.
Free & Open-source Apps As Privacy-focused Alternatives
Unlike what we did in the past, we need a computer to be the digital self, most people spend most of the time online with their mobile nowadays. A few years ago, if you want to protect privacy with apps, you do not have much choice. But now, multiple options are available and so of them are also open-source and free of charge.
How To Be Anonymous Online
"All human beings have three lives: public, private, and secret." ― Gabriel García Márquez A while back, I met an old friend who I hadn't seen since I graduated. We went for a cup of coffee to catch up for the past decades. He told me he was watching "Breaking Bad" in season 2. And we both love Breaking Bad (Who didn't?) I also recommended him to try Westworld as "Jessie Pinkman" was in last season.
Washing Your Hands Online: Applying COVID-19 Lessons to Cybersecurity
“Cutting out bad habits is far more effective than cutting out organs.” — Herbert M. Shelton One year ago, in Hong Kong, we heard about an unknown virus causing viral infections in Wuhan, China. As we experienced in 2003 with the SARS, people in Hong Kong started buying detergent, disinfectants, and masks in early 2020, which was also my first time to learn about all the specifications of medical masks.
Let's Watch Dogs Sniff Out COVID in Finland and Imagine Our Future
I remember there were dogs in my grandma's house. One of them was a small Peking dog, which barked loudly. Her name was “豆豆” (Small Beans), which I then found out was the mother of the other three big ones.
Why I Hire Non-IT Graduates in The Cybersecurity Field
I am always amused to tell new friends about my job because no one knows what a security consultant is. Some confused security with securities (as in the stock market, which Hong Kong is famous for), and some only know about IT. On one occasion, my friend asked why I studied at university and became a security guard.
Farewell, My Dear Dead Friend
A Song is ended, But the Melody Lingers on. — Irving Berlin Suddenly I think about a friend. I wish I can thank him personally, but sadly I can’t. He passed away about fifteen years ago. This is a story about my thanksgiving gratitude, which taught me how important humor was in life. And this is my story of life influences life.
When the Sun Bursts: Be Prepared for the Next SolarWinds.
First FireEye, then SUNBURST, and after that, SUPERNOVA. A security company that got hacked is like a doctor who got sick. While everyone is talking about the FireEye incident, "SUNBURST" (or "Solargate") is more dangerous, which is a cyberattack that required patience, skills, and new thinking. And in all that, it created a wound that we previously overlooked.
A Leap of Quantum Computing in China, A Threat to Internet Security
The Jiuzhang — Photon-based Quantum Computer Researchers from the University of Science and Technology of China (USTC) explained in the journal Science that a Light-based quantum computer named the Jiuzhang (九章) performs a calculation in minutes. Simultaneously, a traditional supercomputer would take the world’s fastest supercomputer, Fugaku, 600 million years to complete.