#TeamRhino #SaveTheRhino #SaveFive

Raising Awareness to protect our #WildLife, Please take the pledge: I would like to join #TeamRhinodotorg in the fight against rhino poaching to ensure a future for people and vulnerable wildlife on our planet: I will never buy or promote any products made of rhino horn, as I know that demand drives poaching. I will be a committed advocate to support rangers and others on the frontlines of rhino conservation. I will share my passion about rhino conservation and recruit my friends and family to become involved. I will urge my government to continue championing efforts to stop rhino poaching at home and abroad. I will stand with IRF to help save rhinos from extinction. teamrhino.org

Thursday, January 25, 2024

Tor Project

 Researching ways to be safe while online, i learned about TorProject. Tor is a browser like Chrome. Tor uses DuckDuckGo to search engines. The difference is TorProject uses onion layering to mask your identity while online. I tried Tor and didn't have great success in connecting to my blog or bank account. My blog is a Google product that comes with security that i believe didn't recognize Tor and wouldn't allow Tor to open this blog to create this post. I also couldn't access my bank online with Tor. I was able to access mental health resources and search for other information. i'm interested in creating a onion website in the future so that top security measures are in affect when the site has visitors.

From the Tor page: 


Ensuring safe access to human rights research and resources

Onion services are currently the most censorship resistant technology out there because no internet provider or government can detect the connection to the .onion address or block access to it. Their encryption and decentralized nature make them valuable for whistleblowers, ensuring protection against surveillance and enabling access to information in regions with restricted internet access. That is why many news outlets, like the BBC, the New York Times, and Deutsche Welle, or social media platforms like Facebook or Reddit as well as messaging services and human rights organizations have .onion sites on the Tor network to provide secure and uncensored access for their users.

In 2022, we launched our Onion Support group to address the underutilization and lack of understanding of onion services, and further increase onion service adoption among civil society groups, and human rights organizations. We couldn't be happier that one of the most recognized human rights organizations has adopted an onion service to provide greater online protections for those seeking information, support, and advocacy. Amnesty's choice to offer an onion version of their website underlines the role of this open source privacy technology as a vital tool in our shared work of advancing human rights. We encourage others to follow suit and contribute to the broader acceptance of the Tor network and .onion sites.


If you want to learn more about onion services and are interested in setting up your own .onion site, check out our onion service resources and get in touch. You can also ask questions and start a discussion on the Tor Project Forum.

The Tor Project provides high-level support for onion service deployment and also trains team members on everything to do with Tor to co-create advocacy campaigns around the Tor network and onion services.

Tor is also used by facebook to help with security and censorship. I'm not sure that is working because my fb group pages gets active attacks daily. Threat actors are looking to disrupt the content quality on the group page. Everyday i have to report the spam or nudity post and block the profile, which i bet are fake profiles. The threat actors were successful in discouraging others from posting and visiting the group page. So many fb users often post that their accounts have been hacked. Threat actors thirst for data, some just to make fake profiles and annoy people like myself. Stay vigilant about what we are sharing on social media and try not to give your personal information to people you don't know.

We are in political season and the hacktivist are busy with fake news. Please do your research by connecting to the political offices in your community or on their official websites. 

My next blog i will explore how we can protect our identity and fingerprints when online with any browser. Please note that threat actors are always busy looking to hack into our information, we have the power to block that nonsense when surfing the web or working on our personal devices. 

Tuesday, January 9, 2024

Proofing Ourselves from Cyber Attacks Using Grow with Google Cybersecurity


 I've started my journey in cybersecurity with the Grow with Google certification program. I really like the work at your own pace platform because i don't feel rushed to learn the subjects. I also like that the videos are translated so that i can take notes.Cybersecurity is important for us all to understand and incorporate in our daily online practices. The Grow with Google platform has so many resources for us to connect to and enhance our understanding of cybersecurity for personal and career growth. 

Cybersecurity aka security is working to ensure confidentialy and integrity by keeping people and  businesses, information and devices protected from unauthorized access. As a cybersecurity analyst i would help protect from risk and outside threats. This work is interesting and helps make a difference in the digital age that we are living in. Best part is Google is doing a great job with the search engine to combat cyber attacks. 


Im not sure what my role will be, but i like keeping us safe and look to host cybersecurity workshops in our communities to help more of us be safe when on our personal devices. This MLK day of service i've partnered with someCommunity partners and STEM professionals to host a family digital literacy workshop introducing our families to computer repair and maintence, cybersecurity and video game development to help bridge the digital divide and promote the lifestyle that people want to live. Entry level is $100,000 in cybersecurity and that beats minimum wage and $15/hr. In 6 months at 7 hours a week we can change our lives and make a difference supporting safe online use. 



Learning the history of how cybersecurity was created helps us to understand how often Threat Actors are looking to hack our systems. Threat Actors are any person or group of person looking to cause cyber harm to our devices, and data. You are instrumental in stopping threat actors from causing harm to your data and devices. Please take 20 minutes to go through the cybersecurity check list and put cybersecurity into practice. Be very careful when opening emails, Phisihing is one of the threat actors favorite ways of stealing information and damaging devices. Be cautious with emails that you don't recognize,  don't click on any links. Instead mark them as phisihing to stop them from coming into your inbox. A perfect example of phisihing is the I Love You virus.   Someone in the office had received an email with the subject “ILOVEYOU” and the message, “kindly check the attached LOVELETTER coming from me.” When they opened what appeared to be a text file — actually an executable program masquerading as one — the virus quickly took control, sending copies of itself to everyone in their email address book. Those recipients, thinking the email was either some weird joke or a serious declaration of love, opened the attachment in turn, spreading it even further. 




Installing security on your devices will also help stop unauthorized access to data. Norton has different packages at a great price, we can afford to be safe online by visiting Best Buy and purchasing Norton 360 Deluxe at $19.99/per year for 3 devices. They also have some packages that come with lifelock to give added protection for a low cost.