We are going to explore k-anonymity, l-diversity, t-closeness, differential privacy and some related python scripts.
An analysis on LockBit, on how it operates and how LockBit 3.0 code works
A brief description on what is the "Follow The Money" technique, how crypto tracking works and how it is avoided.
A schematic comparison between VPNs, Private Relay and Tor.
A short dive into steganography, steganalysis and some related algorithms.
Philosophy and content of this blog.