Consulting & Training
Are You Wandering in a Wasteland of PrivTech and Promises?
Privacy experts who do independant research can help
We are privacy advocates first and foremost. That imperative informs how we look at the world and the business decisions we make.
We are also realists. Surveillance capitalism isn't going away soon. So, we have to take action to secure our data. Obscure can help you identify risk and delete data, but if you do nothing more, your footprint will eventually build back up.
...your employees and their data.
Training Courses
Stop Leaking Data
- Identify Culprits: Recognize the most common ways personal data leaks online (social media oversharing, weak passwords, phishing scams).
- Browser Hygiene: Learn browser settings and extensions that safeguard browsing activity and minimize tracking.
- App Awareness: Understand app permissions and how to limit data collection on your devices.
- Minimize & Obfuscate: Techniques for sharing less personal info & using pseudonyms when necessary.
- Smart Disposal: Securely deleting data from old devices and accounts.
Location Data
- How It's Collected: Explore the methods apps, devices, and services use to track your location (GPS, Wi-Fi, cell tower data).
- Mapping Your Exposure: Audit your devices and apps to see what has access to location data.
- Selective Sharing: Manage location settings with precision, only enabling tracking when necessary.
- Deception Techniques: Explore tools for spoofing or randomizing location data when desired.
- Beyond Convenience: The risks of over-reliance on location-based services and how they compromise privacy.
Secure Comms
- Encryption Essentials: Plain language explanation of encryption and its role in protecting communications.
- Secure Messaging Apps: Overview of popular options (Signal, etc.) with their pros and cons.
- Email Best Practices: When to use PGP encryption, and tips on managing encrypted mail.
- Voice and Video Considerations: Choosing secure platforms for calls and video chats.
- Threat Modeling: Understanding who might want to intercept your communications and how to adapt your security accordingly.
Privacy Training:
|
||
Stop Leaking Data |
Secure Access |
Secure Comms |
How they track you.Your behaviors that enable tracking. |
Password mgt, VPNs, browsers, anti-virus, extensions, more. |
Secure mail, messaging, file transfer, more. |
One-on-One Training sessions
Personal attention. All your questions answered. Couples welcome.
Small Group sessions
up to 8 clients
Small group training. Perfect for a family or a team. An excellent value, and a good idea, since threat actors like to come at those close to us.
Seminars for organizations
unlimited clients
Large group training. Requires prep and lead time. Content can be customized.