Welcome to My Project Space#
I specialize in privacy engineering and security research, focusing on making complex security concepts accessible to everyone. Through detailed guides, curated tools, and practical implementations, I aim to empower individuals and organizations to navigate the ever-evolving landscape of digital privacy.
What I Do#
- Privacy Engineering: Designing and curating privacy-focused solutions that prioritize user autonomy without compromising functionality
- Security Research: Conducting in-depth analysis of tools, systems, and best practices
- Educational Content: Creating detailed guides and documentation for privacy-conscious individuals
- Open Source: Supporting and contributing to projects that advance digital privacy
What You’ll Find Here#
My projects focus on practical implementations built on strong security principles. Each resource is designed to:
- Provide clear, actionable insights
- Remain independent of commercial influence
- Support privacy-conscious decision-making
- Enable the practical adoption of security measures
Core Focus Areas#
- π‘οΈ Privacy Tools & Alternatives: Curated collections of privacy-respecting software
- π± Mobile Security: Research on secure mobile operating systems and applications
- π System Hardening: Step-by-step guides to secure diverse platforms
- π» Development Security: Best practices for secure software development
- π Decentralization: Exploration and implementation of decentralized technologies
My Approach#
Every project adheres to these guiding principles:
- Evidence-Based: Recommendations built on rigorous research and testing
- User-Focused: Balancing strong security with practical usability
- Transparency: Clear explanations of trade-offs and limitations
- Independence: Free from commercial bias or influence
- Regular Updates: Continuously maintained to reflect the latest security developments
Get Involved#
I believe in the power of collaboration. Whether you’re a privacy advocate, security researcher, or just beginning your privacy journey, you’re welcome here. My projects are open for:
- Contributions and improvements
- Feature suggestions
- Bug reports and fixes
- Documentation enhancement
- Tool testing and verification
Updates & Maintenance#
I regularly review and update projects to maintain their relevance and accuracy. Major updates are released monthly, with critical security updates addressed as needed.
Feel free to explore, contribute, or connect with me if you have questions. Your privacy journey is important, and I’m here to help guide the way.
Husky Safety Initiative Project Overview The Husky Safety Initiative is Northeastern Universityβs dedicated digital defense program, designed to empower students, faculty, and staff with the tools and knowledge needed to safeguard their digital lives. In an age where online threats are just a click away, we provide comprehensive solutions for maintaining digital security without sacrificing productivity.
Why This Matters Digital security is crucial in todayβs academic environment. The Husky Safety Initiative helps the Northeastern community protect their personal information, research data, and online activities through carefully vetted tools and practices.
...
Into the Cyberverse Project Overview A curated collection of 196+ privacy and security tools, designed to help users enhance their digital privacy and security. This project is rooted in authenticity and independence, offering transparent, user-focused recommendations free from commercial influence.
Why This Matters Navigating the digital privacy landscape is increasingly challenging. Many popular recommendations are shaped by sponsorships or affiliate programs, leaving users to question their credibility. Into the Cyberverse is here to change that. Our unbiased, meticulously vetted collection ensures users can trust the tools they adopt, whether theyβre taking their first steps toward digital privacy or seeking advanced security solutions.
...
A comprehensive comparison of security, privacy, and convenience features across Android, GrapheneOS, and iOS mobile operating systems. This analysis is part of the SoftwareCompare Operating Systems project, with contributions from David Collini and others.
Overview Operating System Base Supported Devices Android AOSP Various Devices GrapheneOS AOSP Google Pixel iOS Apple Proprietary iPhone Privacy Features Feature Android GrapheneOS iOS Open Source β οΈ β
β Enhanced App Sandboxing β οΈ β
β οΈ Hardened Malloc β β
β Hardened WebView β β
β Sandboxed Google Play β β
N/A Network Permissions Toggle β β
β οΈ Sensors Permissions Toggle β β
β
Automatic Security Updates β
β
β
Hardware-Based Attestation β οΈ β
β
Configurable Default Connections β β
β User Profiles β
β
β Removes Screenshot Metadata β β
β Default Private Browser β β
β οΈ Contact Scopes β β
β οΈ Storage Scopes β οΈ β
β οΈ Backup with Another Device β
β
β
Security Features Feature Android GrapheneOS iOS Full Disk Encryption β
β
β
Verified Boot β
β
β
Per-App Hardware Permissions β
β
β
Default App Sandboxing β
β
β
Built-in Firewall β
β
β PIN Scrambling β β
β Supports Longer Passwords β
β
β
Auto-Reboot Feature β β
β
Duress PIN/Password β β
β Encrypted Local Backups β β
β οΈ OS Integrity Monitoring β β
β Tracking/Analytics & Freedom Feature Android GrapheneOS iOS No Advertising ID β β
β Sideloading β
β
β οΈ Convenience Feature Android GrapheneOS iOS Dark Mode β
β
β
Banking Apps β
β οΈ β
Biometric Authentication β
β
β
Google/Apple Pay Support β
β β
Find My Device β
β οΈ β
Legend β
Supported β Not Supported β οΈ Partial/Limited Support N/A Not Applicable Key Findings Privacy Focus: GrapheneOS leads in privacy features, offering the most comprehensive set of privacy controls and protections. Security Features: GrapheneOS provides the strongest security features, including unique offerings like PIN Scrambling and Duress PIN/Password. Convenience Trade-offs: iOS and Android offer more convenience features but at the cost of some privacy and security enhancements found in GrapheneOS. Contributing This comparison is part of the SoftwareCompare project. For updates or corrections, please visit SoftwareCompare.
...
Securing Your Google Account Project Overview This guide provides actionable recommendations for improving your Google accountβs security posture through essential steps like using strong passwords, enabling two-factor authentication, limiting account access, managing privacy settings, and implementing additional security measures.
Why This Matters Your Google account holds a wealth of personal data. A compromised account can lead to identity theft, financial loss, account takeovers, data theft, and reputation damage. Taking proactive security measures minimizes these risks and ensures your online safety.
...
Building a decentralized web presence is more than just following a trendβitβs about reclaiming control over your digital identity, ensuring your content is always accessible, and embracing the future of the internet. In this comprehensive guide, weβll walk you through the process of creating a decentralized website using Cloudflare Web3 Gateways and Unstoppable Domains. Letβs embark on this journey to a more open and resilient web.
Why Choose Decentralization? Before we dive into the technical steps, itβs essential to understand the benefits of a decentralized website:
...
Solidity Security Audit Checklist Project Overview A comprehensive checklist and toolkit designed to help developers, auditors, and security researchers identify common vulnerabilities in Solidity smart contracts. This resource provides structured guidance for conducting thorough security audits and implementing secure coding practices.
Why This Matters Smart contract vulnerabilities can lead to significant financial losses and compromised systems. This checklist helps ensure thorough security reviews by:
Providing systematic vulnerability assessment guidelines Offering practical examples and fixes Incorporating lessons learned from past incidents Supporting both manual and automated security analysis Key Features Our checklist covers critical security aspects including:
...
Project Overview This guide provides a complete introduction to Bitcoin, from basic concepts to advanced topics. We cover essential knowledge for beginners entering the cryptocurrency space, including wallet setup, security practices, and investment considerations.
Why This Matters As the first and most established cryptocurrency, Bitcoin offers a decentralized alternative to traditional financial systems. Understanding how to safely use and store Bitcoin is crucial for anyone looking to participate in the digital economy or protect their financial privacy.
...
The Ultimate iOS Hardening Guide Project Overview This guide provides comprehensive steps and best practices for securing iOS and iPadOS devices. From initial device selection to advanced security configurations, we cover essential measures for protecting your Apple devices and personal data.
Why This Matters Your iOS device contains a wealth of personal information and provides access to sensitive accounts. Proper security hardening helps protect against threats like device theft, data breaches, surveillance, and unauthorized access while maintaining privacy in an increasingly connected world.
...