Heavily armed police spraying chemical weapons as they advance on civilians. Image by StockSnap from Pixabay

How do you know if your computer is infected with malware?

You look for indicators of compromise (IOCs) — ie observable known facts about the malware’s behaviour, the known symptoms of the disease.

And if your computer has malware, what do you do?

You certainly don’t try to fix bugs in the malware, and make it a better version of malware. You remove all traces of the malware from your machine.

If your body gets a bug, you don’t try gene editing to make the bacteria work more effectively. You remove all traces from your body.

If your society has…


Woman facing right with binary code (Creative Commons)

I recently published some holiday travel security advice. I explicitly made the choice to write advice that was general and “neutral”, in order to not further endanger people who our societies choose to make vulnerable.

The result of that false neutrality was in fact to make advice that is only fully applicable and useful to the people who least need protection, people who look like me — the pale, male, and stale.

The disingenuous and self-evidently harmful nature of auto-proclaimed neutrality and objectivity have been known for a very long time in justice activism. A few examples:

“We must take…


Me on Belgian TV, explaining how a hacker can use insecure IoT devices to impact every other part of your digital life

My work is spread over multiple outlets. I write thousands of words a day, give talks, and answer interesting questions. Most of my work is under NDA — here you will find the parts that are not. This post provides a central location to find my articles, information about talks I have given, and my press clippings.

Beyond what is below, I am fairly prolific on Twitter on all kinds of topics, mostly related to security, privacy, surveillance, and broader human rights struggles. Opinions and comments are my own, obviously!

If you like what you see and want more, please…


Western pundits and politicians love to talk about scary Russian and Chinese cyber capabilities and activities. I believe we should look at those statements with a heavy dose of cynicism. Western states, and especially the Five Eyes nations (USA, UK, Canada, Australia, New Zealand), have overwhelming control of what I call “the high grounds of mass surveillance”. Both in terms of capabilities, and in terms of known activities, I believe the idea of any nation being in serious competition with, or a threat to, the Five Eyes is absurd.

The Five Eyes are Australia, Britain, Canada, New Zealand and the U.S. (Source: Devan Feeney/Staff)

Patriotism is our natural and delusional tendency to see our own…

Fenneladon Privacyasaurus Aurorateratops

Global Partner Product Advocate at F-Secure | Cyber Security, Privacy, Surveillance, Software Speaker | English & Python Writer | he/him

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store