Skip to content
David Faulkner

David Faulkner

Computer Scientist | AI++

  • Home
  • Topics
    • Foundations
    • Philosophy
    • Security & Privacy
  • Login

Online Privacy

How to Set Up a Cheap, Fast, Post-Quantum VPN on AWS

May 19, 2025May 8, 2025 by Davo
Laptop showing AWS EC2 dashboard with WireGuard overlay and glowing lock tunnel representing secure VPN connection

Set up a secure, high-speed VPN using WireGuard on AWS. This guide is built for pro users and walks through a lightweight, hardened, post-quantum-ready setup on a t4g.nano instance.

Categories Security & Privacy Tags AWS, Cloud, Cybersecurity, EC2, Encryption, Fail2Ban, Linux, Online Privacy, Post-Quantum, Secure Systems, Self-Hosting, Tools, UFW, VPN, WireGuard Leave a comment

How to Send Encrypted Email Using Thunderbird and PGP (A Beginner’s Guide)

May 9, 2025April 28, 2025 by Davo
Laptop screen showing encrypted email interface, symbolizing PGP email encryption.

Learn how to send encrypted email using Thunderbird and PGP—no new accounts, no extra costs. Secure your communications with a few simple steps.

Categories Foundations Tags Email Security, Encrypted Email, Foundations, Online Privacy, PGP, Protect Your Accounts, Thunderbird, Tools Leave a comment

Why Two-Factor Authentication (2FA) Is Essential for Online Security

May 3, 2025April 27, 2025 by Davo
Smartphone displaying an authenticator app with 6-digit security codes, resting on a blurred laptop keyboard, blue-toned lighting

Even strong passwords can be stolen or phished. Two-factor authentication (2FA) adds a crucial second layer of protection. Learn why it matters, how it works, and why it’s one of the simplest upgrades you can make to protect your digital life.

Categories Foundations Tags 2FA, Account Security, Authenticator Apps, Cybersecurity, Digital Security, Foundations, Hardware Security Keys, Online Privacy, Protect Your Accounts, Secure Systems, Tools, Two-Factor Authentication Leave a comment
Older posts
Page1 Page2 Next →

Recent Posts

  • The Zeroth Law and the Weaponization of IntelligenceMay 19, 2025
    Asimov’s Zeroth Law warned of machines that harm humanity by serving the wrong goals. Today, AI is doing just that—through surveillance, targeting, and war. This isn’t sci-fi anymore. It’s happening now, and the real danger isn’t rogue robots—it’s us.
  • How to Set Up a Cheap, Fast, Post-Quantum VPN on AWSMay 8, 2025
    Set up a secure, high-speed VPN using WireGuard on AWS. This guide is built for pro users and walks through a lightweight, hardened, post-quantum-ready setup on a t4g.nano instance.
  • How to Send Encrypted Email Using Thunderbird and PGP (A Beginner’s Guide)April 28, 2025
    Learn how to send encrypted email using Thunderbird and PGP—no new accounts, no extra costs. Secure your communications with a few simple steps.
  • What is a Gravatar — and How It Makes Online Communities BetterApril 27, 2025
    Gravatars add a face to your name online, making communities feel more real, personal, and trustworthy. Here's how to set yours up and join the conversation.
  • Why Two-Factor Authentication (2FA) Is Essential for Online SecurityApril 27, 2025
    Even strong passwords can be stolen or phished. Two-factor authentication (2FA) adds a crucial second layer of protection. Learn why it matters, how it works, and why it’s one of the simplest upgrades you can make to protect your digital life.

Explore by Concept

2FA (2) AI Research (2) Artificial Intelligence (2) AWS (1) Cloud (1) Cybersecurity (3) EC2 (1) Foundations (6) Human Values (1) Online Privacy (4) Post-Quantum (1) Protect Your Accounts (2) Secure Systems (4) Systems Thinking (1) Tools (4) Two-Factor Authentication (2) VPN (1) WireGuard (1) WordPress (1) Zeroth Law (1)

Privacy · Cookies · Tools · PGP · Contact

© 2025 David Faulkner

© 2025 David Faulkner • Built with GeneratePress
Professional headshot of David Faulkner, computer scientist and AI researcher
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}