Cybersecurity & Anonymity: What They Have To Do With You?

Cybersecurity & Anonymity: What They Have To Do With You?

Sometimes being a Tech worker I tend to do and know many things, that I consider very normal and obvious, but many people around don’t. Our parents, grandparents, uncles, aunties and more may not understand simple security routines and the need for anonymity.

I didn’t realize that not only older generations underestimate the power of online info, but also newer generations. Sharing my thoughts with a friend around my age we got into a point where she was skeptical about the need to encrypt e-mails, use a safe search motor, use an anonymous browser and so on. This friend is quite techy herself, gaming, using 3D dev tools, however, she didn’t see the need for such things.

What I’ve been hearing most from people when talking about cybersecurity and anonymity is: “I have nothing to hide”. This is especially true when speaking about apps and software that track location, collect basic info, or ask for certain weird permissions before being installed. Also, talking about Google and how it makes a lot of profit from selling personalized adds based on personal e-mails and browser. Many of them tend to brush it off.

So why should we be concerned about this? Do we really have nothing to hide?

Recently The New York Times published an article about the tracking of American cellphones and its locations. For many users that was the first time that they really got face to face with the modern surveillance problem. A lot of people were shocked, but some already had an idea of how our data is being commercialized.

The data collected was sold to the journalists as “anonymous” data usually used to marketing and advertisement. A few days was all that it took for them to cross the dots and identify some of the people on the map. Exposing people’s daily life, legal and illegal activities, friends, habits and much more.

This is just a sample, imagine the places where women have no right to be at certain places at a certain hour? Or journalists fighting against barbaric regimes? Or even LGBTQIA+ people in countries that aren’t accommodative of them?

We take many things for granted due to being in a free country, where our rights are preserved. But have you stopped to think: what if the situation takes a twist?

That’s why we should support projects that allow us to be anonymous if we wish to do so. I’m not saying that you should frantically change Chrome for TorBrowser, and Google for DuckDuck Go. However, it’s important to understand that these tools have a good reason for existing and maybe, just maybe, we should think better about all those apps asking for location, info, pictures, friends and phone numbers.

How much is it worth to have privileges with certain apps integrated services against having the risk of having your browser historic, e-mails, location and etc. sold to someone?

There’s a need to raise this topic and ask questions, to promote awareness among people. A lot of users are feeding Big Databases every day, offering metadata all the time, and they don’t even know.

Do you still think that cybersecurity and anonymity have nothing to do with you?

Copy? Over.

Mailvelope – How To Keep Your E-mails Safe

Mailvelope – How To Keep Your E-mails Safe

Last week, a trend on twitter about a woman that had her phone robed and consequently lost money due to bank accounts being connected to it, made me rethink my security model. It made me realize how careless most users are with sensitive information. Everyone walks around with smartphones, carrying data that a few years ago would’ve been in a safe at home.

My mentor brought up encrypting our e-mails. At first, I was a bit skeptical about the need for this, after all, I was never a person to send sensitive information through e-mail. However, how weirded out would I feel having someone reading my private conversations?

It’s disturbing to think that anyone could intercept our internet packages and read our deepest secrets. I admit that I’m one of those people that truly uses e-mail, almost like any other push notification messenger. If there was someone tracking my average time to reply it would be less than 30 minutes almost always.

People tend to dismiss online security (as a lot of other online things) because they can’t really idealize the damage. But how would you feel if your neighbor intercepted all your mail and letters, read them, and you didn’t even know the motivation behind this? Feels bad, right?

That’s why it’s time to begin taking online security seriously. Encrypting your e-mails doesn’t need to be the hardest tech task of this week.

I was able to discover Mailvelope through my Outreachy Mentor. It’s the best match for me, works wonders with my gmail account and I understood all the functionalities in less than a week.

It’s Open-Source, secure, easy to deal with, can be integrated to your gmail, outlook and much more. Also, work as an extension on your browser. Having a girly moment here, but the visuals are super cute, I’m having a great time with this encrypter.

Let’s take digital security seriously and avoid situations like that. Having a phone robbed is a terrible experience, but waking up the next day to know that every penny that you saved got stolen is heartbreaking. Stay safe!


Copy? Over.

The Myth of the Perfect Professional

The Myth of the Perfect Professional

Very often I meet friends, colleagues, workmates, internet acquaintances and also some not so acquainted beginning careers as myself. Something that came into light recently is how many of us struggle with the professional image that we idealize for ourselves.


Legend says that by 20 we all should know what to do, what we want to achieve. Around 30 there’s this pressure not only to know what we want but how to achieve it. The myth of the perfect professional has been bringing a lot of impostor syndrome to all of us.


It’s so easy to log in Linkedin and scroll through a feed where all our friends have great achievements and seem to be thriving perfectly in their careers. The Selective Success has spread from Instagram and Facebook to haunt professional beings.


Despite all that we see, it’s important to understand that this is just the pretty side of the embroidery. Turn it back and you will see the mess. Getting our professional life together is hard and not every day is productive. Working with a mentor, as I am right now, can be challenging for some people as they tend to think that they are the only ones struggling.


Being an Outreachy Intern made me realize how important it is to share our struggles. During our first meeting between alumni and new interns, we talked about our first week tackling our respective tasks. People mostly said that they were doing fine, but eventually, everyone opened up and exposed their feelings.


Some of us aren’t having any technical problems with our tasks, but realizing that it’s a bit overwhelming with all the new environment is important to show to others that it’s completely ok to be struggling.


We must take this to our professional journey, we need to accept that struggles will come and that’s alright to suffer with them.
I must admit that although I considered myself a very private person that worried about online security I had to Adapt. After having more contact with the Tor community there were tools and methods to be learned and used that I wasn’t expecting. Encrypting my e-mails was never something that I’ve considered doing, but it was necessary.


I struggled to try to understand the hundreds of different options to PGP encryption and trying to make something work out with my e-mail server. I felt like a tech noobie asking questions to my mentor and everyone in the community. Questions that now, two weeks later, I can see how shallow and easy they were.


Asking for help is necessary, it’s a process that may help us grow even though it may be embarrassing sometimes. With my mentor’s help, I was able to set a nice add-on on my e-mail to encrypt everything. It was something that I had tried to do for one entire week before giving up and asking for help.

So don’t let impostor syndrome crawl into your skin simply because you struggled about something. Asking for help and sharing problems don’t diminish your expertise and worth as a professional. If anything, it makes you a better person!

Copy? Over.

Jitsi Meet: Open-Source Software to Your Team Meetings

Jitsi Meet: Open-Source Software to Your Team Meetings

Lately, I’ve been even more immersed in FOSS communities and discovering great things. Every day is just constant learning! Making part of a diverse and international team opened my eyes to struggles that a local team wouldn’t face.

Communication is essential within any workplace, but how can we achieve this with international teams and in a freeway?

One of the solutions that I came to know recently is the Jitsi Meet. It’s a multi-platform Open-Source software to video and call conferences. The great difference is that there’s no need to register or download heavy executables. You can do it all directly from your browser. There’s the possibility to create a conference room with a permanent URL, this room may have a password, but it’s simply as sharing the link and password to the rest of the team and everyone can access it.

The cherry on the cake is how well it works on the mobile version. Anyone can be connected all the time, even through a smartphone. This software is full of nice details and good surprises, another feature is the vote function. Whenever voting is called people can simple ‘raise’ their virtual hands and by the end, the counting is made and results presented.

Asides from all of this, Jitsi works very well even with older machines and slow connection. The voice is clear and the video is alright. Nowadays another product like this would be Zoom, however, paid. In Zoom there’s a free trial of 30 minutes per session and then it’s disconnected.

But hey, why use some private solution when you can support a FOSS community and get excellent software that fits your team budget?

Copy? Over.