Practical Defense Against Section 702 Surveillance in 2026
As reported in The New York Times on April 17, 2026, the House recently faced a procedural vote on reauthorizing Section 702 of the Foreign Intelligence Surveillance Act (FISA). While the Trump administration urged Congress to pass the bill, citing counter-terrorism successes, the vote was ultimately postponed amid political scrambling. Yet, the core mechanism remains unchanged and active: the government can collect communications of "foreigners abroad" without a warrant.
This phrase "foreigners abroad" is often misunderstood. It sounds specific, but in practice, it is dangerously vague. It doesn't just mean "enemy combatants." It includes anyone outside the U.S. who isn't a U.S. citizen or green card holder. And here is the trap: when those people interact with Americans, the Americans' communications are swept up too.
And even if you don’t communicate with them directly, how this still effects you.
From a “Permanent” eBay Ban to Reinstatement Using Privacy Laws and Regulatory Avenues
Recently, I experienced this personally. My brand new eBay account was suspended shortly after creation with the vague justification that I posed a "threat to the community." No evidence was provided. No policy violation was cited. Three customer service representatives confirmed the ban was "permanent and irreversible" and refused to discuss the reasons.
This blog is not to talk about my victory in getting it reversed, rather it’s about the tools that still work and the legal avenues available to challenge unjust algorithmic decisions and overreach—they do still exist and they work!
Why Your Phone Number Is Your Biggest Privacy Leak
In the rush to escape Big Tech surveillance, many people are making a critical mistake: they believe that swapping a smartphone for a "dumb" flip phone or a "burner" device will make them invisible. They assume that older technology is inherently safer.
The reality is far more unsettling. The cellular network itself is the vulnerability.
Set up a “Play Services” profile in GrapheneOS
These videos show how I use GrapheneOS User Profiles to isolate apps that require Google Play Services from your main, privacy-focused environment.
Above.IM
Above is a tech company, if you will, offering more than a philosophy: offering secure, privacy-first devices and services for those who care about digital ethics—not just convenience. We all love our smartphones and the internet, at least I know I do, but I’ve also always understood the risks of using it.
When Your Security Tools "Don't Work"
We've all been there: you enable your VPN, and suddenly a website won't load. Your secure DNS stops resolving. Your privacy tool throws an error. The instinct? This thing is broken.
But here's what's actually happening most of the time.
Understanding Encryption and “Military-Grade”
The technical foundation of encryption—like AES-256—is the same whether you’re in the military or using a consumer app. The real difference lies in the ecosystem: certifications, physical security, and operational discipline. But no matter how advanced the encryption, it’s only as strong as the weakest link in the chain—your device, your software, and your habits.
Cybersecurity, Digital Hygiene & Computer Hygiene
A robust digital safety strategy involves three key layers: cybersecurity, digital hygiene, and computer hygiene. Each plays a distinct role—cybersecurity wards off external threats, digital hygiene safeguards your online presence and data sharing practices, and computer hygiene (or maintenance) keeps your hardware and software in peak condition so that all security measures function effectively.
The Safety of Signal and the Misconceptions Forming Around It
Signal has gained a reputation as one of the most secure messaging apps available, and this status remains unchanged regardless of whether government officials choose to use it or not. The primary reason for the government's hesitance is not a reflection of Signal's safety, but rather their need for transparency and oversight in communication channels.
Shared User Responsibility in Digital Security
Just as every car needs maintenance when it has to be in the shop, every computer system and online service has planned downtime. And the hard truth is, if you have a car you’re going to have car problems. Likewise, if you have a computer you’re going to have computer issues; if you have that computer hooked up to the internet, you’re going to have internet issues.
The Privacy Paradox: beyond hacking and the cost of free
Our personal information is a valuable asset, and it’s crucial to recognize that threats aren’t just from external hackers but also from the very companies we trust with our data. When you trust a company with your data, you’re essentially handing over a piece of your life. It’s vital to ask: How confidential is my data with them?
The CIA Triad: Why It’s Critical
The CIA Triad is a fundamental concept in cybersecurity that stands for Confidentiality, Integrity, and Availability. Understanding these three principles can help individuals and families stay safer in the digital world. Here's a simple breakdown of each aspect and its importance: