TS Lipton TS Lipton

Practical Defense Against Section 702 Surveillance in 2026

As reported in The New York Times on April 17, 2026, the House recently faced a procedural vote on reauthorizing Section 702 of the Foreign Intelligence Surveillance Act (FISA). While the Trump administration urged Congress to pass the bill, citing counter-terrorism successes, the vote was ultimately postponed amid political scrambling. Yet, the core mechanism remains unchanged and active: the government can collect communications of "foreigners abroad" without a warrant.

This phrase "foreigners abroad" is often misunderstood. It sounds specific, but in practice, it is dangerously vague. It doesn't just mean "enemy combatants." It includes anyone outside the U.S. who isn't a U.S. citizen or green card holder. And here is the trap: when those people interact with Americans, the Americans' communications are swept up too.

And even if you don’t communicate with them directly, how this still effects you.

Read More
TS Lipton TS Lipton

From a “Permanent” eBay Ban to Reinstatement Using Privacy Laws and Regulatory Avenues

Recently, I experienced this personally. My brand new eBay account was suspended shortly after creation with the vague justification that I posed a "threat to the community." No evidence was provided. No policy violation was cited. Three customer service representatives confirmed the ban was "permanent and irreversible" and refused to discuss the reasons.

This blog is not to talk about my victory in getting it reversed, rather it’s about the tools that still work and the legal avenues available to challenge unjust algorithmic decisions and overreach—they do still exist and they work!

Read More
TS Lipton TS Lipton

Why Your Phone Number Is Your Biggest Privacy Leak

In the rush to escape Big Tech surveillance, many people are making a critical mistake: they believe that swapping a smartphone for a "dumb" flip phone or a "burner" device will make them invisible. They assume that older technology is inherently safer.

The reality is far more unsettling. The cellular network itself is the vulnerability.

Read More
TS Lipton TS Lipton

Above.IM

Above is a tech company, if you will, offering more than a philosophy: offering secure, privacy-first devices and services for those who care about digital ethics—not just convenience. We all love our smartphones and the internet, at least I know I do, but I’ve also always understood the risks of using it.

Read More
TS Lipton TS Lipton

When Your Security Tools "Don't Work"

We've all been there: you enable your VPN, and suddenly a website won't load. Your secure DNS stops resolving. Your privacy tool throws an error. The instinct? This thing is broken.

But here's what's actually happening most of the time.

Read More
TS Lipton TS Lipton

Understanding Encryption and “Military-Grade”

The technical foundation of encryption—like AES-256—is the same whether you’re in the military or using a consumer app. The real difference lies in the ecosystem: certifications, physical security, and operational discipline. But no matter how advanced the encryption, it’s only as strong as the weakest link in the chain—your device, your software, and your habits.

Read More
TS Lipton TS Lipton

Cybersecurity, Digital Hygiene & Computer Hygiene

A robust digital safety strategy involves three key layers: cybersecurity, digital hygiene, and computer hygiene. Each plays a distinct role—cybersecurity wards off external threats, digital hygiene safeguards your online presence and data sharing practices, and computer hygiene (or maintenance) keeps your hardware and software in peak condition so that all security measures function effectively.

Read More
TS Lipton TS Lipton

The Safety of Signal and the Misconceptions Forming Around It

Signal has gained a reputation as one of the most secure messaging apps available, and this status remains unchanged regardless of whether government officials choose to use it or not. The primary reason for the government's hesitance is not a reflection of Signal's safety, but rather their need for transparency and oversight in communication channels.

Read More
TS Lipton TS Lipton

Shared User Responsibility in Digital Security

Just as every car needs maintenance when it has to be in the shop, every computer system and online service has planned downtime. And the hard truth is, if you have a car you’re going to have car problems. Likewise, if you have a computer you’re going to have computer issues; if you have that computer hooked up to the internet, you’re going to have internet issues.

Read More
TS Lipton TS Lipton

The Privacy Paradox: beyond hacking and the cost of free

Our personal information is a valuable asset, and it’s crucial to recognize that threats aren’t just from external hackers but also from the very companies we trust with our data. When you trust a company with your data, you’re essentially handing over a piece of your life. It’s vital to ask: How confidential is my data with them?

Read More
TS Lipton TS Lipton

The CIA Triad: Why It’s Critical

The CIA Triad is a fundamental concept in cybersecurity that stands for Confidentiality, Integrity, and Availability. Understanding these three principles can help individuals and families stay safer in the digital world. Here's a simple breakdown of each aspect and its importance:

Read More