F.A.Q.

Terminology

An IP address functions much like a physical address, but instead of being associated with a physical location like your home or the store down the street, it is associated with a specific device on the network.

For instance, your wifi network differentiates the different devices connected to it like your phone, computer and tablet devices by it’s IP address.

Ā 

Ā 

VPN stands for virtual private network, which masks your IP address while on a public network. This establishes a more secure, encrypted connection as you surf the web so that your browsing history, transactions and personal information aren’t being tracked and stored by the websites you visit.

MAC stands for Media Access Control. A MAC address is typically assigned by the manufacturer of a technology to signify when that specific device is being used on a network.

For instance, your phone has a MAC address that helps identify to your carrier when your phone is accessing it’s network. Just like anything else that has an address, this means your MAC address can be tracked and traced back to you.Ā 

A blockchain is an online public ledger that records all the transactions on the network. The network is built by multiple machines across the globe verifying the transactions in a unique, unpredictable order so that no transaction can be tampered with, and will always show on the ledger. The assets being traded are dictated by the specific blockchain, for instance, the Bitcoin blockchain is for trading other cryptocurrencies for Bitcoins. The ledger will show all of these transactions.Ā 

A SSL encryption is an algorithm encoded on a domain address that helps the site remain usable without giving any pertinent information about the site identity being compromised.

An SSL encryption is essential for any site, no matter what capacity it’s running at.Ā 

Ā 

A Sandbox is a save and protected environment, in wich software, applications and code can be executed without harming or damaging the surrounding systems. A sandbox features all tools to enable all kinds of data, software or code to run in itĀ“s environment.

Running software in a save environment offers numerous advantages for us. Some of these are:

  • the system environment and te executed software are more controlable
  • the executed software can not access ressources of the system unnoticed and damage, change or reed it
  • there are no changes to the main registration databases
  • programms that are run simultaneously in differnt save envirenments can not interfere with each other
  • the access to data of the hostsystem is blocked
  • conflicts between operating systems and software can be avoided with seperated save environments

A bootloader is a special operating system software that loads into the working memory of a computer after start. The bootloader ist stored in a a specific partition or the first block of a bootable medium like CD/DVD, USB-Stick or hard-code drives. After staring the firmware (BIOS or UEFI) checkes all available hardware and is looking by sequence for the so called boot sequence in all found data carriers. The search allways starts withe the removable media followed by the hard code drives. The first bootloader that is found will be loaded and the system start will be initiated.

Exploid Mitigation is the attempt to protect the devices from installing spy- or malware. On new devices it is a pre-installed service wich disables apps from unsafe sources to be downloaded or installed. In our experiences mainly FOSS apps are blocked, because they don not serve the big data and tech businesses.

Telemetry is the in situ collection of measurements or other data at remote points and their automatic transmission to receiving equipment for monitoring. Telemetry is used to gather data on the use and performance of applications and application components, e.g. how often certain features are used, measurements of start-up time and processing time, hardware, application crashes, and general usage statistics and/or user behavior. In some cases, very detailed data is reported like individual window metrics, counts of used features, and individual function timings.

This kind of telemetry can be essential to software developers to receive data from a wide variety of endpoints that can’t possibly all be tested in-house, as well as getting data on the popularity of certain features and whether they should be given priority or be considered for removal. Due to concerns about privacy since software telemetry can easily be used to profele users, telemetry in user software is often user choice, commonly presented as an opt-in feature (requiring explicit user action to enable it) or user choice during the software installation process.

2FA means 2 factor authentication (also MFA, multi factor authentication) is an electronic authentication method and describes a users proof of identity by means of the combination of two differents and indipendent pieces of evidence (factors). To successfully login to a service both factors have to be correct. The savest of these proceedings is the authentication with one-time passwords. We are already used to it by our banking app, wich sends a one-time token to our smartphone, when we try to login. To protect all our webservices, like email or cryptowallets, we can use 2FA apps (TPA) to secure our logins with timebased one-time passwords. AĀ third-party authenticatorĀ (TPA) app enables two-factor authentication, usually by showing a randomly generated and frequently changing code to use for authentication.

Privacy Concerns

VPNs protect you from sites collecting your IP address and browser history. Ā 

So they do technically protect you in some ways, but there are so many other points of data to consider when using the web. So getting a VPN is only one step in the process of keeping your personal data secure.

It’s far too much work to try and patch the loopholes of applications on a phone that wasn’t set up for privacy, and it doesn’t even ensure that you are fully private. Itā€™s better to use a device that is set up to be in integrity with your privacy concerns, than to continue the use of a device that was never intended to keep your private data secured.Ā 

FOSS means that the source code is open and free to everybody, noone has the exclusive rights over it. The open source platforms are mostly financed by donations from there customers and not by selling your data. There ar often initiated by groups that want to prevent monopolization and centralization of services, and in the end dependence of them, but instead want to make sure it’s available for everybody. The fundamental idea is building a community where everybody shares their skills for the benefit of everybody rather than just there one profit.Ā 

Payment

We have chosen the two most savest and PRVCY compatible practices. All the other possibilities may seem more easy to you, but we would share our data with to many third parties without knowing how they actually handle them. So we better avoid them.

The course will be activated right after certified payment. Since banktransfers take nomaly one or two days to be processed it can take longer for your course to be unlocked.

By paying with crypto currencies the amount withdraws promtly, so your course can be unlocked right away.