Privacy is not about paranoia, but about digital self-defence.


by Kenny Wolf

Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds.

Invisible by Design

We spend an average of three hours a day on the internet (private use). In doing so, we leave behind many digital traces that are processed by large corporations and sent to third parties. This week is all about reducing our digital footprint. Privacy is not about paranoia, but about digital self-defence.

A Practical Guide to Online Privacy

This week, I published a blog post dedicated to practical tools and methods for privacy. In this article, I highlight the traces we leave behind, the risks involved, and how we can eliminate or at least minimise these traces.


What caught my eye this week

I know where you have been last summer

Extracting privacy-sensitive information via forensic analysis of the Mercedes-Benz NTG5*2 infotainment system

Spotify users are freaking out as song sharing exposes identities

Spotify announced a new feature last week – direct messaging – that was supposed to make music sharing easier. However, it all got out of control as Redditors started to notice weird things.

Sleeper Agents in Large Language Models

It's an older paper, but it checks out. Rob Miles discusses the problem of 'Sleeper Agents' - where LLMs could have hidden traits we don't know about until it's too late.


Tip of the Week

Do you waste a lot of time on YouTube because the algorithm is too good? Don't worry, with the browser plugin DF YouTube (Distraction Free YouTube) you can save time again. It allows you to customise the YouTube user interface however you like. In the screenshot below, you can see that I have hidden the feed, trending tab and related videos. This means I only see the videos from my subscriptions.

Forward this to a friend who cares about online security.

Read more stories on the Clear Byte blog

Clear Byte

by Kenny Wolf

113 Cherry St #92768, Seattle, WA 98104-2205
Unsubscribe · Preferences

Clear Byte

Clear Byte decodes the hidden layers of hacking, forensics, and digital systems—delivering academic clarity in byte-sized, actionable insights for tech-curious minds.

Read more from Clear Byte

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. All About Encryption Photo by Markus Spiske on Unsplash This week we're diving into the backbone of modern private communication: the Messaging Layer Security (MLS) protocol. As E2EE becomes a necessity rather than a luxury, MLS aims to bring scalable, efficient, and standardized security to group messaging. Here's...

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Inside Apple Photo by Laurenz Heymann on Unsplash This week, Clear Byte takes a deep dive into the Apple ecosystem. From running Linux on M-series Macs to understanding the cryptographic heart of Apple’s systems. Apple has quietly expanded its security documentation, opened up its bug bounty program, and revealed...

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Surveillance, privacy and misuse Photo by Ennio Dybeli on Unsplash This week’s issue takes a closer look at how technology meant to improve safety can also threaten privacy. From Kazakhstan’s growing surveillance system powered by Western tech firms to the ongoing debates around digital rights in Europe and the UK,...