Sign in

Freelance Writer | Cyber Enthusiast and HERO with my glasses on :) https://samwritessecurity.medium.com/membership “Cybersam-writes@protonmail.com”

… Every single time. You’re not wasting any money, but maybe you should.

Photo by Brett Jordan from Pexels

Grammarly highlights words and phrases where you might have messed up


There’s more to these private, not so private, private tabs? Does that even make sense to you, cause I’m feeling this!

Photo by Anete Lusina from Pexels
  • Different identity (usually just a different IP)
  • No tracking (tor relays, no cookies)
  • Different location (IP’s come with this)
  • NO tracking possibilities or very hard tracking possibilities (VPN’s can only do so much)
  • Encryption everywhere (Cause that’s unbreakable right?)
  • Cookies and browsing history…


It's free, simple, and most importantly legal!

Photo by Daria Shevtsova from Pexels


Attacks, viruses, and contamination

Photo by Tima Miroshnichenko from Pexels


The #1 vulnerability which is consistent in computer systems

Photo by Lara Jameson from Pexels

And, what are the advantages?

Photo by Aleksandar Pasaric from Pexels

Basic, simple but effective.

Photo by Moose Photos from Pexels


Understanding the worldwide web, just the tip of the iceberg

Image by Pixabay from Pexels


We share information about ourselves, sometimes we don’t even know we did.

Photo by Vitaly Vlasov from Pexels

Sam Writes Security

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store