Archives

Welcome to the Loose Leaf Security archives, where you can find suggestions for where to get started with Loose Leaf Security, a complete list of our episodes, articles, and resources by topic, a list of all past newsletter issues, and a tag cloud of all tags.

New to Loose Leaf Security and wondering where to get started?

Episodes, articles, and resources by topic

Alternatively, see our episodes sorted by release date (most recent first), our articles sorted by release date (most recent first), and our resources page.

Account security

Laptop and desktop computer security

Phone security

Web security

Personal finance

Other privacy concerns

Privacy is a really common concern that comes up in nearly all our episodes, but some of our episodes are devoted to specific privacy concerns.

Security stories

Fun stories from our own security adventures and really juicy news stories that weren't quite useful enough for the regular security news segment

Past newsletter issues

All tags

1Password · account recovery · ad blockers · admin access · Adobe · advertising · Alexa · algorithms · Amazon · Android · antivirus · app stores · Apple · Apple Card · Apple Pay · associated domains · ASUS · ATMs · AT&T · augmented reality · Australia · authentication · authenticator apps · backups · banking · Berkeley · BGP hijacking · biometric unlocking · BIOS · BitLocker · bloatware · Bluetooth · boot ROM · Border Gateway Protocol · botnets · Brave · breaches · browser fingerprinting · bug bounty · CamScanner · car black box · cell phones · Cellebrite · certificate authorities · Certificate Transparency · certificates · charging · checks · China · Chrome · clickjacking · cloud storage · confidence scams · contactless payments · cookies · Corellium · crash reports · credit cards · credit freezes · credit reports · credit scores · CVV · Dalai Lama · Dashlane · data blocker · data brokers · debit cards · deep learning · deepfakes · defense in depth · denial-of-service attacks · device security · Digital Asset Links · digital cameras · digital photos · disclosure · disk encryption · DMA · DNA · downloads · drivers · EFAIL · Emotet · employer accounts · encryption · Exif · Extended Validation SSL Certificates · extensions · Face ID · Facebook · FaceTime · facial recognition · FIDO · Find My · fingerprinting · fingerprints · Firefox · firmware · Flash · forks · forward secrecy · fraud · fraud alerts · FTC · G Suite · GDPR · GEDmatch · GitHub · Gmail · Google · Google Ads · Google Chrome · Google Home · Google Maps · Google Pay · government access to private data · government-run databases · GPS · Halloween · hard drives · hardware · health data · Hikvision · history · Hong Kong · HTTPS · HTTPS Everywhere · identity theft · iMessage · in-app purchases · incognito mode · India · Instagram · Internet Explorer · internet of things · iOS · IP address · iPhone · iTunes · jailbreaking · Java · JavaScript · JPEG · Kazakhstan · KeePass · KeePassXC · Keeper · laptops and desktop computers · LastPass · Lightning cables · Linux · localStorage · location · location data · lock screen · machine learning · macOS · malvertising · malware · Meltdown · MEMS · metadata · Mint · mixed content · mobile banking · Mobile Device Management · Morocco · NAS · Nest · Nexus · Niantic · NordVPN · NoScript · notifications · NSO Group · NYC · Office macros · old hard drives · OnePlus · online accounts · open source · origin · passcodes · password managers · passwords · PayPal · Pegasus · permissions · permissions prompts · personal data · personal finance · phishing · phone calls · phone number porting · phone numbers · phones · physical security · PIN · Pixel · plugins · podcast recommendations · police · pop-ups · pre-installed software · principle of least surprise · privacy · Privacy Badger · private browsing · Project Treble · QuickBooks Online · RAM · ransomware · RCS · Reddit · remote access · responsible disclosure · Retina-X · Ring · Rubber Ducky · Safari · Samsung · Samsung Pay · sandboxing · Saudi Arabia · scams · school surveillance · screen locking · security keys · security questions · security records · sextortion · shared accounts · sideloading · Sidewalk · Signal · SIM cards · SIM-jacking · Simjacker · skimmers · smartphones · SMS · snow boot · social engineering · social media · software updates · Spectre · speculative execution · spyware · Square · SSL · stalkerware · Steam · Super Micro · surveillance · suspicious account activity · T-Mobile · telemetry · Tencent · text messages · theft tracking · third-party access · third-party logins · threat modeling · Thunderbolt · Tibet · TLS · Tor · Touch ID · tracking · Trend Micro · trust · Twitter · two-factor authentication · U2F · uBlock origin · ultra-wideband · Untitled Goose Game · USB · USB-C · user-submitted data · Vatican · Venmo · Veritas Genetics · Visual Voicemail · VPNs · Washington, DC · WebAuthn · webcams · WhatsApp · Windows · Windows Update · wiping data · wireless · WWDC · YubiKey · Zappos · Zelle · zines · ZIP files