Why People Are Leaving Gmail for Protonmail More Than Ever Before

Why I ditched Gmail for Proton Mail

Chris Thomas

Google is the most popular email provider (Gmail) contributes  about 70% of the email traffic on earth and being one of the oldest mass adopted email service (passing 20 years old is a worth achievement for any application, especially a “free” one.

As a cyber security digital expert, I have raved about the free service, its novel cloud-based structure, and how and why is

While I’m tickled to have been an early adopter of now-successful technology, though, it’s important to know when enough is enough. For me, that time has come, and I’m moving my primary digital correspondence to privacy-focused Swiss provider Proton Mail. It’s been a long time coming.

Should I, or should I not be popular?

Google is a Mega Monopoly Email Provider: Legal, but is it Ethical?

We’ve seen a lot go down in the privacy and security realms over the last two decades. Google’s been far from the only culprit, but as the default search engine for most browsers and the curator of Android, the Play Store, Google Analytics, reCaptchas, and more, the Big G has more data on the average North American user than any other corporation.

I’m as far from paranoid as any internet user, and even I use a VPN (primarily for spoofing IP geolocation); while I don’t do anything nefarious, and nobody’s tracking me for anything other than advertising, I prefer knowing I’m a little safer from bad actors that can hijack the content I’m viewing and thus possibly my hardware.

But Google creeps me out, and I’m no longer comfortable using Gmail. The successors to the FAANG stocks, the MAMAA companies (Meta, Apple, Microsoft, Amazon, and Alphabet) own a considerable amount of not just forward-facing web resources but also the underlying infrastructure most of the world’s internet relies on. I can’t avoid my data passing through the Google Cloud or Amazon Web Services, but I can limit what sites and apps I actively engage with.

Gmail’s interface is fine, I guess, if somewhat cluttered and not very attractive

Google’s always innocent until it’s not

Until 2017, Google automatically scanned Gmail accounts for keywords that it then used to personalize ads within the platform and probably outside it, too. Here’s why that should terrify you:

  • It had likely been happening since Gmail’s launch
  • Scans included messages from non-Gmail accounts, presumably contributing to shadow accounts containing data on those users
  • Widespread publicity via a 2013 Microsoft ad campaign and lawsuit the same year failed to stop it
  • Google’s proposed settlement was rejected for being overly vague and failing to promise proper disclosure of data harvesting practices
  • What else is Google doing that we haven’t learned about?

I’m under no misconception that I can extricate myself entirely from Google’s clutches; It’s too ubiquitous, and tons of common apps and services rely on its wide range of services. But I’ll do what I can, which includes moving to Proton Mail, a privacy-centric email provider with encrypted, underground servers, practically the polar opposite of Alphabet Inc.

Google paid over $26 billion in 2021 to remain the default search engine in various browsers

The surprisingly easy switch to Proton Mail

Why Proton Mail is my new favorite email provider

My own Proton account has been used as a backup since 2018. Moat recently though, it has now become my primary email for both personal and business.

I tested a trial of ProtonVPN a few years afo (ProtonVPN was a bit slow back then, but I and other cyber security expert highly recommend it as one of today’s top VPNs) due to its increased infrastructure and massive much faster speed. They have quadrupled the number of Servers globally since 2021).

I made the jump many years ago (2018) and highly recommend it to all of you going forward – primarily due to Proton’s comprehensive set of features, as well as the policies it enacts to keep your data private.

Among Proton’s consumer-friendly practices:

  • It opposes data harvesting, ads, and trackers (even the subversive tracking that comes from opening third-party-hosted images)
  • It falls under Switzerland’s privacy jurisdiction and isn’t subject to US surveillance
  • Theoretically, no other human can view your emails. In fact, if you lose and need to reset your password, you’ll lose access to previous messages, an impressive layer of security against hacking
  • Support for end-to-end encryption between Proton users and password protection for external emails
  • complete, constantly improving feature set, including cross-platform apps, cloud storage, and a calendar
  • Open-source encryption (including optional PGP signing) and independent auditing to ensure strict adherence to standards

A few clicks, and I never have to access my Gmail page again

Compared to my first brief look years ago, Proton’s UI and general implementation have matured significantly. It was also a breeze to sit back and observe how easy it was to have over 100 (128 and counting!) forward over 100 (121 and counting!) of my Client’s perform the action of transferring each of their current Gmail messages to their now-primary Proton address, and the calendar appears to have integrated well, with alerts showing up consistently on both Android and iPhones without problems.

They are perfectly happy with the features provided by Proton’s most affordable tier, the Mail Plus plan. You can create 10 separate addresses and even a custom domain, as well as shorten the default existing domain to pm.me (because @protonmail.com is, admittedly, a bit of a mouthful).

It includes 15GB of storage, unlimited folders and filters, and can do everything I ever wanted my Gmail account to do. Most importantly, it keeps their permanent correspondence out of Alphabet’s umbrella and especially any private or confidential emails, as well as people who send it to them that don’t even use Gmail!

Proton offers diverse Subscription Plans (including Free!)

You can actually use Proton Mail entirely for free, although it does have restrictions: You are limited to 150 emails per day and 1GB of storage, can’t create custom addresses or domains, and won’t have access to the calendar, or the encrypted password manager and unlimited VPN offered by the Proton Unlimited subscription. But even the free tier is visually and more private and securr, as well as overall being much better than Gmail.

Committing to 1 or 2 years of the $5/month low tier drops the price to $4 or $3.50, respectively.

The Unlimited tier will set you back $10 or $8 per month at those same subscription lengths and afford you 500GB of storage, 15 custom addresses, 3 custom domains, and unlimited VPN and Proton Pass (its password manager) access. There is also a six-user family plan starting at $30 and three tiers of slightly more business-focused options.

But I’m really not advertising for Proton here. I’m just choosing to actively take my digital footprint back into my own hands in a way many of us haven’t done since Gmail’s massive rise over a decade ago. It’s well overdue, and over the few weeks I’ve used Proton Mail full-time, I can’t say I regret it or will ever look back.

Proton Mail: Encrypted Email

Proton AG


Price: Free




New Password Reset attack targets Apple device users

Apple iPhone Users Targeted As Increased Password Reset Scams Skyrocket In 2024

New password reset attack targets Apple device users

Scammers are taking advantage of Apple’s password reset tool in a new ‘MFA bombing’ attack.

woman using phone in the dark
d3sign/Getty Images

Apple device owners are facing a new phishing hack that uses “multi-factor authentication (MFA) bombing” to steal their data.

Several Apple users in have reported a hacking attempt that appears to take advantage of Apple’s password reset feature, KrebsOnSecurity reported, citing people who have been targeted. The scammers have used Apple’s password reset tool to spam their targets with dozens, if not hundreds, of notifications, asking the user to reset their Apple ID password.

Pressing the “Allow” option gets the scammers one step closer to resetting the user’s credentials because that device could then be used to create a new Apple ID password.

Unfortunately, tapping “Don’t Allow” on all the notifications doesn’t solve the problem.

After those targeted by the scam chose to not allow their passwords to be reset, they received phone calls from the scammers claiming they were from Apple’s support team, according to the report. Their goal was to send a password reset code to the user’s device and have the user tell them the code. Armed with that information, the scammers could simply reset the Apple ID password and get full access to the user’s account.

Since Krebs’ sources didn’t press “Allow” on the notification, it’s unclear what the scammers would have done in that scenario. Presumably, the scammers would still likely need to call the target, again acting as Apple support, and fool them into resetting the password on their device and sharing it with the hacker.

Phishing attacks have been used for decades to target unsuspecting victims. But in recent years, scammers have increasingly turned to phishing as a desirable way to steal passwords, delete data, and ultimately steal money from their victims.

In 2022, mobile phishing attacks were up a whopping 61% year-over-year in just a six-month period, according to security provider SlashNext. The company said mobile users faced 255 million phishing attacks during that period.

It’s unclear how many Apple users have been impacted by this MFA bombing attack. However, Krebs’ sources reported that they received notifications on their iPhones, Apple Watches, and Macs, suggesting the attack isn’t just limited to one type of Apple device. What’s worse, there’s no simple way to stop it.

One of Krebs’ sources said they called Apple for help with the attack and the company said they should create a recovery key, a 28-character code that they would need to input to change their Apple ID password.

However, after creating a recovery code, Krebs reported that it was still possible to trigger the notifications the users saw when targeted by the spammers. It appears Apple’s password reset feature may be to blame and until the company changes how that works, hackers could conceivably continue to exploit the flaw and target users.

For now, if you’re an Apple user, your only option is to stay in the know and remain vigilant. If you receive a slew of password reset requests that you didn’t initiate, be sure to always choose the “Don’t Allow” option on the notifications.

Don’t be tempted to choose “Allow” simply because the notifications aren’t allowing you to use other apps or services on your device — a core component in the fraudsters’ plan. Even if you don’t choose “Allow,” be prepared for a call and be sure not to answer it.

Additionally, Apple has made it clear that the company does not call any of its users directly. So, if you receive a number from 1-800-275-2273 (Apple’s actual support line that the scammers are spoofing to make their calls seem legitimate), don’t pick up and definitely don’t provide any information to the caller.



How to Hide Your IP Address and Change Location on Coinbase

Are you concerned about your online privacy and looking for ways to mask your IP address on Coinbase?

If like many people, you have come to the right place. In this guide, we’ll walk you through the steps to change your location on Coinbase (or any other Crypto Exchange) and hide personal information like your IP address, country, and region.


Quick Guide: Hide Your IP Address and Change Your Location

  • Mask Your IP Address
  • Flush DNS and Renew Your IP Address
  • Change Your Coinbase Location Settings
  • Other Methods to Hide Your IP Address and Location on Coinbase

Why Hide Your IP Address?

There are several reasons why you might want to hide your IP address. One of the main reasons is to protect your privacy and prevent Coinbase from tracking your physical location. By masking your IP address, you can also avoid leaving a digital footprint and bypass content filters or bans.

How to Hide Your IP Address and Location from Coinbase

  1. Mask Your IP Address
    • Use a VPN (Virtual Private Network) or proxy server to mask your IP address and spoof your location.
    • We recommend using NordVPN for its ease of use and reliability.
    • Follow these steps to install and configure NordVPN:
      1. Visit NordVPN’s website and create an account.
      2. Download and install NordVPN on your devices.
      3. Connect to a VPN server from your preferred location.
  2. Flush DNS and Renew Your IP Address
    • Clear your DNS cache to ensure your computer obtains the latest IP address from Coinbase’s DNS server.
    • Renew your IP address through your device’s settings or command prompt.
    • Follow these steps for PC (Any Windows OS Computer) (please contact me directly at https://www.t.me/DigitalFoundation for one on one Consultation):

Step-by-Step Guide: Flush DNS and Renew Your IP Address

Step 1: Open Command Prompt

      • On Windows: Press the Windows key, type “cmd” in the search bar, then press Enter.
      • On Mac: Open Spotlight (Command + Space), type “Terminal,” then press Enter.

Step 2: Run Command Prompt as Administrator

      • Right-click on Command Prompt in the search results.
      • Select “Run as administrator” from the context menu.

Step 3: Enter Commands

      • In the Command Prompt window, type the following commands one by one, pressing Enter after each:
        • ipconfig /flushdns (This command clears the DNS resolver cache.)
        • ipconfig /release (This command releases your current IP address.)
        • ipconfig /renew (This command requests a new IP address from your DHCP server.)

Step 4: Confirm Success

      • Look for confirmation messages after each command.
      • You should see messages indicating successful flushing of the DNS resolver cache and renewal of your IP address.

Step 5: Close Command Prompt

      • Once you’ve completed the commands and confirmed success, you can close the Command Prompt window.


      • Flushing the DNS resolver cache and renewing your IP address can help resolve network connectivity issues and ensure that your computer has the latest IP address information.
      • These steps may vary slightly depending on your operating system. Always run Command Prompt with administrator privileges for these actions.

Mac/Apple Flushing DNS:


  1. Change Your Coinbase Location Settings
    • Before logging in to your Coinbase account, ensure NordVPN is running and connected to the preferred server location.
    • Log in to your account, go to “Privacy Settings,” and change your “Location/Region/Country” to match your VPN server.
    • Save the changes and you’re all set.

Can’t Change Your Coinbase Location Settings? Here’s What to Do

If you’re unable to change your region, location, or country on Coinbase’s account settings, you can contact Coinbase support for assistance. Follow these steps:

  • Connect to NordVPN and your preferred server.
  • Find the “Contact Us” or “Get in touch” page on Coinbase’s website here: https://help.coinbase.com/en-gb
  • Send a message to Coinbase support requesting a manual update of your physical location.
  • Wait for 24-48 hours for their response.

Other Methods to Hide Your IP Address and Location on Coinbase

In addition to using a VPN or proxy server, you can also consider using a neighbor or trusted friend’s Wi-Fi networks or proxy servers. However, keep in mind the security and privacy implications of these methods. If you are unsure or don’t know whether or not your Internet/Device/Computer is truly SECURE, take 2 minutes of your valuable time and go here to run a VPN and Browser Leak Scan: https://browserleaks.com/webrtc


VPN vs. Proxy vs. Public Wi-Fi: A Comparison

Here’s a comparison table outlining the key differences between using a VPN, proxy server, and public Wi-Fi to hide your IP address and change your location on Coinbase:


Features/Attributes VPN Proxy Server Public Wi-Fi
IP Address Masking Yes Yes Yes
Encryption Yes (High-level) No No
Geolocation Spoofing Yes Yes Partial
Ease of Setup Easy Moderate Easy
Speed Fast (depends on service) Moderate Varies (often slow)
Security High Low Very Low
Privacy High Low to Moderate Very Low
Access to Restricted Content Yes Yes Maybe
Consistency High Moderate Low
Cost Subscription Subscription or one-time fee Free
Legality & Compliance Generally Legal, some restrictions apply Generally Legal, some restrictions apply Legal

In summary, using a VPN offers the highest level of security and privacy, while proxy servers and public Wi-Fi networks may be less reliable. Choose the method that best suits your needs and always prioritize your online privacy and security.

By following these steps and tips, you can effectively hide your IP address and change your location on Coinbase, ensuring your online activities remain private and secure.


The information provided in this blog post is for educational purposes only. While we strive to provide accurate and up-to-date information, we cannot guarantee the effectiveness or suitability of the methods described.

By following the steps outlined in this guide, you acknowledge that neither any individuals affiliated with GeeksByTheHour nor its affiliates are responsible for any actions, events, or consequences that may occur as a result.

It is recommended to consult with a qualified IT professional or technician before performing any network-related actions on your computer. Always proceed with caution and at your own risk.

How To Track Anyone In The World Simply Using Any File!

How to Track Anyone’s IP using Images? — Email, QR Code, PDF, EXE, MS Word, MS Excel, & any file can be a “digital mouse trap”..

Supported Tokens: HTTP, DNS, Web Image, Cloned Website, Adobe PDF, MS Word, MS Excel, MySQL Dump, Windows Directory, Custom EXE, QR Code, Sensitive Command, SVN, AWS API Keys, Fast Redirect, Slow Redirect, SQL Server, and many more…

Follow DigitalFoundation on Telegram for more..

Greetings, World!

Today I’ll teach you how to track anyone’s IP using Transparent Images! Yeah..

We will first understand the whole concept then redirect towards the step by step usage guide. You can even do this manually using custom developed payloads but it’s a more better way to do this easily. I’ll help you with that today, by providing easy steps you can follow. Let’s start learning..

Understanding Canarytokens

Canarytokens are like digital traps for your computer systems. They work by watching for certain actions, such as someone reading a file, making a database query, running a process, or spotting specific patterns in log files. It’s similar to those tracking images in emails, but instead of tracking opens, it tracks actions on your system.

The cool thing is, we can use Canarytokens to set up these traps in our regular computer systems, kind of like putting alarms in different parts of your house where anything someone does can set off an “alarm” – or at least a notification.

Now, why should you bother with these Canarytokens? Well, sometimes hackers get into computer networks, and it happens to big companies, governments, regular people — basically, everyone. That part is understandable. But what’s not okay is only finding out about it way later, like months or even years down the line which seems disappointing!!

Canarytokens are a free, easy, and fast way to help you know right away if someone is messing around in your systems. It’s like the hackers accidentally letting you know they’re there.

  1. Web bug / URL token — Alert when a URL is visited
  2. DNS token — Alert when a hostname is requested
  3. AWS keys — Alert when AWS key is used
  4. Azure Login Certificate — Azure Service Principal certificate that alerts when used to login with.
  5. Sensitive command token — Alert when a suspicious Windows command is run
  6. Microsoft Word document — Get alerted when a document is opened in Microsoft Word
  7. Microsoft Excel document — Get alerted when a document is opened in Microsoft Excel
  8. Kubeconfig token — Alert when a Kubeconfig is used
  9. WireGuard VPN — Alert when a WireGuard VPN client config is used
  10. Cloned website — Trigger an alert when your website is cloned
  11. QR code — Generate a QR code for physical tokens
  12. MySQL dump — Get alerted when a MySQL dump is loaded
  13. Windows folder — Be notified when a Windows Folder is browsed in Windows Explorer
  14. Log4Shell — Alert when a log4j log line is vulnerable to CVE-2021–44228
  15. Fast redirect — Alert when a URL is visited, User is redirected
  16. Slow redirect — Alert when a URL is visited, User is redirected (More info is grabbed!)
  17. Custom image web bug — Alert when an image you uploaded is viewed
  18. Acrobat Reader PDF document — Get alerted when a PDF document is opened in Acrobat Reader
  19. Custom exe / binary — Fire an alert when an EXE or DLL is executed
  20. Microsoft SQL Server — Get alerted when MS SQL Server databases are accessed
  21. SVN — Alert when someone checks out an SVN repository
  22. Unique email address — Alert when an email is sent to a unique address

Step-by-Step Usage

Go to canarytokens.org & choose your Canarytoken. This is like setting up a digital trap. Provide an email where you want to be notified and a note to remind yourself where you placed it.


Generate a Canarytoken, which is a unique URL or Fast redirect or anything else – it is all your choice. It’s like creating a secret link that will trigger an alert if someone interacts with it. In this blog I’ll be using Fast redirect as an example.


Put the generated Canarytoken in a special location & send it to the target. It could be in an email, a document, or even as an embedded image. If a target arrives upon it, you’ll receive an email notification, alerting you that something is off – just like a mouse activating a mouse trap :–)

Clicked..Your Digital Mouse Trap Is Set!

Fast Redirect was really super fast.. Later I tried using URL shortener and surprisingly, our main URL was not even noticeable in real time..

If your target hits the URL/File, like shown in the example above, your token gets activated & alerted to email or webhook as below:

You can also rename the generated PDF/Excel/Word document without affecting its operation!

A Browser with No Advertisements or Duplicates? Yes and Welcome to Stract (Currently Beta Mode)

In this digital age of 2024 and beyond, information and data is needed as the air we breathe, the tools we use to sift through data should uplift, not undermine, our quest for knowledge.

Yet, here we are, navigating the choppy waters of search engines like Bing and Google, only to find ourselves awash in a sea of advertisements, our privacy eroded by relentless tracking, and our quest for truth skewed by biased algorithms.

Does that seem okay to you?

These platforms, once hailed as the lighthouses of the information age, now seem more like will-o’-the-wisps leading men to their deaths in murky bogs. Radicalization through search engine commercialization is actually a real problem. For everything that Google has claimed, it is fighting against such things, the work of non-biased researchers like Cory Doctorow and Rebecca Giblin have proven that these companies can’t ever fulfill their promises… not when they rely on radicalization to help line their shareholder’s wallets.

Folks – it is jut not Google (Alpha) that does this! Today we face a plethora of Social Media “trackers” and “data miners” that commercialize every step and action that you take online within their platform for full disclosure. This article is just sharing with you that browsers such as Google (and its email product called Gmail) tracks, profits, and commercializes everything that you do in it.

Enter Stract, a new lighthouse, one built with decentralization and open-source values in mind.

Stract: A New Open Source, customizable search engine.

This innovative search engine feels like a callback to an earlier Internet age, when our networks were meant to be part of a free, open-source ecosystem.

Now, to be clear, Stract is in early “Beta” stage. This simply means that it is lacking many “normal” features that are common in modern browsers. You will not be using it for your daily browsing quite yet (I recommend Vivaldi, Brave (which offers Staking Rewards as well) and DuckDuckGo for the time being). That said, it has WONDERFUL potential.

The top ten main features of Stract include:
  1. Open Source: Stract is entirely open-source, promoting transparency and community collaboration in its development and enhancement.
  2. Customization: The platform stands out for its high degree of customizability, allowing users to tailor their search…
  3. Advanced Search Capabilities: Stract offers advanced search capabilities, including Boolean operators, filters, and facets, empowering users to refine their searches with precision and efficiency.
  4. Natural Language Processing (NLP): Leveraging cutting-edge NLP algorithms, Stract understands and interprets natural language queries, ensuring accurate search results even for complex or ambiguous queries.
  5. Personalization: Stract employs sophisticated personalization algorithms to deliver tailored search results based on user preferences, search history, and behavior, enhancing the overall search experience and relevance of results.
  6. Scalability: Built on a scalable architecture, Stract seamlessly handles large volumes of data and user queries, ensuring fast and reliable search performance even as data volumes grow.
  7. Federated Search: Stract supports federated search capabilities, enabling users to search across multiple data sources and repositories from a single interface, eliminating the need to switch between different applications or platforms.
  8. Real-time Indexing: With real-time indexing capabilities, Stract ensures that new content is immediately available for search, providing users with up-to-date and relevant information at all times.
  9. Integration Options: Stract offers seamless integration with a wide range of third-party applications, databases, and content management systems, allowing users to leverage their existing infrastructure and workflows.
  10. Analytics and Insights: Stract provides powerful analytics and insights into search behavior, user interactions, and content usage, enabling organizations to gain valuable insights and optimize their search strategies for better performance and user satisfaction.
Overall, Stract offers a comprehensive and feature-rich search solution that EMPOWERS users to find relevant information quickly and efficiently. It is also the ideal choice for individuals and organizations seeking a powerful and 100% CUSTOMIZABLE search engine for their own needs, wishes, and goals. In summary, if you are familiar with technology and don't expect a full-blown Browser experience without a few minor speed bumps, it is highly recommended to check Stract out here: https://stract.com/about




Handling Nationwide Emergency Alerts on October 4, 2023

Individuals who rely on devices in all homes and residences should turn them off ahead of the national emergency alert test before October 4, 2023. Credit: Getty

On Oct. 4, at approximately 2:20 p.m. ET, cellular devices, televisions, and radio systems will ring out from a national emergency alert test designed to ensure the country’s mass communication services are in working order – and intended to be heard loud and clear by anyone nearby. 

Fortunately, device users looking to silence a hidden resource have time to prepare.

Many Americans will already be familiar with the blaring alarm noise and accompanying notification blasts pushed to their phones, known as Wireless Emergency Alerts (WEA), used by the Federal Communications Commission (FCC) in four types of critical emergency situations:

  1. “National Alerts” issued by the President of the United States or the Administrator of the Federal Emergency Management Agency (FEMA);
  2. “Imminent Threat” alerts involving imminent threats to safety or life;
  3. Amber Alerts” about missing children; and
  4. “Public Safety Messages” conveying recommendations for saving lives and property.

October’s test will utilize both WEA and the Emergency Alert System (EAS) for television and radio.

This isn’t the first national test of WEA, but it’s only the second time the alert will be sent to all U.S. cellphones. For most, it will be a brief blip in their day.

But for those in unsafe domestic circumstances, and other at-risk secondary device users, the alert could pose a larger problem, as an unexpected noise may alert abusers to the location of commonly-used hidden devices in the home.

Who might use a hidden device?

Globally, advocates have raised concerns about automatic, emergency alerts leading to discovery and retaliation. In April, the UK government alerted users to this potential risk after consultation with regional domestic abuse charities, many of which worried about the inadvertent consequences of such an alert.

Audace Garnett is the technology safety project manager at the National Network to End Domestic Violence (NNEDV), a national coalition working to address intimate partner violence. Originally founded in 1990 by domestic violence victim advocates, NNEDV was involved in the 1994 passage of the Violence Against Women Act, the first federal legislation to strengthen the government’s response to crimes perpetrated against survivors of domestic violence, sexual assault, dating violence, and stalking.

She says these tech considerations have become a central aspect to organizing against domestic violence and survivor advocacy. “Everywhere we look, everywhere that we go, technology is intertwined into our lives, whether it’s at the airport or the bus station or wherever we go,” explains Garnett. “Technology isn’t the problem, it’s the abuse. Technology is just one tool among many that are misused by abusers to exert power and control.”

Because of this, she explains, survivors of intimate partner violence and others at risk may use secondary, hidden devices for a variety of reasons.

“It acts as a lifeline that allows emergency communication with support networks or services when the survivor may be in danger,” Garnett says. “They can call 911 or reach out to someone they feel safe connecting with. Additionally, it safeguards their privacy, serving as an alternative means of communication. If their primary device is compromised, they can use it to make appointments, connect with their loved ones, talk to an advocate, join groups, and find resources to attend school. It can also allow survivors to document evidence of threats or incidents they could use to show that there’s a pattern of violence, if they’re interested in proceeding with a case.”

In addition to NNEDV, the National Domestic Violence Hotline also notes how life-preserving technology can simultaneously be used by abusers as a form of digital abuse, defined as “the use of technology and the Internet to bully, harass, stalk, intimidate, or control” a partner or loved one.

“As technology has evolved, cell phones have become increasingly embedded in our daily lives. This provides quick access to resources and information, but it can also give other people instant updates on your whereabouts, habits, and activities. Cell phones can be used to track your location and retrieve call and text history,” the organization writes.

Thus, having a hidden device is a calculated risk by those in need. “The decision to have a hidden device should always be made with careful consideration of a survivor’s circumstance and the potential risks involved. Having a hidden device is not for everyone,” Garnett explains. “In some situations, it may not be safe or advisable to have a hidden device, as its presence could escalate violence or lead to further harm.”

How will the emergency alert test impact users?

According to FEMA, the emergency alert will be broadcast in two parts, through the EAS on television and radio and then via WEA on cellphones.

Alerts can be issued within an approximately 30-minute timeframe starting at 2:20 p.m. ET. Once issued, the alert should last one minute, and all wireless phones should receive the message only once. It will affect all WEA-compatible wireless phones that are switched on, within range of an active cell tower, not on “airplane mode,” and whose wireless provider participates in WEA, the FCC explains.

Apple Watches with cellular data are also able to receive emergency, government, and public safety alerts in certain regions, according to Apple.

“Receiving an emergency alert could potentially alert an abuser to the presence of a hidden device, similar to an unscheduled phone call,” Garnett says, noting emergency notifications like Amber Alerts or Silver Alerts for missing adults happen frequently throughout the year. “If the hidden device is not on silent, or an alert goes off from an app or update on the phone, it may cause alarm and things may escalate as a result.”

Garnett advises users of hidden smart devices to turn off their emergency alert notifications for a layer of year-round protection. But for October’s test alert in particular, smart devices and pay-as-you-go phones should be turned off completely (this may mean removing its battery) before the broadcast time — or at any time an actual national emergency alert could pose risk.

National alerts — including emergency notices from the president and from FEMA, like the October WEA test — cannot be turned off by device users, in accordance with the Warning, Alert, and Response Network (WARN) Act. “Survivors should turn off their phones completely,” Garnett reiterates. “There are other types of emergency alerts that survivors’ phones may receive if they haven’t disabled them (and most people have not), such as emergency weather alerts and Amber Alerts… Unlike a WEA test, these alerts are not announced ahead of time, making it even more advisable for survivors to have their hidden phones powered off when not actively using them.”

Some participating wireless carriers may offer the ability to block other, non-national alerts, such as those involving imminent threats to safety and Amber Alerts, the New York Times reports.

“For survivors that do have a hidden device, the decision to power off emergency or hidden phones when not in use is a strategic step to safeguard their safety to protect their privacy and preserve their confidentiality,” Garnett explains.

How to turn off specific emergency alerts for Apple users

While the FCC strongly urges the public to stay opted in to receive all emergency notifications, at-risk users looking to silence certain alerts on secondary devices can adjust their settings.

For iPhones running iOS 16:

  1. Go to your iPhone’s Settings menu.
  2. Select Notifications.
  3. Scroll to the bottom of the screen to the Government Alerts section.
  4. Users can turn various types of alerts on or off, including whether or not you’d like emergency alerts to issue a sound.
A screenshot of the iPhone settings menu.

The settings menu on an iPhone 12 running iOS 16. Credit: Apple
A screenshot of the iPhone notifications settings.

Credit: Apple
A screenshot of the iPhone settings for emergency alerts.
Credit: Apple

How to turn off specific emergency alerts for Android users

For Google devices running Android 13:

  1. Open the Settings menu.
  2. Select Safety & emergency.
  3. Scroll to Wireless emergency alerts.
  4. Users can turn various types of alerts on or off, including non-national WEA test alerts.
A screenshot of the Galaxy phone settings menu.

The settings menu on a Galaxy S20 running Android 13. Credit: Samsung/ Android
A screenshot of the Galaxy Safety and emergency settings menu.

Credit: Samsung/ Android
A screenshot of the Galaxy wireless emergency alerts settings.

The wireless emergency alerts menu on a Galaxy S20 running Android 13. Credit: Samsung/ Android
Another screenshot of the Galaxy wireless emergency alerts settings.

Credit: Samsung / Android

What else should users know?

Actual emergency alerts will continue long after the test, so at-risk users should be careful to power down hidden devices and be aware of additional, year-round precautions for keeping secondary technology.

Additionally, if the government issues an actual emergency alert on Oct. 4, the WEA test will still proceed at the same time on Oct. 11, FEMA explains.

Garnett suggests at-risk users consult additional technology resources available from NNEDV, including:

The National Domestic Violence Hotline suggests those with iPhones running iOS 16 or later look into Apple’s Safety Check. Safety Check allows users to quickly change sharing and access permissions on a device. “Safety Check allows survivors to check sharing privacy concerns related to their iPhones by giving them an easy way to view and update the information shared and data gathered from apps, networks, features, as well as the contacts in an iPhone that have access to specific data,” the hotline explains.

The organization offers additional survivor and technology safety resources, as well:

“Survivors have a right to technology,” Garnett says. “Oftentimes, when a survivor speaks out or seeks help, people will tell them to get rid of cellphones, social media, or to get off of the platforms and technology they are using. That is unfair. We need to figure out more ways to make a user accountable for the harm that they’re causing because survivors cannot avoid technology.”

2023 Metamask Security Tips and Tricks: Keeping Your Cryptocurrency Safe

Cryptocurrency has surged into the mainstream in recent years, with the advent of blockchain technology and digital wallets like Metamask making it easier than ever to store and trade currency. But convenience isn’t the only reason many people have made the switch: security is a major benefit for many users as well. While Metamask is one of the most secure wallets available, it’s also important to know how to keep your funds safe from malicious actors. Here are the best updated Cybersecurity Tips & Tricks for 2023 Metamask!

The rise in crypto thefts and scams just in the last 3 years means that it is more important than ever to take measures to secure your funds – especially taking SELF-CUSTODY of your crypto via a cold hard wallet. It can be difficult to know where to start, but luckily there are some simple steps you can take to ensure that your finances are as safe as possible. Whether you’re a novice investor or an experienced trader, knowing the basics of Metamask security can help give you peace of mind when it comes to storing your cryptocurrency. With the right precautions and understanding, you can take proactive steps to protect your digital assets, knowing they’re safe from unwanted third parties.

So let’s get started. In this blog post, I’m going to break down 2023 Metamask security tips and tricks to help you stay safe when storing and trading crypto. We’ll cover topics such as strategies for securing your account, detecting potential scams, and even the pros and cons of different wallet types. With these tips and tricks in hand, you’ll be ready to confidently navigate the world of cryptocurrency safely in 2023 and beyond.


MetaMask is easily one of the best crypto wallets that you can find out there. It is funded by Ethereum and can be installed in the browser like any other plugin you can use. It allows users to store Ether and other ERC-20 tokens, which allows users to make seamless transactions. It can be found here: https://metamask.io

The first step is making sure you are using a CLEAN and SAFE Computer/Device before you begin using anything dealing with crypto. SkyTheTechGuy can provide you with a free diagnostic and analysis to double-check your assumption –> that your network/computer/device is safe, secure, and prepared for MetaMask or any other crypto program. Help@GeeksByTheHour.com or

With a lot of crypto wallets to choose from, you can be sure to get a lot of recommendations from the experts. MetaMask, however, is one of the safest picks for ETH storage. Users can have seamless transactions in spending coins in games, staking tokens, and even trading.

So far, MetaMask has gained a huge following from various ETH users all over the world. As they continue to provide users with an entry point into the emerging world of decentralized finance, any ‘MetaMask explained‘ articles would be helpful to those who want to invest in ETH.

MetaMask is one of the top wallets that you can use for your investments, and it offers some of the best services that you can enjoy as a crypto enthusiast. That says a lot about the way it can be a good pick for those who are keen to use ETH.

I. MetaMask Is An Efficient Wallet

MetaMask was founded by ConsenSys in 2016 just as an extension on desktop computers but later grew to be a full experience for a lot of users and even has a mobile application for everyone to use.

This app can be downloaded on iOS and Android devices. It is also available on the Google Chrome browser, Mozilla Firefox browser, Brave Browser as well as on Microsoft Edge. This makes it one of the wallets that can be accessed from almost any device everywhere.

II. Why MetaMask?

MetaMask was designed with a lot of new features that gives a lot of convenience in dealing with crypto. The wallet has recently designed a feature that allows swapping of ETH tokens on the app – which was formerly available by connecting to other exchanges such as Uniswap.

This made it easy with the third party app now taken out of the picture. The feature scours well through the DeFi landscape to offer the trader with the best deals at lower fees. On top of that, the wallet also offers integration with hardware wallets such as Ledger Nano and offers boosted security for fund storage.

III. *There are a lot of benefits in using MetaMask*

MetaMask offers a wide array of benefits that you would love in a crypto wallet. After all, crypto is a secure currency itself, but then you should know that MetaMask itself is a strong wallet that offers stability for users in the long run.
  • Availability 

MetaMask is useful when it comes to the easy access that people can make use of. With a number of available downloads for the app, you can say that it is clearly a huge benefit even if you change devices and so on. That says a lot about the way you can use it with no hassle compared to other wallets.

  • Popularity

MetaMask is a popular wallet that you can use with ease. It is popular among many users thanks to its amazing features. As one of the best open source wallets, it is a rare breed among other wallets out there, and it shows a lot of progress for a reliable storage in crypto.

  • Security

With the encryption, password, Secret Backup phrase and many other details, MetaMask’s detail on security is on point, and a lot of people would be thrilled to use it knowing they don’t have to worry about being hacked and so on.

On top of that, MetaMask’s lack of control on your private key means that they will not access your crypto on their own. This means that it is also harder to hack and secure to keep your crypto on for good.

  • Ethereum support

MetaMask’s connection to ETH makes it clear that you have a link to the second largest blockchain in the world. This means that MetaMask supports other Ethereum-based tokens and it immediately adds value to this wallet as well.

  • Ease of access

MetaMask is easy to use. If you look for any ‘MetaMask explained’ articles, you can read the fact that the wallet is one of the user-friendly wallets that you can find online. This is what makes MetaMask dominant among many other wallets that offer various services just like it.

None of the information on this website is investment or financial advice and does not necessarily reflect the views of SkyTheTechGuy, LLC or the author. SkyTheTechGuy,LLC is not responsible for any financial losses sustained by acting on information provided on this website by its authors or clients. Always conduct your research before making financial commitments, especially with third-party reviews, presales, and other opportunities. This information provided is for educational use only and should not be relied upon for any financial or investment advise or purpose.