How Everyday Users Try to Hide Digital Evidence—and Why It Fails

Date: 23/08/2025

Most offenders are far from professionals, so the ways they hide data are usually pretty naive. Yet these methods often work—not because they’re clever, but because investigators may lack the time or expertise to do a thorough analysis. So what tricks do the average John and Mary use to conceal evidence? The toolkit is small, and the tricks themselves are fairly unsophisticated.
Read full article →


How to Choose and Set Up an ESP8266 Wi‑Fi Deauther

Date: 22/08/2025

A Wi‑Fi jammer is a gadget designed to knock wireless devices off a hotspot. Why would anyone need that? Think of it as a prank (your neighbor will be thrilled when you cut off his porn video or, say, a soccer match at the most exciting moment), but it also has criminal uses: an attacker could take surveillance cameras or other critical equipment offline. In this article, we’ll cover low-cost hardware deauthers (deauthentication devices), how to use them, and how to protect against such attacks.
Read full article →