On top of that, enable MAC address filtering on your Wi-Fi unit, set it to default DENY, and then manually enter the MAC addresses of the devices you actually want to allow on your wireless network. It takes a bit of work to set up, but it is a great way to add yet another layer of security (combined with other safeguards).
From what Iâve been able to lookup this only works to opt-out from Google mapping:
The â_nomapâ part exempts your wireless access point from Google Location Services (GLS) access point mapping â a map of all detected Wi-Fi signals from all those Google Street View cars driving through your neighborhood. Your SSID must end with â_nomapâ to be exempted. Source
You can disable broadcasting ESSID on every access point. That wonât secure your network though.
Yes this will only help hide your device from your physical distance to the scanning device. This by itself doesnât do much but combined with other sec protocols can help.
If you want true email security, the only solution is to run your own email server. Why do you think itâs such a hot button issue politically in the US with both sides doing it then pointing out how bad it is the other side did the same thing?
I run high volume mail servers. Itâs not hard if you have a Linux/Unix and Internet background.
LetsEncrypt is free SSL certificates that renew every 90 days. Having anything that doesnât expire/renew after a period of time is a terrible idea. There are clients that make renewing âautomaticallyâ a little bit more easier.
The easiest way to run a mail server would be rent/colocate a server, which a cheap virtual server works just as well depending on your requirements, then installing a few different options like Zimbra or iRedMail which offers easier installation. I use a web UI on a Linux platform of nginx, postfix, sendmail, spamassassin, and a few custom scripts like blocking spammers from third party lists.
As somebody who runs email services, people must put a lot of trust in their email providers who charge either nothing or a few dollars then think theyâre going to defend them in a costly court battle when Iâve handed over information to LE per company policy at past companies I worked for with little more than a LE letterhead- no court order. We didnât really respond to foreign requests but if it came from the US my boss basically said âis it worth going to court over?â which generally meant no.
Itâs common across âbig nameâ providers. I have an angle which is a business of mine and I canât go into more detail of how it works for me versus how it wonât work for 99% of everybody else. You need minimal resources for email hosting. It all has to deal with your experience in resource management of limited resources and your ability to optimize.
The company who I mainly manage their email, I have no obligation to monitor their activity or retain any information for a set amount of time like some countries nor does the provider I use have to do by their countryâs laws. Theyâre a business with email that cannot crash, go down or have deliverability issues so they pay well for this.
Since ProtonMail was mentioned- their angle is self-hosted data centers including the actual network running into the facility. Swiss law requires notification of surveillance targets and an appeal in court is allowed so thatâs an angle if you went with a Swiss hosting provider who also managed their own network.
Network blend is essential- you can be hosted on the moon and think youâre invincible. You might be right that nobody can kick in your door like CyberBunker (spoiler: they were taken down) but the problem is you have a US/UK/Australian network link to your moon facility and LE or court just asked them to cut you off. Youâre cut off. Thatâs why Sealand, the offshore facility, never worked. Thatâs why there will never truly be an âindependentâ online platform. A network carrier in a network blend can block any site they want or throttle traffic to it. We see it all the time. Maybe the network carrier is state ran, which happens.