Data Breach Today, Your Problem Tomorrow: Why Victims Deserve More Than Apologies
When your data is stolen in a breach, the company gets fined, but you’re left picking up the pieces. This blog explores the need for a Digital FSCS: a restitution fund for breach victims, inspired by real-world failures and systemic neglect. Includes a free template letter you can send to your MP to call for change.
Why Are Scam Emails Getting So Weird?
Tired of clumsy, obviously fake emails pretending to be from the DVLA, NHS, or HMRC? You’re not alone. A new wave of scam emails, mass-produced by cheap AI kits and spam tools, is hitting inboxes everywhere. Here’s how to spot these “sloppy phish,” why they’re a risk to everyone (especially vulnerable users), and what to do when you see one.
When Your AI Becomes Your ID
As AI moves from assisting us to authenticating us, our digital identity becomes both more convenient and more vulnerable. This article explores the promise and peril of AI-powered identity providers, and asks: what happens when your digital assistant becomes the only key to your online life?
From Ciphertext to Seaside: Cracking RSA with Pen and Python
A hands-on RSA cryptography walkthrough ... from toy examples to real-world puzzle solving using Fermat’s factorisation. Learn how a weak key and some clever maths reveal a hidden English town.
We Deserve Better Than Postcards in Cyberspace
Despite years of data protection law and awareness campaigns, organisations still ask people to send highly sensitive documents via insecure email. This post challenges that norm, shares personal experiences, and empowers consumers with a practical checklist and their rights under UK GDPR.
🏥 When Trust Gets Hacked, What the M&S Breach Tells Us About Modern Retail Risk
In the wake of the M&S data breach, it’s clear retailers are still collecting excessive personal data while offering little accountability when things go wrong. This post explores the real risk to consumers, regulatory shortcomings, and why it's time for a digital FSCS-style safety net.
Caller ID Is Dying. Long Live Caller ID. (Plain English Version)
The number on your screen might not be who you think it is. Caller ID can be faked — and increasingly is. This plain-English guide explains how spoofing works, what a SIM swap is, and what steps you can take to stay safe without needing to be a tech expert.
Data Fines Aren’t Justice — They’re Just High-Stakes Monopoly Money
Despite record-breaking fines against tech giants for data misuse, individuals rarely see justice. This post explores the systemic failure of regulatory enforcement to provide restitution, arguing it's time for compensation schemes, opt-out tools, and support for the real victims of data breaches.
One Password to Rule Them All? Why That’s a Terrible Idea in 2025
Still using the same password everywhere? In 2025, that habit could open the door to your entire digital life. This post breaks down why password reuse is so risky, how breaches actually happen, and what simple steps you can take to stay safe—without needing to be technical.
