<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Brian Olson – Real Security, Real Talk]]></title><description><![CDATA[Practical security and finance advice from a DFIR practitioner who'd rather share what works than write another whitepaper. Short reads, real experience, no BS. ]]></description><link>https://www.hurrikane.net</link><image><url>https://cdn.hashnode.com/uploads/logos/68aa6f21f8782a55b8a9c4c7/d46d11cd-a34f-4af9-a6be-787849b781cf.png</url><title>Brian Olson – Real Security, Real Talk</title><link>https://www.hurrikane.net</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 11 Apr 2026 03:12:32 GMT</lastBuildDate><atom:link href="https://www.hurrikane.net/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[The Security Stack I'd Build From Scratch in 2026]]></title><description><![CDATA[I need to be upfront about something before we get into this: I have tried to self-host my own infrastructure more times than I can count. And every single time, I've eventually gone back to SaaS.
Not]]></description><link>https://www.hurrikane.net/the-security-stack-i-d-build-from-scratch-in-2026</link><guid isPermaLink="true">https://www.hurrikane.net/the-security-stack-i-d-build-from-scratch-in-2026</guid><category><![CDATA[self-hosted]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[Docker]]></category><category><![CDATA[Devops]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Fri, 03 Apr 2026 14:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68aa6f21f8782a55b8a9c4c7/e45223cc-4324-4105-bfb2-b9b15961d166.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I need to be upfront about something before we get into this: I have tried to self-host my own infrastructure more times than I can count. And every single time, I've eventually gone back to SaaS.</p>
<p>Not because I don't know what to build. Not because I lack the skills. I've spent eighteen years in DFIR and security engineering. Intelligence community, top-tier IR firms, Fortune 500s. I've seen some things. I teach forensics at SANS. I can architect a defense-in-depth stack in my sleep. The problem has never been the <em>what</em>. It's always been the <em>keeping it running</em>.</p>
<p>Something breaks on a Tuesday night while you're in some random city teaching a class or on vacation with your family. A container update conflicts with another service. A disk fills up because I forgot to set up log rotation on that one thing. A certificate renewal fails silently and I don't notice for three days. Each time, I tell myself I'll build better automation or better monitoring. And each time, the maintenance overhead slowly wins the war of attrition until I'm back on Google Workspace and 1password and telling myself "at least it just works."</p>
<p>So this post is a bit of a contradiction. It's the security stack I <em>would</em> build from scratch in 2026, written by someone who has repeatedly failed to keep that stack alive long-term. I think that tension is actually the most honest and useful thing I can share. Because if you're reading this and nodding along, you're probably in the same boat.</p>
<p>The architecture isn't the hard part. It never was.</p>
<h2>The Design Principles</h2>
<p>Every tool in this stack earns its place by satisfying at least two of three criteria:</p>
<p>It reduces my attack surface, not just monitors it. It operates with minimal ongoing maintenance (because a security tool you stop updating is worse than no tool at all). Or it gives me visibility I wouldn't otherwise have.</p>
<p>If a tool only does one of these things, it needs to be exceptional at it. If it does none, it's bloat.</p>
<p>The other principle I hold sacred: every layer assumes the layer above it has already been compromised. My firewall rules assume my reverse proxy is owned. My application authentication assumes my network perimeter is breached. My encryption assumes my filesystem is exposed. That's not paranoia. It's how I've watched real breaches propagate for nearly two decades.</p>
<p>And the third principle, the one I've learned the hard way: if you can't maintain it, it will eventually become a liability instead of an asset. I'll come back to this.</p>
<h2>Layer 0: OS and Access Control</h2>
<p>Everything starts here, and most people get it wrong by overthinking it.</p>
<p><strong>Ubuntu Server LTS</strong> on a reputable VPS provider with full-disk encryption. I know the Debian purists will come for me, but Ubuntu's update cadence, LTS support windows, and ecosystem breadth make it the pragmatic choice for a stack you need to <em>maintain</em>, not just deploy.</p>
<p><strong>SSH hardened properly.</strong> Key-only authentication, non-standard port (yes, it's security through obscurity, and yes, it still eliminates 99% of automated scanning noise), and <code>AllowUsers</code> restricted to named accounts. No root login. Ever. If you're still using password-based SSH authentication in 2026, we need to have a different conversation.</p>
<p><strong>Unattended-upgrades</strong> enabled for security patches. I've seen too many self-hosted setups where the operator deployed a beautiful stack and then never patched it again. Automatic security updates aren't optional. They're table stakes. This is also, honestly, one of the few parts of the stack that actually takes care of itself once you set it up. Treasure that.</p>
<h2>Layer 1: Network Perimeter</h2>
<p><strong>Tailscale</strong> for remote access. I've <a href="https://www.hurrikane.net/the-hidden-dangers-of-commercial-vpns-why-private-solutions-like-tailscale-are-the-future-d22f7cb3404b">written about why commercial VPNs are a problem</a>, and Tailscale is the answer I landed on. It's built on WireGuard under the hood, so you get the small codebase and fast handshakes, but wrapped in a mesh networking layer that handles key management, NAT traversal, and device auth without you having to think about it. No port forwarding. No manual config files. No fiddling with peer connections when you should be sleeping. It just works, which as you've gathered by now is the thing I value most.</p>
<p><strong>CrowdSec</strong> as the first active defense layer. This is where I'd part ways with a lot of self-hosting guides that still recommend Fail2Ban. Look, Fail2Ban is a fine tool that served the community well for two decades, and I'm not here to trash it. But it's fundamentally reactive and isolated. Your Fail2Ban instance only knows about attacks it has personally witnessed.</p>
<p>CrowdSec operates on the same log-parsing principles but adds two capabilities that change the calculus. First, crowd-sourced threat intelligence: your instance benefits from attacks seen across the entire CrowdSec network, so you can block known-bad IPs before they ever knock on your door. Second, a distributed architecture where detection and remediation can be split across machines. For a single-server setup the crowd intelligence alone justifies the switch.</p>
<p>Pair it with the <strong>CrowdSec firewall bouncer</strong> for nftables-level blocking and, if you're using Cloudflare, the <strong>Cloudflare bouncer</strong> to push blocks to the edge before traffic even reaches your server.</p>
<p><strong>UFW</strong> with a default-deny posture. Only the ports you explicitly need are open. I'm amazed how many self-hosted setups I've reviewed where Docker's default behavior of bypassing UFW rules wasn't accounted for. If you're running Docker, you need to set <code>DOCKER_IPTABLES=false</code> or use Docker's <code>--iptables=false</code> flag and manually manage your port exposure. This is one of the most common misconfigurations I see.</p>
<h2>Layer 2: Reverse Proxy and TLS</h2>
<p><strong>Traefik</strong> as the reverse proxy and automatic TLS termination point. I've used Nginx Proxy Manager, Caddy, and raw Nginx configs over the years across various attempts at this. Traefik wins for Docker-native environments because it discovers services via container labels. No manual config file editing when you add or remove services. Automatic Let's Encrypt certificate provisioning and renewal. Middleware chains for rate limiting, IP whitelisting, and header manipulation.</p>
<p>One critical detail: every service behind Traefik gets its own subdomain, and nothing is exposed on a path prefix. <code>vault.yourdomain.com</code>, not <code>yourdomain.com/vault</code>. This gives you per-service TLS certificates, cleaner access control, and easier log analysis. It also makes life significantly simpler when you want to lock down or move an individual service later.</p>
<p>Traefik is also, I should note, one of the things that has gotten dramatically easier since my earlier attempts. The v2/v3 config model with Docker labels is night and day compared to where this ecosystem was three or four years ago.</p>
<h2>Layer 3: DNS</h2>
<p><strong>AdGuard Home</strong> for DNS-level filtering and visibility. Pi-hole is the more famous choice, but AdGuard Home has native DNS-over-HTTPS and DNS-over-TLS support, a cleaner interface, and better handling of encrypted DNS clients. More importantly for our purposes, it gives you a DNS query log that is incredibly useful for security monitoring. You'd be surprised how much you can learn about what's happening on your network just by watching DNS queries.</p>
<p>Upstream resolvers pointed at <strong>ControlD</strong>, which I've <a href="https://www.hurrikane.net/enhancing-home-network-security-with-controld-a-comprehensive-guide-to-dns-home-72408c10c768">written about in detail</a>. It blocks known-malicious domains at the resolver level, supports category-based filtering for blocking entire classes of risky domains without maintaining manual blocklists, and gives you granular per-device policies if you want them. Another layer of protection that costs almost nothing to maintain once it's configured.</p>
<h2>Layer 4: Secrets and Identity</h2>
<p>This is the layer most self-hosters skip, and it's the layer that matters most.</p>
<p><strong>Vaultwarden</strong> for password management. It's a community-built Rust implementation of the Bitwarden server that's fully compatible with all official Bitwarden clients. The official Bitwarden server requires 2+ GB of RAM and runs multiple heavy services. Vaultwarden does the same job in about 128 MB. For a self-hosted stack where resources matter, this is a no-brainer. Put it behind Traefik with its own subdomain, enforce HTTPS-only, and disable open registration immediately after creating your account.</p>
<p>I'll also say this: Vaultwarden is one of the services I've come closest to keeping self-hosted permanently. It's stable, it's lightweight, and the Bitwarden clients are excellent. If I were going to self-host exactly one thing and leave everything else on SaaS, this might be it.</p>
<p><strong>Authelia</strong> for single sign-on and multi-factor authentication across all services. Without centralized authentication, every service is its own identity silo with its own password, its own session management, and its own attack surface. Authelia sits in front of Traefik as a forward-auth middleware and gives you TOTP-based MFA, WebAuthn/FIDO2 support, and granular access policies per subdomain. One login, one MFA challenge, access to everything you're authorized for.</p>
<p>If you're running five or more services (and you will be), Authelia is the single biggest quality-of-life and security improvement you can make.</p>
<h2>Layer 5: Monitoring and Visibility</h2>
<p>You can't defend what you can't see.</p>
<p><strong>Uptime Kuma</strong> for service availability monitoring. Lightweight, self-hosted, and genuinely beautiful. It monitors HTTP endpoints, TCP ports, DNS resolution, and Docker containers. Push notifications to your phone when something goes down. I mentioned this in my <a href="https://www.hurrikane.net/why-self-hosting-matters-more-than-ever-in-2026">self-hosting post</a> as a five-minute deploy, and I stand by that.</p>
<p><strong>Wazuh</strong> for security event monitoring if you want a full SIEM experience. I'll be honest: Wazuh is the heaviest component in this stack and the one most likely to feel like overkill for a personal setup. But if you're running services that handle real data for real people, having file integrity monitoring, log aggregation, and vulnerability detection in one platform is worth the resource cost.</p>
<p>For those who want visibility without the SIEM weight, <strong>Grafana + Prometheus + node_exporter</strong> gives you system-level metrics, and <strong>Loki</strong> handles centralized log aggregation. Lighter footprint, less out-of-the-box security context, but still infinitely better than SSH-ing into your box and tailing log files every time something feels off.</p>
<h2>Layer 6: Backups</h2>
<p>The layer everyone forgets until it's too late.</p>
<p><strong>Restic</strong> for encrypted, deduplicated backups to an off-site destination. I back up to Cloudflare R2 with append-only credentials so that even if my server is fully compromised, the attacker can't delete my backup history. R2 also has zero egress fees, which matters a lot more than you think until the day you actually need to restore.</p>
<p>The strategy is simple: daily automated backups of all Docker volumes, all configuration files, and the host's <code>/etc</code> directory. Retention: 7 daily, 4 weekly, 6 monthly. And I test restores quarterly. A backup you've never restored from is a hypothesis, not a strategy.</p>
<h2>What I Intentionally Left Out</h2>
<p>No Kubernetes. No Ansible playbooks. No Terraform modules. Not because these tools aren't valuable (they absolutely are in the right context), but because for a single-server or small-cluster self-hosted stack, they add complexity that doesn't pay for itself. Every layer of abstraction is a layer you have to understand when something breaks in the middle of the night.</p>
<p>I also didn't include a WAF. For a self-hosted stack where you control every application behind the reverse proxy, a well-configured Traefik instance with rate limiting and CrowdSec integration gives you most of what a traditional WAF provides without the tuning overhead. If you're exposing third-party applications with known vulnerability patterns, revisit this decision. But for this stack? The juice isn't worth the squeeze.</p>
<h2>The Part Nobody Talks About</h2>
<p>Here's where I stop being the architect and start being honest.</p>
<p>I can deploy everything above in a weekend. I've done it. Multiple times. And with Claude you can knock this out in less than an hour. The initial setup is almost the fun part. You're in the zone, containers are coming up, Traefik is issuing certs, Uptime Kuma is lighting up green across the board. It feels great.</p>
<p>Then week three happens. Or month two. You get busy at work. A container update introduces a breaking change and you don't have time to debug it that night. Your monitoring alerts you about a disk usage warning but you snooze it because you're in the middle of something. Slowly, the entropy accumulates. Services start drifting. You're not sure which compose files match what's actually running. And one day you realize you've spent your Saturday morning doing ops work instead of literally anything else, and you ask yourself why you're not just paying $20/month for someone else to deal with this.</p>
<p>I know this cycle intimately because I've lived it over and over. The "awesome self-hosted" lists never tell you about this part. They show you the architecture diagram and the <code>docker-compose up -d</code> and then leave you alone with the ongoing reality of actually operating infrastructure.</p>
<p>I spend roughly 30 minutes per week when things are going well. But things don't always go well, and the spikes are what kill you. A single bad update can eat an entire evening. And if you let maintenance slide for a few weeks, the catch-up cost grows nonlinearly.</p>
<p>That's the real cost of self-hosting. Not the hardware, not the bandwidth, not the initial setup. It's the ongoing commitment to actually maintaining what you built. If you're not willing to make that commitment, a well-chosen SaaS provider with strong security practices is genuinely the better choice. I said the same thing in my <a href="https://www.hurrikane.net/why-self-hosting-matters-more-than-ever-in-2026">self-hosting post</a> and I mean it more now than when I wrote it, because I'm the living example.</p>
<h2>So Why Write This Post?</h2>
<p>Because I keep coming back. That's the part that won't let me go. Every time I retreat to SaaS, I last about six months before the privacy itch starts again, or I read about another breach, or I see my credit card statement and do the math on what I'm paying for services I could run myself. And I start spinning up containers again.</p>
<p>Everything I wrote in <a href="https://www.hurrikane.net/why-self-hosting-matters-more-than-ever-in-2026">Why Self-Hosting Matters</a> is still true. The reasons haven't changed. I haven't changed. I just keep hoping that <em>this time</em> I'll figure out how to make it stick.</p>
<p>Maybe writing it down helps. Maybe if I'm more deliberate about the stack choices upfront, more realistic about the maintenance budget, more disciplined about not over-scoping on day one, the outcome will be different. Or maybe I'll be back on Gmail by August. I honestly don't know.</p>
<p>But I do know the architecture above is sound. And if you're someone who's been through this same cycle, at least you know you're not alone.</p>
<hr />
<p><em>Am I the only one stuck in this loop? I'd genuinely love to hear from people who've made self-hosting stick long-term. What's your secret? Because I clearly haven't figured it out yet. Drop a comment.</em></p>
]]></content:encoded></item><item><title><![CDATA[What's in a Name: DNS as a Detection Goldmine]]></title><description><![CDATA[I love DNS. I know that's a weird thing to say, but I've been doing DFIR and detection engineering for close to two decades, and no single protocol has given me more signal per dollar invested than DN]]></description><link>https://www.hurrikane.net/whats-in-a-name-dns-detection</link><guid isPermaLink="true">https://www.hurrikane.net/whats-in-a-name-dns-detection</guid><category><![CDATA[dns]]></category><category><![CDATA[detection engineering ]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[ThreatDetection]]></category><category><![CDATA[Threat Hunting]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Mon, 30 Mar 2026 14:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68aa6f21f8782a55b8a9c4c7/ddcaea3d-5f6f-4c60-9ff8-90bcd60518b1.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I love DNS. I know that's a weird thing to say, but I've been doing DFIR and detection engineering for close to two decades, and no single protocol has given me more signal per dollar invested than DNS. It's everywhere, it's readable, and most adversaries can't avoid it. Malware needs to phone home. Phishing needs a domain. Data exfiltration needs a channel. And almost all of it touches DNS at some point.</p>
<p>This post is adapted from a talk I've given at several security conferences. The goal isn't to make you a DNS expert — it's to convince you that if you're not building detections around DNS today, you're leaving some of the easiest wins in security on the table.</p>
<hr />
<h2>Why DNS Detections Matter</h2>
<p>DNS is a pointer system. It translates friendly names to IP addresses, and nearly every piece of software on your network uses it — including malware. That's what makes it so useful from a detection standpoint: it gives you context that raw IP addresses never will.</p>
<p>Consider a netflow log that shows a host connecting to <code>1.2.3.4</code> over TCP/443 and transferring 1.2 MB. Is that suspicious? You have no idea. Now enrich that with DNS and you know the host resolved <code>evil.org</code> to <code>1.2.3.4</code> right before that connection. Completely different picture.</p>
<p>DNS touches three of the most critical phases of an attack: initial access (phishing domains, typosquatting), command and control (C2 beaconing, DNS tunneling), and data exfiltration (encoded data stuffed into subdomains or TXT records). If you can see DNS, you can see a lot of the kill chain.</p>
<hr />
<h2>Step Zero: Get the Data</h2>
<p>None of this works if you can't see DNS traffic. Before you build a single detection, you need to control the signal.</p>
<p><strong>Force internal resolver use.</strong> Block port 53 at your perimeter for everything except your internal DNS servers. If clients can reach external resolvers directly, you're blind. Disable DNS-over-HTTPS (DoH) where possible — it's a privacy feature that also happens to be a visibility killer for defenders.</p>
<p><strong>Don't outsource your DNS.</strong> If you hand your DNS resolution to a third party and don't have access to the query logs, you've traded away one of the most valuable data sources in security. The exception is if your provider gives you full access to the data and control over policy — some do, most don't.</p>
<p><strong>Log everything — and consider duplicating.</strong> DNS server logs, network captures at the perimeter, passive DNS collection — the more vantage points, the better. Ideally, I want duplicate data sets: logs from the DNS servers <em>and</em> from network taps. If one source drops packets or has a gap, the other catches it. 100% coverage matters here because a single missed resolution could be the one that tells you an endpoint just talked to C2.</p>
<p>Zeek deserves a special mention. It's very near and dear to my heart — it logs DNS alongside dozens of other protocols, so you can pivot from a suspicious DNS query straight into the associated HTTP, TLS, or file transfer session. Even if traffic is encrypted, you often get the domain from the TLS handshake. That cross-protocol visibility is something standalone DNS logging can't give you.</p>
<p><strong>For the home lab crowd:</strong> ControlD is what I use for upstream DNS with filtering and analytics built in. Pi-hole is another popular option if you want to run your own resolver on a Raspberry Pi. Either way, implementation is straightforward — update your DHCP options or default gateway DNS settings and you're capturing.</p>
<hr />
<h2>Control the Pointer</h2>
<p>Once you own DNS resolution, you can do more than observe — you can redirect. Sinkholing is one of the most underrated defensive capabilities available:</p>
<p><strong>Sinkhole known malicious domains.</strong> Feed threat intelligence into your resolver and point known-bad domains at a controlled IP. The endpoint still tries to connect, but it reaches your sinkhole instead of the adversary's infrastructure. You get the alert; they get nothing.</p>
<p><strong>Redirect for policy enforcement.</strong> Internal wiki pages, malware sandbox submissions, automatic isolation workflows — DNS gives you a control point that's fast and easy to update. Changing where a domain points takes seconds. Changing firewall rules across a fleet takes considerably longer.</p>
<hr />
<h2>Detections That Actually Work</h2>
<p>Here's where it gets practical. These are the DNS-based detections I've found most valuable, roughly ordered from easiest to implement to most complex.</p>
<h3>Newly Registered Domains</h3>
<p>This is the single easiest high-value DNS detection you can build. A domain that was registered in the last two weeks and is now being queried by hosts in your network is suspicious about 99% of the time. Legitimate services don't spin up brand-new domains and immediately start receiving traffic from enterprise networks.</p>
<p>The catch: it can be surprisingly noisy. Advertisers seem to register and burn through domains at an absurd rate, presumably to stay ahead of blocklists. You'll need some tuning, but the signal-to-noise ratio is still excellent. I'd recommend blocking newly registered domains outright if your environment can tolerate it.</p>
<h3>Newly Observed Domains</h3>
<p>Different from newly registered, and in some ways more resilient as a detection. This is about when a domain was first seen <em>in your network</em>, not when it was created. A domain registered three years ago but never queried by any host in your environment until today is interesting — especially if it was registered, sat dormant, and then reactivated. Attackers buy expired domains or let infrastructure age specifically to evade newly-registered-domain detections. ICANN requires that creation dates be retained even after expiration, but once a domain changes hands, the age becomes misleading. Newly observed catches what newly registered misses.</p>
<p>Build first-seen and last-seen timestamps into your DNS data. "Never observed in this network before" is a surprisingly powerful filter in most networks.</p>
<h3>DNS Permutations and Typosquatting</h3>
<p>Attackers register domains that look like yours: <code>yourcompany.co</code> instead of <code>yourcompany.com</code>, <code>yourc0mpany.com</code> with a zero, <code>yourconpany.com</code> with a swapped letter. Dnstwist is an open-source tool that generates these permutations automatically — homoglyphs, character swaps, TLD variations, the works.</p>
<p><strong>Levenshtein distance</strong> takes this further: calculate the edit distance between queried domains and your critical assets. A distance of 1 or 2 from your primary domain is a strong phishing indicator. This is how you catch the domains that are close enough to fool a human but different enough to evade exact-match blocklists.</p>
<h3>Baseline Anomalies</h3>
<p>This is harder to set up but incredibly valuable once it's running. Build a baseline of normal DNS activity in your environment — what domains are queried, how often, by which hosts — and then look for deviations.</p>
<p>There are public domain popularity lists you can use for initial noise reduction. Beyond that, build your own list from your own data. What matters is knowing what's normal for <em>your</em> environment, not the internet at large.</p>
<p>What to look for: day-over-day or week-over-week trending, spikes in query volume, unusually large byte transfers, periodic connection patterns that suggest beaconing, and anomalous record types (a sudden spike in TXT queries from a workstation is rarely innocent).</p>
<h3>DNS Tunneling</h3>
<p>This is the adversary embedding C2 communications or exfiltrated data directly inside DNS queries and responses. The data gets encoded into subdomain names or stuffed into TXT records. It's clever, and it works because most environments don't inspect DNS payload content.</p>
<p>Detection techniques: high query volume to a single domain, large byte transfers over DNS (which should normally be tiny), unusual record types, an abnormal number of subdomains under a single parent domain, and high entropy in the subdomain strings (base64-encoded data looks nothing like normal hostnames).</p>
<h3>DNS Hijacking</h3>
<p>A man-in-the-middle technique where the attacker intercepts DNS requests and spoofs a response with their own (malicious) answers. Detection is trickier here — you're looking for anomalous DNS responses, particularly duplicate Transaction IDs (XIDs). If you're running Zeek, check <code>weird.log</code> for DNS-related anomalies.</p>
<hr />
<h2>The TLS Angle</h2>
<p>DNS isn't the only place domain names show up. TLS certificates leak domain information in two key places: the <strong>Server Name Indication (SNI)</strong> field in the Client Hello, and the <strong>Subject Alternative Name (SAN)</strong> field in the server's certificate.</p>
<p>This matters because as encrypted DNS (DoT, DoH) continues to roll out, traditional DNS visibility gets harder. TLS metadata becomes a complementary signal source — not a replacement, but an important supplement for environments where full DNS visibility isn't achievable. At least until TLS 1.3 with Encrypted Client Hello (ECH) goes mainstream, at which point we lose domain visibility in the handshake entirely. That's the last reliable place we could see where traffic was headed without decrypting it.</p>
<hr />
<h2>Challenges (Because Nothing Is Free)</h2>
<p>DNS-based detection isn't without friction:</p>
<p><strong>Performance.</strong> DNS admins will push back on logging — and they're not wrong. Full query logging on a busy resolver has a real performance cost. The workaround: tap the network instead of burdening the DNS servers themselves. Let Zeek or passivedns sensors capture the traffic off a port mirror or tap. You get the data without the performance argument.</p>
<p><strong>Encrypted DNS is eating visibility.</strong> DNS-over-HTTPS, DNS-over-TLS, and TLS 1.3 with ECH are all designed to improve privacy, and they do — but they also reduce what defenders can see. I'll be honest: this one makes me nervous. Between browsers defaulting to DoH and CDN providers pushing encrypted everything, I think DNS visibility as we know it is slowly going away. Control what you can (your internal resolvers), supplement with TLS metadata where you can't, and accept that this is a moving target.</p>
<p><strong>SIEM cost.</strong> If you're feeding DNS into a commercial SIEM, the volume can get expensive fast. High-volume DNS ingestion into something like Splunk will hit your license hard. Think about whether you need every query in your SIEM or whether you can do initial processing and filtering closer to the source, only forwarding the interesting stuff.</p>
<p><strong>False positives.</strong> Newly registered domain detections will fire on ad-tech. Baseline anomalies will fire on software updates. Permutation checks will fire on legitimate domains that happen to look similar to yours. Tuning is ongoing work, not a one-time setup.</p>
<hr />
<h2>The Bottom Line</h2>
<p>DNS gives you a window into almost everything happening on your network, and most of the detections I've described here range from trivial to moderate to implement. You don't need a massive security budget or a dedicated detection engineering team to start. You need DNS logs and curiosity.</p>
<p>As John Strand puts it: "Know normal, find evil." DNS is one of the best places to start knowing what normal looks like.</p>
<hr />
<p><em>This post is adapted from a talk I've given at several security conferences — you can</em> <a href="https://www.youtube.com/watch?v=gEl5vZwNvfk"><em>watch the full Zeek webinar version on YouTube</em></a><em>. If you want to go deeper on network forensics and detection, I'm teaching</em> <a href="https://www.sans.org/cyber-security-training-events/security-west-2026"><em>FOR572 at SANS Security West</em></a> <em>in San Diego this May. Find me on</em> <a href="https://www.linkedin.com/in/brianolsonsec/"><em>LinkedIn</em></a> <em>or reach out at <a href="mailto:brian@hurrikane.net">brian@hurrikane.net</a>.</em></p>
]]></content:encoded></item><item><title><![CDATA[From Operations to Leadership: What 19 Years in Cybersecurity Actually Taught Me]]></title><description><![CDATA[I've spent the better part of two decades in cybersecurity — starting in entry-level IT, working through the trenches of incident response and threat detection, and eventually moving into engineering ]]></description><link>https://www.hurrikane.net/from-operations-to-leadership-what-19-years-in-cybersecurity-actually-taught-me</link><guid isPermaLink="true">https://www.hurrikane.net/from-operations-to-leadership-what-19-years-in-cybersecurity-actually-taught-me</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[Career]]></category><category><![CDATA[leadership]]></category><category><![CDATA[SecurityEngineering]]></category><category><![CDATA[Linux]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sat, 28 Mar 2026 14:23:46 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68aa6f21f8782a55b8a9c4c7/58d4c76d-f7c8-4129-856e-08e45d2a2c98.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I've spent the better part of two decades in cybersecurity — starting in entry-level IT, working through the trenches of incident response and threat detection, and eventually moving into engineering management. Along the way I've worked across military, government, and private sector environments, led security operations during one of the largest data breaches in history, and taught network forensics for SANS.</p>
<p>This post isn't a resume walkthrough. It's an attempt to distill the things that actually mattered — the technical investments that compounded over time, and the people skills that turned out to be just as important as any exploit chain I ever analyzed. If you're early or mid-career in tech and wondering what to double down on, this is what I'd tell you over coffee.</p>
<p>A caveat before we go further: I'm one person who traveled one path. These are opinions shaped by experience, not universal truths. Your mileage will vary, and that's fine.</p>
<hr />
<h2>The Technical Fundamentals That Compound</h2>
<h3>Linux Is Still a Cheat Code</h3>
<p>In an industry full of specialized tools and certifications, plain old Linux fluency remains one of the rarest and most valuable skills I see — and it shouldn't be. The vast majority of the world's web infrastructure runs on Linux. Most security tools were originally built on Unix-based systems. And yet, a shocking number of security professionals are uncomfortable at a Linux command line.</p>
<p>Early in my career, I worked a geographically distributed compromise where the entire investigation hinged on being able to move efficiently across Linux systems. The analysts who could SSH into boxes, parse logs on the fly, and string together commands with pipes and loops were the ones who drove the investigation forward. Everyone else was waiting for someone to export data into a GUI.</p>
<p>If you take one thing from this section: get comfortable living in a terminal. Learn <code>awk</code>, <code>sed</code>, <code>grep</code>, and how to pipe them together. Understand SSH — not just how to connect, but proxies, tunnels, and port forwarding. These are the same techniques adversaries use, and understanding them makes you better on both sides of the fight.</p>
<h3>Learn to Code (Update: It's Complicated Now)</h3>
<p>When I originally gave this talk, my advice was straightforward: learn Python or Go. I resisted coding for years — I was a bash wizard, and bash got me pretty far. But there's a ceiling to what shell scripts can do when you're operating at the scale of millions of hosts. The moment I started writing Python, I realized how much time I'd been wasting. Not because bash is bad, but because Python gave me modularity, libraries, and tools that other people could actually maintain.</p>
<p>That advice isn't wrong, but it's incomplete in 2026. AI-assisted coding has changed the equation. You can generate functional Python with a well-crafted prompt, and for a lot of one-off security tooling, that's good enough. But "good enough" has a shelf life. AI can write the code — it can't tell you whether the code is doing the right thing, handling edge cases safely, or introducing a subtle vulnerability. You still need to read code critically, understand what it's doing, and know when the output is wrong.</p>
<p>So my updated take: the goal isn't necessarily grinding through Python tutorials from zero anymore. The goal is code literacy — understanding control flow, data structures, how libraries work, what good code looks like versus bad code. Whether you write it by hand or direct an AI to write it, you need to be the one who knows if it's correct. If you're starting from scratch, Ansible is still a decent on-ramp. It gets you thinking in terms of automation and repeatability without requiring you to become a software engineer overnight.</p>
<h3>Security Engineering Is Where You Scale</h3>
<p>There's a phase in most security careers where you realize that doing the work isn't enough — you need to build systems that do the work for you. That's the shift from operations to engineering.</p>
<p>Security engineering is about building and scaling security: automating the nonsense tasks so humans can focus on the work that actually requires judgment. Detection engineering, in particular, became the thing that let me multiply my impact far beyond what I could do as an individual analyst. It's matured a lot as a discipline since I started — there are dedicated roles, teams, and frameworks now that didn't exist a few years ago. If you're interested, <em>Practical Threat Detection Engineering</em> by Megan Roddie is a solid starting point.</p>
<h3>Log Analysis Is a Superpower</h3>
<p>I mean this literally. The ability to aggregate, normalize, enrich, and search through terabytes of log data is one of the most powerful capabilities in security. SQL is underrated in this field. The Elastic Stack is still worth learning deeply, even as the SIEM landscape keeps shifting — the underlying concepts of indexing, querying, and correlating log data transfer everywhere. And if you're doing forensics, SOF-ELK remains a great way to get hands-on fast.</p>
<p>The analysts I've seen grow fastest are the ones who treat log analysis not as a chore but as an investigative tool — a way to ask questions of the data and follow the answers wherever they lead.</p>
<h3>Think Like the Attacker</h3>
<p>This is well-trodden advice, but it bears repeating because of <em>how</em> it helps. Understanding offensive security isn't about becoming a red teamer (though you can). It's about internalizing the kill chain so deeply that when you're on the defensive side, you can recognize where an intruder is in the process and know what artifacts they've left behind.</p>
<p>You don't need to be an expert. You need enough exposure to think in terms of attacker workflows, not just defender checklists.</p>
<hr />
<h2>The People Skills Nobody Warned Me About</h2>
<p>I spent the first chunk of my career thinking that if I just got technically sharp enough, everything else would follow. It doesn't. At some point, the thing holding you back isn't what you know — it's how you work with other people.</p>
<h3>Cybersecurity Is a Team Sport</h3>
<p>No one knows everything. I've worked with brilliant analysts who could reverse-engineer malware in their sleep but couldn't communicate their findings to a non-technical stakeholder. I've seen investigations stall not because of technical limitations, but because team members didn't trust each other enough to delegate.</p>
<p>Some of the most intense professional experiences I've had were in war rooms — those high-pressure, all-hands-on-deck incident response scenarios where everything is on fire and the clock is running. The teams that performed best weren't the ones with the most talented individuals. They were the ones where people had built relationships <em>before</em> the crisis hit. Where they'd grabbed lunch together, knew each other's strengths, and had enough trust to hand off critical tasks without micromanaging.</p>
<p>This has only gotten harder with distributed teams. When half the war room is on Zoom and the other half is in a Slack thread, the relationships you didn't build in advance become painfully obvious. Build them now, before you need them.</p>
<h3>Think Out Loud</h3>
<p>This is a small habit that will save you more time than almost any tool you install. When you're working a problem, verbalize your thought process. Share your assumptions. Talk through your reasoning with whoever is nearby.</p>
<p>Two things happen when you do this. First, someone will challenge an assumption you didn't realize you were making, saving you hours of going down the wrong path. Second, you create a shared understanding across the team — everyone knows where you are, what you're thinking, and how they can help.</p>
<p>I've watched analysts sit silently at their desk for four hours, stuck on a problem, because they didn't want to look like they didn't know the answer. Meanwhile, the person sitting ten feet away had the exact piece of context they needed.</p>
<p>In a distributed world, "thinking out loud" looks different — it's a running thread in Slack, a working doc with your notes, a quick voice message to a teammate. The medium changed; the principle didn't. Make your thought process visible. Ask questions. It's not a sign of weakness — it's how good teams operate.</p>
<h3>Understand What Motivates People</h3>
<p>I was slow to learn this one. When you're deep in security, it's easy to see the world in terms of risk and compliance — things are either secure or they're not. But the people you work with have their own priorities, pressures, and incentives, and those don't always align with yours.</p>
<p>I once worked with a kernel developer who pushed back hard on a security recommendation. My instinct was frustration — why wouldn't they just do the obviously correct thing? But when I took the time to sit down with them, understand their constraints, and figure out what they were optimizing for, we found a compromise that addressed the security concern without blowing up their roadmap.</p>
<p>Sometimes the best security work you can do is grab coffee with someone and ask them what's keeping them up at night.</p>
<h3>Validate Your Assumptions (Relentlessly)</h3>
<p>Keep a running list of assumptions. Check them. Then check them again.</p>
<p>I learned this lesson in a way I'll never forget. During an investigation, everyone on the team accepted as fact that compromised systems had wiped themselves — which meant we were working with limited evidence. I pushed back on that assumption, dug into the specifics, and discovered it wasn't true. That single act of questioning what everyone 'knew' led to recovering ten times more evidence than we thought existed — and identifying ten times more victims. Those aren't just numbers. Those are people whose compromised data would have gone unnoticed if we'd kept operating on a bad assumption.</p>
<p>Assumptions are necessary — you can't operate without them. But unvalidated assumptions are the single biggest source of error I've seen in security operations. Write them down. Revisit them. Don't let them calcify into facts.</p>
<h3>Winning Means Compromise</h3>
<p>I fought this one for a while. Security is important, but it's rarely the primary purpose of the organization. The business has goals, and your job is to help them achieve those goals securely — not to block everything that carries risk. That's literally everything.</p>
<p>The best security outcomes I've been part of involved finding an amicable middle ground. Sometimes that means accepting compensating controls instead of your ideal solution. Sometimes it means giving more ground than you're comfortable with. But a compromise that gets implemented beats a perfect solution that gets vetoed every single time.</p>
<p>Stalemate is the worst outcome. Nothing changes, nobody improves, and you've spent political capital for zero return.</p>
<h3>Balance Optimism and Pessimism</h3>
<p>Security people tend to skew pessimistic — we're trained to see what's broken. But unchecked pessimism makes you the person who says "no" to everything, and eventually people stop asking you altogether.</p>
<p>On the flip side, unchecked optimism is just as dangerous. Overpromising and underdelivering leads to burnout, missed deadlines, and people who stop believing what you tell them.</p>
<p>The sweet spot is informed realism: honest about the risks, practical about the solutions, and generous in assuming that the people around you are acting with good intent until proven otherwise. Start every interaction assuming the best about the other person. You'll be right more often than you think.</p>
<h3>Build a Culture of Learning (and Blamelessness)</h3>
<p>This industry moves too fast for anyone to know it all. The moment you accept that — really accept it — you stop pretending and start learning.</p>
<p>The best teams I've been on had a culture where it was safe to say "I don't know." Where mistakes were treated as learning opportunities, not career-ending events. When something goes wrong, extract the lessons, share them widely, and move on. Never blame. Never fault someone for a mistake made in good faith.</p>
<p>Fostering curiosity is simpler than people think. Just keep asking "why." Why did this alert fire? Why did we build the process this way? Why do we assume that's true? Create space for those questions and the answers tend to follow.</p>
<hr />
<h2>The Shift: From Doing to Multiplying</h2>
<p>The biggest shift in my career wasn't a promotion or a job change. It was the moment I realized that stepping back from "doing" and stepping into mentoring would let me multiply my impact in a way that individual contribution never could.</p>
<p>As an individual contributor, your impact is bounded by your own time and energy. As a leader — formal or informal — you can help ten people avoid the burnout you experienced, develop skills faster than you did, and solve problems you never would have gotten to on your own. That's the real 10x engineer: not someone who writes ten times more code, but someone who makes ten people around them better.</p>
<p>It's not an easy transition. You have to let go of being the person with the answers and become the person who asks the right questions. You have to trust your team to execute, even when you could do it faster yourself. And you have to accept that your most important work is now invisible — the crisis that never happened because you helped someone grow, the burnout that didn't claim a talented analyst because you caught the signs early.</p>
<hr />
<h2>A Few More Things (From the Appendix of My Brain)</h2>
<p><strong>Own your career.</strong> Your manager isn't going to remember everything you accomplished. When evaluation cycles come around, advocate for yourself. It's not bragging — it's accurate reporting.</p>
<p><strong>Go deep <em>and</em> wide.</strong> The generalist vs. specialist debate never made much sense to me. Get broad exposure early, then go deep where your curiosity pulls you. You can always broaden again later.</p>
<p><strong>Don't just fix it — understand it.</strong> The quick fix gets the ticket closed. Understanding why it broke in the first place prevents the next ten tickets.</p>
<p><strong>Take the challenges nobody wants.</strong> The ugliest, most ambiguous, most thankless problems are where the most valuable experience lives. Most people take the easy wins. Push yourself toward the hard ones.</p>
<p><strong>Perfection is impossible.</strong> We learn textbook-perfect security and then immediately discover that everything in the real world is broken. The skill isn't achieving perfection — it's making good calls in the gap between how things should work and how they actually do.</p>
<hr />
<p><em>This post is adapted from a talk I gave at the Augusta ISSA chapter &amp; SANS APAC DFIR Summit — you can</em> <a href="https://www.youtube.com/watch?v=dLE5FeK7Tyg"><em>watch the SANS recording on YouTube</em></a><em>. If you want to go deeper on the network forensics and threat hunting side, I'm teaching</em> <a href="https://www.sans.org/cyber-security-training-events/security-west-2026"><em>FOR572 at SANS Security West</em></a> <em>in San Diego this May. And if you just want to talk about career growth, security engineering, or anything in between, find me on</em> <a href="https://www.linkedin.com/in/brianolsonsec/"><em>LinkedIn</em></a> <em>or reach out at <a href="mailto:brian@hurrikane.net">brian@hurrikane.net</a>.</em></p>
]]></content:encoded></item><item><title><![CDATA[From Tool to Teammate: How I Learned to Partner with an AI to Build Production-Ready Security Detections]]></title><description><![CDATA[I'm going to tell you a story about how I compressed a multi-week detection engineering project into a single 45-minute session. And then I'm going to tell you exactly how I did it—because I think thi]]></description><link>https://www.hurrikane.net/from-tool-to-teammate-how-i-learned-to-partner-with-an-ai-to-build-production-ready-security-detections</link><guid isPermaLink="true">https://www.hurrikane.net/from-tool-to-teammate-how-i-learned-to-partner-with-an-ai-to-build-production-ready-security-detections</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sat, 14 Mar 2026 14:30:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68aa6f21f8782a55b8a9c4c7/924cc17e-c478-4386-82dd-be8c8e05808d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I'm going to tell you a story about how I compressed a multi-week detection engineering project into a single 45-minute session. And then I'm going to tell you exactly how I did it—because I think this capability is accessible to every engineer reading this right now.</p>
<p>But first, some context on how I got here.</p>
<h2>My AI Journey (So Far)</h2>
<p>My relationship with AI has gone through distinct phases, and if you're a security engineer or developer, you've probably experienced something similar.</p>
<p>It started with <strong>search</strong>. I replaced Google for research tasks and turned 30-minute deep dives into sub-one-minute summaries. Useful, but not transformative.</p>
<p>Then came the <strong>code phase</strong>—copy-pasting generated snippets into my projects. Effective in spurts, but slow and inefficient. The AI would lose context, and I'd spend as much time fixing its output as I saved generating it.</p>
<p>Next was <strong>Agentic v1</strong> with tools like Aider. I could see the potential—an AI that could actually read and modify files in my codebase—but the tool wasn't ready. It produced bad code and couldn't maintain focus across complex tasks. Not putting it all on Aider, it was likely also where I was in my AI learning curve.</p>
<p>Then Claude happened. <strong>Agentic v2</strong> was the game changer. The moment I could truly see how agentic AI would transform how we work. Not someday—<em>now</em>.</p>
<p>And on the horizon? <strong>Agentic v3</strong>: agents orchestrating agents. Specialized AI collaborators tackling complex, multi-domain problems together. But that's a topic for another post.</p>
<p>The key insight across this journey: <strong>this isn't about replacing our skills; it's about amplifying them.</strong> It's a shift from being a lone developer to operating as a developer-plus-AI team. I can see how this capability could 5x an individual's impact this year, and potentially far more as we get comfortable with its use and the technology keeps improving daily.</p>
<p>My goal today is to show you a real, practical example of how this works.</p>
<h2>The Proving Ground: Can an AI Tackle a Real Security Challenge?</h2>
<p>I wanted to test this with something that matters—not a toy problem or a tutorial exercise, but a genuine detection engineering challenge: <strong>finding anomalous DNS queries in a corporate environment.</strong></p>
<p>If you work in security, you know this is a classic problem. It requires deep knowledge of your data, your systems, and attacker techniques. Normally, this is a multi-week project involving research, prototyping, testing, and tuning.</p>
<p>I happened to have a surprisingly open calendar one afternoon, so I decided to run an experiment.</p>
<p>Total time spent working with the AI: <strong>approximately 45 minutes.</strong></p>
<h2>Step 1: I Gave the AI a Job Title and an Onboarding Packet</h2>
<p>This was the breakthrough that changed everything. Instead of just asking the AI to "write me a DNS detection query," I treated it like a new team member showing up on day one.</p>
<p>I gave it a <strong>persona</strong>: "You are a detection engineer working on the Infrastructure Security Monitoring team. We primarily use our internal tooling X, Y and Z to collect, enrich, search, build detections and investigate alerts."</p>
<p>Then I gave it <strong>context</strong>: I pointed it to internal documentation about our team, our platform, and our data structures. I told it to read up and add findings to its working memory.</p>
<p>The key takeaway? By providing a persona and access to our internal documentation, the AI instantly gained the context needed to operate as a team member, not just a code generator. It understood our naming conventions, our data schemas, and our operational constraints before writing a single line of code.</p>
<h2>Step 2: I Asked for a Plan. It Gave Me a Full-Blown Strategy.</h2>
<p>My prompt was deliberately vague: "I want to find anomalous DNS queries in corp. Plan?"</p>
<p>What came back wasn't just a plan—it was a comprehensive strategy. The AI first performed a <strong>gap analysis</strong> of our existing detections, identifying what we already covered (exfiltration/tunneling, behavioral anomalies) and where the gaps were (volume-based spikes, domain entropy, TLD anomalies). It wasn't completely accurate, but I suspect our documentation was a bit lagging; a project for another day.</p>
<p>Then it recommended four detection approaches: statistical baseline detection as a quick win, entropy and length-based detection for DGA identification, answer-based anomaly detection analyzing DNS response types and TTL values, and a composite scoring model combining multiple signals for higher-fidelity alerts.</p>
<p>It even laid out a <strong>5-phase implementation architecture</strong> with weekly milestones—from prototyping through testing and validation.</p>
<p>I didn't ask for any of this structure. The persona and context I'd provided gave it enough understanding of how our team operates to propose something that actually looked like what an experienced detection engineer would put together.</p>
<h2>Step 3: The Code—And the Inevitable Errors</h2>
<p>I said, "Let's get started prototyping your specific recommendations. Show me the plan before executing."</p>
<p>The AI immediately started generating SQL—a volume spike detection query with window functions, rolling averages, the whole thing. It was impressive.</p>
<p>And it immediately produced a syntax error.</p>
<p>This is where most people get frustrated and dismiss AI as "not ready." But this is actually where the real collaboration begins.</p>
<p>I pasted the error back: "I'm getting '[UPM146] Expected CloseParen, found Identifier.'" The AI diagnosed the issue—invalid syntax on specific lines—and fixed it. Then I hit a column resolution error. Fixed again. Then a more serious problem: a memory exception because the query was collecting too many domains in aggregation.</p>
<p>This wasn't simple copy-paste anymore. We went from fixing syntax to diagnosing and solving system-level memory errors together. The AI understood the architectural constraints of the query engine and proposed removing heavy aggregations that were only needed for investigation context anyway.</p>
<p><strong>Debugging became a conversation.</strong> Each error message I fed back made the next iteration better, not because the AI was perfect, but because it could reason about the problem in context.</p>
<h2>The 'Aha!' Moment: The AI QA'd Its Own Work</h2>
<p>Here's where it got really interesting. After the detection was running, I exported the results and fed them back: "Here are the detection results. Do the analysis."</p>
<p>The AI generated its own QA report card—and it was brutally honest. <strong>83% false positive rate.</strong> Five out of six alerts were false positives.</p>
<p>But it didn't stop there. It identified three critical logic issues in its own code: the spike/stddev logic was using OR when it should have been AND (too permissive), the baseline window was too weak (should require a full 7 days of data, not just any data point), and dev environments weren't being excluded from the detection scope.</p>
<p>Projected impact after tuning: FP rate drops from 83% to approximately 3%.</p>
<p>This was the moment I truly understood the paradigm shift. The AI wasn't just generating code—it was analyzing results, identifying its own flaws, and proposing specific fixes with projected outcomes. That's not a tool. That's a teammate.</p>
<h2>The Final Result</h2>
<p>What would have been a multi-week project of research, coding, testing, and tuning was condensed into a single focused session. The output: production-ready detection logic with correct AND logic for spike and standard deviation thresholds, strict 7-day baseline requirements, exclusions for common false positive sources like guest networks and dev environments, and a query ready for production testing.</p>
<p>Not perfect out of the box—nothing ever is in detection engineering. But a dramatically accelerated starting point that would have taken significantly longer to reach through traditional methods.</p>
<h2>My Five Principles for Effective AI Collaboration</h2>
<p>After this experience (and many others since), here's what I've distilled as the keys to making AI work as a genuine engineering partner:</p>
<p><strong>1. Don't tell AI what to do—have a discussion.</strong> My vague prompt "I want to explore new detection opportunities" led to a comprehensive strategy I hadn't fully mapped out myself. Open-ended prompts invite the AI to bring its own perspective.</p>
<p><strong>2. Ask AI questions.</strong> AI brings a different lens. It identified gaps in our existing DNS detections that we hadn't prioritized. Let it challenge your assumptions.</p>
<p><strong>3. Tell AI to ask <em>you</em> questions.</strong> The AI's clarifying questions—baseline window? scope? output format?—ensured the prototypes were built correctly from the start. This two-way dialogue front-loads the thinking that would otherwise surface as bugs later.</p>
<p><strong>4. Go BIG.</strong> Don't be afraid to ask for a full detection suite. We went from a simple idea to three distinct, production-ready detection prototypes in one session. The worst that happens is you scale back.</p>
<p><strong>5. Use personas.</strong> Telling the AI "You are a detection engineer..." was the key to unlocking relevant, context-aware responses. Without it, you get generic code. With it, you get code that understands your environment.</p>
<h2>This Power Is Accessible to You, Right Now</h2>
<p>If a long-time manager can do it, you can do it even better—because you know the data and systems inside out.</p>
<p>I highly recommend you give it a try. Seriously, it's easier than you think. Pick a detection you've been meaning to build, a script you've been procrastinating on, or an analysis you've been putting off. Give the AI a persona, give it context, and start a conversation.</p>
<p>You know the data, you know the systems—let's see what you can build.</p>
<hr />
<p><em>What's your experience using AI in your security workflows? Have you found the "teammate" mode, or are you still in the "tool" phase? Drop a comment—I'd love to hear what's working (and what's not) for you.</em></p>
]]></content:encoded></item><item><title><![CDATA[Why Self-Hosting Matters More Than Ever in 2026]]></title><description><![CDATA[As someone who's spent nearly two decades in cybersecurity—responding to breaches, hunting threats across enterprise networks, and teaching DFIR at SANS—I've watched the industry oscillate between "mo]]></description><link>https://www.hurrikane.net/why-self-hosting-matters-more-than-ever-in-2026</link><guid isPermaLink="true">https://www.hurrikane.net/why-self-hosting-matters-more-than-ever-in-2026</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Fri, 27 Feb 2026 17:15:25 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68aa6f21f8782a55b8a9c4c7/6ece8be0-74d1-4a06-aef8-49ddfbddec0d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As someone who's spent nearly two decades in cybersecurity—responding to breaches, hunting threats across enterprise networks, and teaching DFIR at SANS—I've watched the industry oscillate between "move everything to the cloud" and "wait, maybe we shouldn't have done that." In 2026, the pendulum is swinging hard toward a conclusion I've been arriving at personally: if you care about your data, your privacy, and your long-term autonomy, it's time to seriously consider self-hosting.</p>
<p>And no, I'm not talking about spinning up a janky Raspberry Pi in your closet (though you can). I'm talking about a fundamental shift in how security-minded professionals and small businesses should think about where their digital lives actually live.</p>
<h2>The SaaS Trust Problem</h2>
<p>Let me put my DFIR hat on for a second. In 2025, SaaS breaches didn't just increase—they became <em>systematic</em>. The Salesloft-Drift campaign hit over 700 organizations by compromising OAuth tokens. Gainsight followed the same playbook, taking down another 200+ Salesforce instances. ShinyHunters didn't need zero-days. They just exploited trusted integrations—the very connections organizations set up and forgot about.</p>
<p>The average mid-sized company now runs over 200 SaaS applications, and the average cost of a breach sits at $4.4 million. But here's the thing that keeps me up at night: 83% of companies reported experiencing a cloud data breach in 2025, and attackers can move from initial compromise to data exfiltration in as little as <em>nine minutes</em>. Nine. Minutes.</p>
<p>Every SaaS app you onboard is another node in your attack surface. Every OAuth token is a potential pivot point. Every "Connect to Google" button is a trust decision you probably didn't fully evaluate. As someone who's been on the response side of these incidents, the pattern is unmistakable: the more you distribute your data across third-party platforms, the harder containment becomes and the longer breaches go undetected.</p>
<h2>The Regulatory Reckoning</h2>
<p>The regulatory landscape has caught up to what security practitioners have been saying for years. The EU AI Act becomes fully enforceable in August 2026. GDPR fines topped €6.7 billion since inception, with enforcement accelerating year over year. The U.S. Department of Justice now restricts sharing sensitive American data with certain countries. Eighteen states have active privacy laws. India, China, and Saudi Arabia are all tightening data localization requirements.</p>
<p>The direction is unmistakable: governments worldwide are asserting that data should stay under the jurisdiction where it's created and processed. The era of "just throw it in AWS and hope for the best" is ending—not because the technology failed, but because the legal and geopolitical reality caught up.</p>
<p>For small businesses and solo operators, this creates an interesting paradox. You're subject to increasingly strict data handling requirements, but your SaaS providers may be storing your customer data across jurisdictions you can't even identify. Self-hosting doesn't eliminate compliance complexity, but it does give you a clear answer to "where is my data?"—it's wherever you put it.</p>
<h2>The Cost Equation Has Flipped</h2>
<p>I've written before about cutting digital fat and trimming subscriptions. Here's what most people don't calculate: the cumulative cost of SaaS sprawl over time versus the one-time investment in self-hosted infrastructure.</p>
<p>A basic stack of cloud productivity tools—email, storage, project management, password manager, VPN, notes, calendar—can easily run \(50-100/month per person. Over five years, that's \)3,000-6,000, and you own <em>nothing</em>. Your data lives on someone else's servers, governed by their terms of service, which they can change whenever they want.</p>
<p>Compare that to a VPS from Hetzner, DigitalOcean, or even a mini PC sitting in your closet. For \(10-20/month (or a one-time \)200-400 hardware investment), you can run Nextcloud for files and calendar, Vaultwarden for passwords, a Tailscale mesh for private networking, and a growing ecosystem of containerized apps that replace nearly every SaaS tool most individuals and small teams rely on.</p>
<p>The math doesn't lie. But the real savings aren't just financial—they're in reduced risk. Fewer accounts means fewer credentials to manage, fewer OAuth grants to audit, fewer vendors who might get breached with your data inside.</p>
<h2>The Tooling Is Finally Ready</h2>
<p>I'll be honest—three or four years ago, I would have hesitated to recommend self-hosting to anyone who wasn't already comfortable with Linux and Docker. The operational burden was real. Updates were painful. Backup strategies were DIY at best.</p>
<p>That's changed. Docker Compose has made deploying complex application stacks almost trivially simple. Projects like Nextcloud, Immich, Paperless-ngx, and Vaultwarden have matured into genuinely polished products with active communities and regular security updates. Tailscale and WireGuard have solved the networking problem—you can securely access your self-hosted services from anywhere without exposing a single port to the internet.</p>
<p>For the security-conscious, this is particularly compelling. Instead of trusting a VPN provider (and I've written about <a href="https://www.hurrikane.net/the-hidden-dangers-of-commercial-vpns-why-private-solutions-like-tailscale-are-the-future-d22f7cb3404b">the hidden dangers of commercial VPNs</a>), you can run your own mesh network where traffic never touches a third party's infrastructure. Your DNS queries can stay local. Your files never leave hardware you control.</p>
<p>The barrier to entry hasn't just lowered—it's practically on the ground for anyone with basic technical literacy.</p>
<h2>A DFIR Professional's Perspective</h2>
<p>Here's what my day job has taught me that most self-hosting advocates don't talk about: <strong>operational security doesn't stop at deployment.</strong></p>
<p>Self-hosting means <em>you</em> are the SOC. You need to think about:</p>
<ul>
<li><p><strong>Patch management</strong>: Are you updating your containers and host OS regularly? Unpatched self-hosted services are worse than SaaS because you don't have a vendor's security team watching your back.</p>
</li>
<li><p><strong>Backup and recovery</strong>: The 3-2-1 rule still applies. Three copies, two different media, one offsite. If your self-hosted Nextcloud dies and your only backup is on the same disk, you've accomplished nothing.</p>
</li>
<li><p><strong>Monitoring</strong>: At minimum, you should know when services go down, when storage fills up, and when something unexpected happens. Uptime Kuma is free and takes five minutes to deploy.</p>
</li>
<li><p><strong>Access control</strong>: Just because it's your server doesn't mean you should run everything as root with default credentials. Treat your self-hosted stack with the same rigor you'd apply to a production environment.</p>
</li>
</ul>
<p>This isn't meant to scare you off. It's meant to set expectations. Self-hosting gives you control, but control comes with responsibility. As someone who responds to incidents for a living, I'd rather see people self-host <em>well</em> than self-host <em>carelessly</em>.</p>
<h2>Where to Start</h2>
<p>If you're new to self-hosting, don't try to replace everything at once. Start with one service that gives you meaningful privacy gains and build from there:</p>
<ol>
<li><p><strong>Password manager (Vaultwarden)</strong>: This is the highest-impact, lowest-effort starting point. Your credentials are the keys to your entire digital life. Get them off someone else's cloud.</p>
</li>
<li><p><strong>DNS filtering (ControlD, Pi-hole, or AdGuard Home)</strong>: I've already written about my <a href="https://www.hurrikane.net/enhancing-home-network-security-with-controld-a-comprehensive-guide-to-dns-home-72408c10c768">ControlD setup</a>. This one improves both privacy and security immediately.</p>
</li>
<li><p><strong>Private networking (Tailscale)</strong>: Once you have services running, Tailscale lets you access them securely from anywhere—no port forwarding, no exposed attack surface.</p>
</li>
<li><p><strong>File storage (Nextcloud)</strong>: Replace Google Drive or Dropbox for your sensitive documents. Keep the commercial service for stuff you don't care about.</p>
</li>
<li><p><strong>Monitoring (Uptime Kuma)</strong>: Because if you're going to self-host, you need to know when something breaks.</p>
</li>
</ol>
<p>Each of these can be deployed in under an hour with Docker Compose, and each one removes a dependency on a third party that may or may not have your best interests at heart.</p>
<h2>The Bigger Picture</h2>
<p>I think the self-hosting movement is about something larger than technology. It's about rejecting the assumption that convenience must come at the cost of control. It's about recognizing that when a service is free, <em>you</em> are the product—and even when you're paying, the vendor's incentives don't always align with yours.</p>
<p>As a cybersecurity professional, I've seen what happens when organizations lose control of their data. The breaches, the incident response scrambles, the regulatory fallout—none of it is theoretical to me. And increasingly, I'm applying those same lessons to my own digital life.</p>
<p>Self-hosting isn't about going off the grid or becoming a digital hermit. It's about being intentional with where your data lives, who has access to it, and what happens when (not if) something goes wrong.</p>
<p>The tools are mature. The cost equation makes sense. The threat landscape demands it. If you've been on the fence, 2026 is the year to start building your own infrastructure—even if it's just one Docker container at a time.</p>
<hr />
<p><em>What's your self-hosting setup? Have you started moving off SaaS, or are you still evaluating? Drop a comment—I'd love to hear what tools you're running and what challenges you've hit. If you're new to this and want to see how I set up specific services, let me know and I'll dig into the details in a future post.</em></p>
]]></content:encoded></item><item><title><![CDATA[Custom Domains, Gmail, and AI Integration]]></title><description><![CDATA[For many years, I paid for Google Workspace. Not because I loved it, but because I needed a custom domain and Google email was the least painful option.
Over time, though, the unexplainable quirks between the paid “work” experience and all the consum...]]></description><link>https://www.hurrikane.net/custom-domains-gmail-and-ai-integration</link><guid isPermaLink="true">https://www.hurrikane.net/custom-domains-gmail-and-ai-integration</guid><category><![CDATA[Custom Domain]]></category><category><![CDATA[gmail]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Thu, 25 Dec 2025 13:40:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1766669952261/821a56cd-b32d-488b-8a92-dff751df94b0.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For many years, I paid for Google Workspace. Not because I loved it, but because I needed a custom domain and Google email was the least painful option.</p>
<p>Over time, though, the unexplainable quirks between the paid “work” experience and all the consumer features tied to my smart home became increasingly frustrating. Eventually, I gave up and moved my day-to-day life to a personal Gmail account.</p>
<p>That left one awkward problem.</p>
<p>What do Ido with a personal domain I’ve used exclusively for more than 25 years?</p>
<p>For most of 2025, my answer was <strong>Fastmail</strong>. And honestly, Fastmail is great. It’s reliable, privacy-focused, and refreshingly boring in all the right ways.</p>
<p>Then late 2025 happened, and suddenly the bar moved.</p>
<hr />
<h2 id="heading-the-missing-piece-intelligence">The Missing Piece: Intelligence</h2>
<p>What Fastmail lacked for me wasn’t reliability or traditional features. It was intelligence.</p>
<p>Fastmail does email extremely well. What it doesn’t have is the deep, native AI integration Google has embedded directly into Gmail. One-click thread summaries. Context-aware draft replies. Email that actually understands my calendar and documents instead of pretending they live in separate universes.</p>
<p>The obvious answer was Google Workspace.</p>
<p>The obvious problem was my custom domain.</p>
<hr />
<h2 id="heading-the-return-of-gmail-forwarding">The Return of Gmail + Forwarding</h2>
<p>So I revisited the old “Gmail plus email forwarding” approach. This time, though, something had changed.</p>
<p>Thanks to Cloudflare’s new one-click email routing setup, what used to feel like a clever workaround finally crossed the line into “set it and forget it.”</p>
<p>The result is a professional, AI-powered email stack that costs exactly <strong>$0 per month</strong>.</p>
<hr />
<h2 id="heading-why-i-did-this-the-gemini-factor">Why I Did This: The Gemini Factor</h2>
<p>By routing my custom domain into a personal Gmail account, I get Gmail’s full AI feature set without paying for Workspace, while keeping my personal domain exactly where it belongs.</p>
<p>Here’s what I gain:</p>
<h3 id="heading-native-summarization">Native Summarization</h3>
<p>I can summarize massive email threads with a single click. No extensions. No copy-paste gymnastics.</p>
<h3 id="heading-contextual-drafting">Contextual Drafting</h3>
<p>Gemini understands the full conversation history and drafts replies that actually make sense.</p>
<h3 id="heading-cross-app-intelligence">Cross-App Intelligence</h3>
<p>I can ask Gemini to find a document in Drive or check my calendar availability without leaving my inbox.</p>
<p>This isn’t AI sprinkled on top. It’s deeply integrated and genuinely useful.</p>
<hr />
<h2 id="heading-the-setup-guide">The Setup Guide</h2>
<p>The process has three phases:</p>
<ol>
<li><p><strong>Direct incoming mail to Gmail</strong> (Cloudflare)</p>
</li>
<li><p><strong>Enable outgoing mail via Google</strong> (account security)</p>
</li>
<li><p><strong>Set defaults inside Gmail</strong></p>
</li>
</ol>
<p>Once it’s done, I don’t think about it again.</p>
<hr />
<h2 id="heading-phase-1-cloudflare-email-routing">Phase 1: Cloudflare Email Routing</h2>
<h3 id="heading-the-one-click-dns-setup">The One-Click DNS Setup</h3>
<p>Because my domain already uses Cloudflare DNS, this part was refreshingly painless.</p>
<h3 id="heading-enable-routing">Enable Routing</h3>
<p>I logged into Cloudflare, selected my domain, and navigated to <strong>Email → Email Routing</strong>.</p>
<h3 id="heading-set-a-destination-address">Set a Destination Address</h3>
<p>I clicked <strong>Get Started</strong> and entered the Gmail address I wanted to receive mail at<br />(for example, <a target="_blank" href="mailto:your.name@gmail.com"><code>your.name@gmail.com</code></a>).<br />Cloudflare sent a verification email, which I confirmed.</p>
<h3 id="heading-create-my-custom-address">Create My Custom Address</h3>
<p>I added the address I wanted to use, such as <a target="_blank" href="mailto:contact@yourdomain.com"><code>contact@yourdomain.com</code></a>.</p>
<h3 id="heading-the-magic-button">The Magic Button</h3>
<p>Cloudflare showed a warning that DNS records were missing.<br />I clicked <strong>Add records and enable</strong>.</p>
<p>Cloudflare automatically wrote the required MX and SPF records. No manual copying. No guessing. No late-night DNS regret.</p>
<hr />
<h2 id="heading-phase-2-google-account-security">Phase 2: Google Account Security</h2>
<p>To send mail through Gmail’s SMTP servers using my custom domain, I needed an <strong>App Password</strong>. My normal Google password would not work.</p>
<p>I did the following:</p>
<ul>
<li><p>Went to <strong>Manage my Google Account → Security</strong></p>
</li>
<li><p>Confirmed <strong>2-Step Verification</strong> was enabled</p>
</li>
<li><p>Searched for <strong>App Passwords</strong></p>
</li>
<li><p>Created a new password named <em>Cloudflare SMTP</em></p>
</li>
<li><p>Copied the 16-character code</p>
</li>
</ul>
<p>I needed that code for the next step.</p>
<hr />
<h2 id="heading-phase-3-configure-gmail-send-mail-as">Phase 3: Configure Gmail “Send Mail As”</h2>
<p>This is what makes the whole setup feel seamless.</p>
<ul>
<li><p>I opened Gmail on the web</p>
</li>
<li><p>Went to <strong>Settings → See all settings → Accounts and Import</strong></p>
</li>
<li><p>Under <strong>Send mail as</strong>, clicked <strong>Add another email address</strong></p>
</li>
</ul>
<h3 id="heading-entering-the-details">Entering the Details</h3>
<ul>
<li><p><strong>Name:</strong> My name as I want it to appear</p>
</li>
<li><p><strong>Email address:</strong> <a target="_blank" href="mailto:contact@yourdomain.com"><code>contact@yourdomain.com</code></a></p>
</li>
<li><p><strong>Treat as an alias:</strong> <strong>Unchecked</strong></p>
</li>
</ul>
<p>That last checkbox matters. Leaving it unchecked ensures recipients see my custom domain as the sender, not “on behalf of <a target="_blank" href="http://gmail.com">gmail.com</a>.”</p>
<h3 id="heading-smtp-settings">SMTP Settings</h3>
<ul>
<li><p><strong>SMTP Server:</strong> <a target="_blank" href="http://smtp.gmail.com"><code>smtp.gmail.com</code></a></p>
</li>
<li><p><strong>Port:</strong> <code>587</code> (TLS)</p>
</li>
<li><p><strong>Username:</strong> My Gmail address (<a target="_blank" href="mailto:your.name@gmail.com"><code>your.name@gmail.com</code></a>)</p>
</li>
<li><p><strong>Password:</strong> The App Password from Phase 2</p>
</li>
</ul>
<p>After clicking <strong>Add Account</strong>, Google sent a confirmation email to my custom address. Cloudflare immediately forwarded it to my Gmail inbox. I confirmed it, and that was it.</p>
<hr />
<h2 id="heading-the-verdict">The Verdict</h2>
<p>Once everything was configured:</p>
<ul>
<li><p>Incoming mail hit Cloudflare’s edge network and arrived instantly</p>
</li>
<li><p>Outgoing mail went through Google’s high-reputation SMTP servers and avoided spam folders</p>
</li>
<li><p>Gmail’s full Gemini feature set worked exactly as intended</p>
</li>
</ul>
<p>I ended up with the professional polish of a custom domain and the most advanced consumer email AI available today, without paying for Google Workspace.</p>
<p>It’s boring.<br />It’s reliable.<br />It’s powerful.</p>
<p>Which is exactly what I want my email to be.</p>
]]></content:encoded></item><item><title><![CDATA[Why I Blog: Obsessive Research, Real Results, and Community]]></title><description><![CDATA[Blogging, for me, is all about sharing the journey—whether that’s hunting down the best value fitness tracker, figuring out how to clean up an overflowing inbox, or comparing notes on real estate tool]]></description><link>https://www.hurrikane.net/why-i-blog-obsessive-research-real-results-and-community</link><guid isPermaLink="true">https://www.hurrikane.net/why-i-blog-obsessive-research-real-results-and-community</guid><category><![CDATA[Blogging]]></category><category><![CDATA[optimization]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Thu, 28 Aug 2025 19:47:59 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68aa6f21f8782a55b8a9c4c7/12c44d1e-2159-4952-b7df-a361703829af.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Blogging, for me, is all about sharing the journey—whether that’s hunting down the best value fitness tracker, figuring out how to clean up an overflowing inbox, or comparing notes on real estate tools and side hustles. Here’s why I keep coming back to my keyboard:</p>
<ul>
<li><p><strong>To Share the Research Rabbit Holes:</strong> I spend a lot of time testing, reading, and obsessing over what actually works. If a review or walk-through helps someone skip a headache (or a costly mistake), it’s 100% worth it.</p>
</li>
<li><p><strong>To Get—and Give—Recommendations:</strong> My posts are open invitations for feedback. Readers have tipped me off to apps, podcasts, and money-saving tricks I likely would’ve found otherwise.</p>
</li>
<li><p><strong>For My Own Reference:</strong> Honestly, sometimes I forget which calendar app finally “clicked” for me. Blogging isn’t just external—it’s also my searchable, living notebook.</p>
</li>
<li><p><strong>To Connect With Like-Minded Folks:</strong> Whether you’re finding your way in personal finance, getting your fitness routine sorted, or just want to organize digital chaos, there’s a ton of value in good conversation and honest experiences.</p>
</li>
<li><p><strong>To Cut Through the Noise:</strong> The internet is packed with sponsored (ie: paid for advertising) “best of” lists and generic reviews. My goal is to break it down in real, practical terms—no fluff or BS, just what holds up over time in the real world.</p>
</li>
<li><p><strong>Because It’s Fun:</strong> There's satisfaction in wrapping up a project and saying, “Hey, here’s what I learned—maybe it’ll save you some time.”</p>
</li>
<li><p><strong>To Build Trust:</strong> I don’t have sponsors or hidden agendas. When I recommend something, it’s because I genuinely use it.</p>
</li>
</ul>
<p>So, why do I blog? To share wins, fails, and honest reviews. To learn from others. And perhaps to build a small corner of the internet where we can swap stories and optimize whatever’s next.</p>
]]></content:encoded></item><item><title><![CDATA[Breaking Out: Why I Migrated to Android After 14 Years of iPhone]]></title><description><![CDATA[There comes a moment in every technologist’s life when the tools you use start holding you back, rather than setting you free. For me—a cybersecurity specialist who’s spent years analyzing digital ecosystems—that moment came when I realized my iPhone...]]></description><link>https://www.hurrikane.net/breaking-out-why-i-migrated-to-android-after-14-years-of-iphone-a-cybersecurity-pros-journey</link><guid isPermaLink="true">https://www.hurrikane.net/breaking-out-why-i-migrated-to-android-after-14-years-of-iphone-a-cybersecurity-pros-journey</guid><category><![CDATA[iphone]]></category><category><![CDATA[Android]]></category><category><![CDATA[mobile]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Thu, 28 Aug 2025 17:52:39 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756412208632/8aef2dde-a073-4367-9fb8-cd5248e7f173.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>There comes a moment in every technologist’s life when the tools you use start holding you back, rather than setting you free. For me—a cybersecurity specialist who’s spent years analyzing digital ecosystems—that moment came when I realized my iPhone, after 14 loyal years, simply wouldn’t let me work or customize the way I needed. And as I’d soon discover, I was far from alone.</em></p>
<p><strong>Breaking Out of Walled Gardens</strong></p>
<p>I first tried iPhone in 2011, right after the 4S launch. Over a decade, I appreciated Apple’s smooth design, privacy marketing, and seamless integration. But as Apple’s grip tightened, convenience morphed into constraint—customization was strictly limited, sideloading apps not possible, and inter-app workflows restricted by design.</p>
<p>This wasn’t just my complaint. Many who’ve walked the same path echo this frustration:</p>
<blockquote>
<p><strong><em>“The trouble with iOS is how trapped you feel over time. When people ask why I switched, my answer is: I wanted a phone that fit me, not the other way around.” —TechWithDom</em></strong></p>
</blockquote>
<p><strong>The Switch: Android Unlocked</strong></p>
<p>Picking up a Samsung S25 Ultra was a revelation—the freedom to personalize, swap core system apps, and dive into features Apple never allowed felt immediate. This newfound flexibility wasn’t a gimmick: it made my daily workflow, for forensics and finance, actually fit my needs.</p>
<p>Others consistently highlight this, too:</p>
<blockquote>
<p><strong><em>“Android offers a massive range of options… Foldables, fast charging, smoother screens. If you’re bored with ‘same old’ hardware, it’s a breath of fresh air.” —Pete Matheson</em></strong></p>
</blockquote>
<p>Still, it wasn’t perfect. Samsung’s bloatware and Galaxy AI felt like clutter—though, crucially, Android allowed me to remove or replace nearly every unwanted layer and switch to Google-native or open-source options.</p>
<blockquote>
<p>“Swapping defaults is something iOS never let me do. On Android, you build your ideal setup piece by piece.” —r/Android</p>
</blockquote>
<p><strong>iPhone vs Android: The Table</strong></p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Feature</strong></td><td><strong>iPhone (iOS)</strong></td><td><strong>Android (S25 Ultra/Pixel XL)</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Customization</td><td>Very limited</td><td>Extensive</td></tr>
<tr>
<td>Default Apps</td><td>Locked down</td><td>User-selectable</td></tr>
<tr>
<td>Sideloading Apps</td><td>Not allowed</td><td>Easy/Supported</td></tr>
<tr>
<td>Device Automation</td><td>Basic (Shortcuts)</td><td>Advanced (Tasker, etc.)</td></tr>
<tr>
<td>Privacy Controls</td><td>Strong but closed</td><td>Strong if configured right</td></tr>
<tr>
<td>AI Assistants</td><td>Siri</td><td>Gemini, Perplexity, 3rd party</td></tr>
</tbody>
</table>
</div><blockquote>
<p><strong><em>“The biggest difference is speed and flexibility. Unlocking, copying, even setting up automation—the whole phone adapts to you, not the other way around.” —Pete Matheson</em></strong></p>
</blockquote>
<p><strong>Security Pro Tips: Hardening Android</strong></p>
<p>Android’s openness is both its risk and its advantage—a sentiment echoed across other switchers. My own moves:</p>
<ul>
<li><p>Disable unnecessary cloud/services</p>
</li>
<li><p>Rigorous app permission management</p>
</li>
<li><p>Setup of work profiles for separation</p>
</li>
<li><p>Regular OS/app audits (InviZible, Hypatia) - On my plan but hasn’t happened yet</p>
</li>
</ul>
<blockquote>
<p><strong><em>“The potential risks are real—check permissions, use open-source where you can, and don’t be afraid to use work profiles or sandboxes.” —Advice from security-minded blog posts</em></strong></p>
</blockquote>
<p><strong>Everyday Productivity: Real Benefits</strong></p>
<p>My daily tools now include deep automation (Tasker), custom scripts, cross-platform file management, and rapid testing—all things iOS forbade.</p>
<p>This sentiment is echoed widely:</p>
<blockquote>
<p><strong><em>“It’s stuff I didn’t realize I was missing. Setting up my home screen exactly how I wanted—suddenly, my phone felt really mine.” —r/samsung Reddit user</em></strong></p>
</blockquote>
<p>Yet, some caution that certain iOS-exclusive apps or Apple ecosystem bonuses (like iMessage, Apple Watch) can be hard to leave behind—a reality I experienced briefly, but was able to overcome by choosing platform-agnostic tools.</p>
<p><strong>Switching: Tips from the Field</strong></p>
<p>Bloggers and users offer this advice:</p>
<ul>
<li><p>Take time to map all your core workflows to cross-platform apps before switching</p>
</li>
<li><p>Use migration tools for contacts, photos, and calendar—it’s easier now than ever before</p>
</li>
<li><p>Don’t just try Android for a day—immerse yourself for a week or two</p>
</li>
</ul>
<p><strong>Final Take</strong></p>
<p>If you’re on the fence, run Android for a week. Configure, customize, and audit it like you mean it. If—like me and many others—you thrive on agility, openness, and control, you might just wish you’d switched sooner. Share your own migration stories or pro tips in the comments below!</p>
]]></content:encoded></item><item><title><![CDATA[How to Seamlessly Use AI in Your Everyday Life]]></title><description><![CDATA[When folks talk about artificial intelligence, it can all sound like marketing—“transforming the world,” “making daily life easier,” blah blah blah. But here’s my reality check: AI isn’t some distant concept. I use it, literally, every single day. An...]]></description><link>https://www.hurrikane.net/how-to-seamlessly-use-ai-in-your-everyday-life</link><guid isPermaLink="true">https://www.hurrikane.net/how-to-seamlessly-use-ai-in-your-everyday-life</guid><category><![CDATA[AI]]></category><category><![CDATA[#ai-tools]]></category><category><![CDATA[ai agents]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sun, 24 Aug 2025 18:43:40 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756061971853/99bb9c6a-ef8b-424a-9e8b-ff1b83f455c8.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When folks talk about artificial intelligence, it can all sound like marketing—“transforming the world,” “making daily life easier,” blah blah blah. But here’s my reality check: AI isn’t some distant concept. I use it, literally, every single day. And I’m definitely not alone.</p>
<p>Back in 2023, at the <a target="_blank" href="https://youtu.be/DxENa8eXO-8">SANS DFIR Summit</a>, <a target="_blank" href="https://www.linkedin.com/in/matt-edmondson-759aab2b/">Matt Edmondson</a> opened my eyes to just how accessible and operational AI had become. That one demo was the spark, and now? I can’t imagine running my day without it.</p>
<h2 id="heading-how-many-people-really-use-ai">How Many People Really Use AI?</h2>
<p>Here’s what’s wild—recent studies in 2025 show <strong>over a third of people worldwide use AI daily</strong>, whether they realize it or not. Some estimates say as high as 66% are using AI-powered services—recommendations, search assistants, smart filters, you name it, but they don’t realize it. In the U.S., about 27% admit to using AI daily, but that’s likely underreported because so much AI hides in “normal” apps. That’s hundreds of millions of people relying on these tools every day.</p>
<p>What’s going on isn’t magic. It’s practical, behind-the-scenes ops, saving time on the boring stuff and freeing up more space for thinking and doing.</p>
<h2 id="heading-my-day-to-day-with-ai">My Day-to-Day with AI</h2>
<p>For me, AI isn’t just “big data” or theory. Here’s what it does for me, and how it actually makes a difference:</p>
<ul>
<li><p><strong>Recurring searches and notifications.</strong> I tell it what I want to know about, then tune results in via simple conversations. Now it knows what stuff I actually care about. If I want to keep appraised, I can set this to a recurring update; literally “tell me if/when this changes or updates are announced.” Done.</p>
</li>
<li><p><strong>Conference CFPs.</strong> I never miss a call for papers because AI tracks when conferences I’m interested in opens/closes the CFP.</p>
</li>
<li><p><strong>Sales and discounts.</strong> I spam-filter every marketing email, but AI intelligently notifies me when there’s a deal on something I actually use or want. Example: “I’m looking for a deal on $product. Let me know if a sale occurs in the future of at least 25% discount.” Boom.</p>
</li>
<li><p><strong>News and rumors.</strong> I tracked every twist and turn of the recent Pixel 10 rumor mill, right up to the announcement, without having to doomscroll.</p>
</li>
<li><p><strong>Drafting docs.</strong> Whether it’s an email, blog, or team memo, AI shaves hours off writing, revising and cleanup.</p>
</li>
<li><p><strong>Marketplace and team ops.</strong> Writing annual reviews (including my own), sending team recaps, even cranking out Facebook Marketplace ads is faster and sharper.</p>
</li>
<li><p><strong>Research.</strong> The old way: crawl Reddit, tech blogs, niche forums for hours. Now: ask, get context, validate, done.</p>
</li>
<li><p><strong>Product releases, pro/con comparisons, and price tracking.</strong> AI does the grunt work—finds discounts too. I’ve easily saved hundreds by letting it vet the deals. Before I click “Buy,” ask AI. It’s that simple.</p>
</li>
<li><p><strong>Planning—projects, home DIY, travel.</strong> It handles when, where, cost, even style preferences. From daily Amazon purchases to “find all expensable purchases for my side business on Amazon and email receipts to Expensify for processing” — all automated.</p>
</li>
<li><p><strong>Domain and site migrations.</strong> I migrated my entire blog from Medium to Hashnode this morning with all the historical details, using Perplexity + Comet, no sweat.</p>
</li>
<li><p><strong>Travel data.</strong> Moved all my travel history from the past few years, which is definitely not trivial, from TripIt to Polarsteps, which has zero support for imports. AI did all the heavy lifting.</p>
</li>
</ul>
<h2 id="heading-where-ai-still-falls-short">Where AI Still Falls Short</h2>
<p>It’s not all perfect. The biggest headaches? Ecosystem lock-in and integrations. Apple, Google, and Microsoft each want you in their “walled garden.” Too many great tools just don’t play nice together—yet.</p>
<p>That’s why I stick with tools like Perplexity (especially with Comet for browser workflows). ChatGPT’s good in a pinch, but Perplexity is my daily driver.</p>
<p>There’s hope, though. The first shots of the “AI browser wars” are landing. For operational professionals who demand open, flexible solutions, the future looks a lot more interesting.</p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>I’m saving time, money, and stress thanks to AI—not by buying into the “revolution,” but by letting computers do what they’re good at, and freeing up my mental cycles for the real work. There’s a long way to go before everything connects the way it should, but if you’re not handing off your routine ops to AI already, you’re missing out. Srsly, get on the bus! Experiment. Tweak your workflows. The tools are here, and using them for what actually matters is the key before you get left in the dust.</p>
]]></content:encoded></item><item><title><![CDATA[Discover Why I Transitioned from Medium to Hashnode and Why You Might Want to Consider It]]></title><description><![CDATA[Hey fellow tech nerds and cybersecurity professionals! 👋
I'll be honest—I'm not exactly what you'd call a prolific blogger. I write maybe a handful of articles per year when something really strikes me as worth sharing. So when I do put fingers to k...]]></description><link>https://www.hurrikane.net/discover-why-i-transitioned-from-medium-to-hashnode-and-why-you-might-want-to-consider-it</link><guid isPermaLink="true">https://www.hurrikane.net/discover-why-i-transitioned-from-medium-to-hashnode-and-why-you-might-want-to-consider-it</guid><category><![CDATA[Blogging]]></category><category><![CDATA[Hashnode]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sun, 24 Aug 2025 17:54:27 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756061883577/4cc76d50-28f5-48b5-8c34-a2761671c8a6.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey fellow tech nerds and cybersecurity professionals! 👋</p>
<p>I'll be honest—I'm not exactly what you'd call a prolific blogger. I write maybe a handful of articles per year when something really strikes me as worth sharing. So when I do put fingers to keyboard, I want to make sure I'm reaching the right audience and getting the most value from the platform I'm using.</p>
<p>That's exactly why I recently migrated from Medium to Hashnode, and spoiler alert: it may be one of the best decisions I've made for my limited but focused writing efforts.</p>
<h3 id="heading-the-medium-dilemma-great-platform-wrong-audience">The Medium Dilemma: Great Platform, Wrong Audience</h3>
<p>Don't get me wrong—Medium is a solid platform. The writing experience is clean, the reach can be substantial, and for $5/month, you get access to a ton of quality content. But here's the thing: as someone who writes primarily about cybersecurity, tech tools, and the occasional deep dive into digital privacy, I found myself shouting into the void more often than not.</p>
<p>Medium's audience is incredibly diverse, which is both a blessing and a curse. While you might stumble upon unexpected readers, your carefully crafted analysis of the latest threat landscape or that detailed breakdown of why you switched password managers might get lost in a sea of lifestyle content and entrepreneurship think pieces.</p>
<h3 id="heading-enter-hashnode-built-for-people-like-us">Enter Hashnode: Built for People Like Us</h3>
<p>Hashnode feels different from the moment you start exploring. It's built by developers, for developers—and by extension, for all of us in the broader tech ecosystem. The community here actually <em>gets</em> what we're talking about. When I write about network security configurations or dive into the technical details of why I chose one tool over another, I'm not explaining basic concepts to a general audience—I'm having a conversation with peers.</p>
<p>The value proposition here honestly exceeds what I was getting from Medium's $5/month subscription. Not only is Hashnode free for writers, but the engagement quality is significantly higher. Comments are thoughtful, discussions are technical when they need to be, and the audience genuinely cares about the same things I do. I hope to be a part of this community.</p>
<h3 id="heading-the-migration-easier-than-expected">The Migration: Easier Than Expected</h3>
<p>Now, here's where Hashnode really impressed me. I was dreading the migration process—you know how these things usually go. Export here, format there, manually recreate everything, spend your weekend fixing broken links...</p>
<p>Nope. Not with Hashnode.</p>
<p>The migration tool is genuinely impressive. I connected my Medium account, selected the articles I wanted to bring over, and hit the magic button. Within about 10 minutes, everything was imported—formatting intact, images in place, the works. I only had to touch up a couple of graphics that didn't quite translate perfectly, but even that was minimal work.</p>
<p>Total time from start to finish? Maybe 15 minutes. I've spent longer deciding what to have for lunch.</p>
<h3 id="heading-the-one-speed-bump-and-how-hashnodes-community-saved-the-day">The One Speed Bump (And How Hashnode's Community Saved the Day)</h3>
<p>Of course, no migration is completely seamless. After getting through the process, I hit a TLS certificate error that had me scratching my head. For a moment, I thought I'd have to dive into some complex troubleshooting or reach out to support.</p>
<p>Then I remembered to check the FAQ first (novel concept, I know). Sure enough, there it was: the classic "turn it off and on again" solution. Remove the domain from hashnode, save, and re-add it. Problem solved in under two minutes.</p>
<p>It's refreshing when the simple solutions actually work, isn't it? And even more refreshing when a platform's documentation is comprehensive enough to anticipate these common hiccups.</p>
<h3 id="heading-the-bottom-line">The Bottom Line</h3>
<p>Look, I'm not here to bash Medium or tell you to abandon ship if it's working for you. But if you're like me—someone who writes occasionally about technical topics and wants to reach an audience that actually speaks your language—Hashnode is worth serious consideration.</p>
<p>The migration process couldn't be easier, the community is engaged and knowledgeable, and the platform itself is designed with our needs in mind. Plus, did I mention it's free? I just spent my weekend cleaning up the subscription fluff and Medium was on the chopping block (details <a target="_blank" href="https://www.hurrikane.net/cutting-the-digital-fat-my-weekend-spent-pruning-online-services">here</a>).</p>
<p>For someone who blogs sparingly but values quality engagement over quantity, Hashnode delivers on its promise. The $5/month I was spending on Medium is now going toward my coffee budget, and I'm reaching a more relevant audience than ever before.</p>
<h3 id="heading-whats-next">What's Next?</h3>
<p>I'm planning to be more active here on Hashnode—the community and platform have definitely inspired me to share more of the technical deep dives and tool evaluations that I think could benefit fellow professionals. If you're in the cybersecurity space or just love nerding out about tech tools and best practices, give me a follow and let's connect!</p>
<p>Have you made the jump to Hashnode? Thinking about it? I'd love to hear about your experience in the comments below.</p>
<p><strong>UPDATE 8/28/25</strong>: Literally days after migrating I’ve had as many views as I had in 18 months at Medium. Wow! I also had issues with Google indexing due to Medium actively blocking authors who weren’t top tier writers. I submitted my sitemap at hashnode and boom, the entire blog has now been indexed. I’m stoked that I’m on the path of a much higher reader base…give me motivation to write/share more. What a great decision it was to migrate off Medium!</p>
]]></content:encoded></item><item><title><![CDATA[Cutting the Digital Fat: My Weekend Spent Pruning Online Services]]></title><description><![CDATA[Let’s face it—as ops/cybersecurity professionals, we tend to accumulate and forget online subscriptions like they’re Pokémon. This weekend, I decided to confront the issue: what am I actually using, what’s just driven by FOMO, and what’s quietly drai...]]></description><link>https://www.hurrikane.net/cutting-the-digital-fat-my-weekend-spent-pruning-online-services</link><guid isPermaLink="true">https://www.hurrikane.net/cutting-the-digital-fat-my-weekend-spent-pruning-online-services</guid><category><![CDATA[personal finance]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sun, 24 Aug 2025 17:26:53 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756062041374/f57557ff-cad3-4ea2-a165-d2021cab48fa.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Let’s face it—as ops/cybersecurity professionals, we tend to accumulate and forget online subscriptions like they’re Pokémon. This weekend, I decided to confront the issue: what am I actually using, what’s just driven by FOMO, and what’s quietly draining my wallet while expanding my attack surface?</p>
<h2 id="heading-scorecard-services-kept-vs-chopped">Scorecard: Services Kept vs. Chopped</h2>
<h3 id="heading-kept-core-tools-and-occasional-joys"><strong>Kept: Core Tools and Occasional Joys</strong></h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Service</strong></td><td><strong>Annual Cost</strong></td><td><strong>Notes</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Google Fi</td><td>$600</td><td>Might downgrade if I’m not traveling as much.</td></tr>
<tr>
<td>Amazon Ad-Free Video</td><td>$36</td><td>Cheap and easy ad-free video, which I can enable/disable on a whim as needed (traveling).</td></tr>
<tr>
<td>Perplexity</td><td>$200</td><td>Invaluable for research/ops efficiency. As Gemini grows this may end up being a swap but I do love Perplexity.</td></tr>
<tr>
<td>Amazon Prime</td><td>$139</td><td>Shopping, streaming, and occasional tech deals.</td></tr>
<tr>
<td>Spotify</td><td>$99</td><td>Could swap to YT Music next year to get YouTube ad free also; weighing value.</td></tr>
<tr>
<td>Microsoft 365</td><td>$70</td><td>Productivity, cloud—I absolutely need Powerpoint so there’s not really a choice here. I could buy the software but the storage is nice, though I did just buy a lifetime license to Internxt that may factor in next year.</td></tr>
<tr>
<td>Others (Oura, Fastmail, Trakt, etc.)</td><td>$20–$70 ea</td><td>Used regularly or improve daily life.</td></tr>
</tbody>
</table>
</div><h3 id="heading-chopped-what-got-the-axe-and-why"><strong>Chopped: What Got the Axe and Why</strong></h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Service</strong></td><td><strong>Annual Cost</strong></td><td><strong>Why It’s Gone</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Strava</td><td>$80</td><td>Free tier ≈ everything I use, so bye for now.</td></tr>
<tr>
<td>Tesla Premium Conn.</td><td>$99</td><td>Handy, but the car functions fine without it via bluetooth.</td></tr>
<tr>
<td>Monarch Money</td><td>$99</td><td>Like it, but more informational than necessity after years of use.</td></tr>
<tr>
<td>YouTube Premium</td><td>$140</td><td>Was redundant after keeping Spotify…which I just renewed. I don’t watch much Youtube so Spotify will remain until next year, then likely swapped out for this.</td></tr>
<tr>
<td>Netflix</td><td>$300</td><td>Great, but not worth it for my low usage. I learned that I can do Amazon Prime Video ad-free for $3/mo. A swap here is a no-brainer.</td></tr>
</tbody>
</table>
</div><h2 id="heading-surprises-trends-amp-lessons-learned">Surprises, Trends &amp; Lessons Learned</h2>
<ul>
<li><p><strong>Annual Cost Sat Higher Than Expected:</strong> Did the math—total recurring “online services” bill hit $2,400/year before cuts. <em>That’s $200/mo…a real chunk of tech budget.</em></p>
</li>
<li><p><strong>Redundancy Crept In:</strong> Had both Spotify and YouTube Premium. Killed one—plan to swap next time for more value.</p>
</li>
<li><p><strong>Niche Services Add Up:</strong> Even a few $5/month utilities and “specialty” apps tally into real money over a year.</p>
</li>
<li><p><strong>Security/Privacy Decides Some “Kept” Services:</strong> Fastmail, 1Password, M365 —no-brainers for someone in cybersecurity, but always revisited for alternative pricing.</p>
</li>
</ul>
<h2 id="heading-security-wins">Security Wins</h2>
<ul>
<li><p><strong>Lowered Attack Surface:</strong> Closing unnecessary accounts means fewer breach alerts, less password rotation, and a tighter digital footprint.</p>
</li>
<li><p><strong>Annual “Purge” Is a Must:</strong> This is going to be a yearly ritual. Next year: even more ruthless.</p>
</li>
</ul>
<h2 id="heading-results">Results</h2>
<ul>
<li><p>By the end of the weekend, I had:</p>
<ul>
<li><p>Reviewed all my paid and unpaid online services</p>
</li>
<li><p>Kept about a dozen truly valuable tools (see table)</p>
</li>
<li><p>Lowered my annual online service spend by ~$1,200</p>
</li>
<li><p>Cut my digital attack surface by closing accounts and eliminating duplicate logins</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-closing-thoughts">Closing Thoughts</h2>
<p>Decluttering digital life is more than budgeting—it’s opsec in action. Tools and subscriptions should serve you…not the other way around. My advice: audit ruthlessly, and let the data (not nostalgia) decide.</p>
]]></content:encoded></item><item><title><![CDATA[My Dual Adblocking Setup: AdGuard + ControlD = Champion Browsing]]></title><description><![CDATA[Recently, I decided to overhaul my approach to adblocking and tested several options. After a bit of trial and error, AdGuard emerged as my go-to solution on iPhone — especially because content blocking is limited to Safari due to iOS restrictions. C...]]></description><link>https://www.hurrikane.net/my-dual-adblocking-setup-adguard-controld-champion-browsing-2faf4e466e58</link><guid isPermaLink="true">https://www.hurrikane.net/my-dual-adblocking-setup-adguard-controld-champion-browsing-2faf4e466e58</guid><category><![CDATA[ad blockers]]></category><category><![CDATA[internet]]></category><category><![CDATA[privacy]]></category><category><![CDATA[Online security]]></category><category><![CDATA[#internetsafety]]></category><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Fri, 08 Aug 2025 13:28:20 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756052993029/8290467e-49da-40e1-9bf5-0b770f7e868f.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Recently, I decided to overhaul my approach to adblocking and tested several options. After a bit of trial and error, <strong>AdGuard</strong> emerged as my go-to solution on iPhone — especially because content blocking is <em>limited</em> to Safari due to iOS restrictions. Chrome (and every browser other than Safari, really) just can’t do native or extension-based content blocking on iOS, which is <em>super annoying</em> for anyone who prefers Chrome’s syncing ecosystem.</p>
<p>For Windows and Mac, I stuck with <strong>Chrome</strong> — paired with the AdGuard Chrome extension. This combo has been genuinely effective so far. My web is noticeably quieter, cleaner, and faster.</p>
<p>Still going strong in the background is <a target="_blank" href="https://medium.com/@brianolsonsec/enhancing-home-network-security-with-controld-a-comprehensive-guide-to-dns-home-72408c10c768"><strong>ControlD</strong></a> as my DNS provider, which contributes an extra layer of ad/tracker blocking across all my devices. ControlD costs just $20/year (hard to beat for the broad privacy protections and fine-tuned filtering). Between AdGuard and ControlD, the <em>online experience is pretty fantastic</em> — fewer interruptions, less tracking, and cleaner pages all around.</p>
<h3 id="heading-cost-breakdown-amp-tips">Cost Breakdown &amp; Tips</h3>
<ul>
<li><p><strong>AdGuard License:</strong> At some point, I picked up a lifetime AdGuard license (honestly, can’t recall exactly what I paid), but it’s currently $80 for individuals. They’re known to roll out massive sales, so if you’re interested, <em>keep an eye out around Black Friday and other holidays</em>. You might snag lifetime access for half price!</p>
</li>
<li><p><strong>ControlD:</strong> Standard pricing is $20/year. Offers lots of customizable blocking beyond the standard DNS-level ads, including trackers, malware, and parental controls.</p>
</li>
</ul>
<h3 id="heading-quick-tips-for-adblocking-pros">Quick Tips for Adblocking Pros</h3>
<ul>
<li><p><strong>iOS = Safari Only:</strong> No real way around this. If you love Chrome on mobile, stick with DNS-based blocking like ControlD for best results.</p>
</li>
<li><p><strong>Layering Works:</strong> DNS blocking + browser-based extension = much higher success rate, fewer annoying circumvention attempts from advertisers.</p>
</li>
<li><p><strong>Holiday Sales:</strong> Perfect time to score lifetime deals; bookmark vendor sites and sign up for email alerts!</p>
</li>
<li><p><strong>Bonus:</strong> Better security posture, fewer malvertising risks, and WAY less tracking.</p>
</li>
</ul>
<p>If you’re interested in wholesale blocking at the network layer, I wrote an article earlier this year specifically about <a target="_blank" href="https://medium.com/@brianolsonsec/enhancing-home-network-security-with-controld-a-comprehensive-guide-to-dns-home-72408c10c768">ControlD here</a>.</p>
<p>Update: I've discovered that AdGuard often provides significant discounts—sometimes up to 90% off on lifetime licenses. These deals are typically available through resellers rather than directly on AdGuard’s official site, so it's worth keeping an eye out if you're interested in purchasing.</p>
<p><em>If you have any recent experiences or tips with other adblockers or DNS services, let me know — I’m always hunting for better privacy and performance tweaks.</em></p>
]]></content:encoded></item><item><title><![CDATA[Why I Ditched Google Workspace for Fastmail (and M365): A Nerd’s Perspective]]></title><description><![CDATA[After years of wrestling with Google Workspace’s weird limits and “admin overkill,” I finally jumped ship — landing at Fastmail for email and calendar, and relying on my Microsoft 365 subscription for productivity (Word, Excel, etc.). If you run your...]]></description><link>https://www.hurrikane.net/why-i-ditched-google-workspace-for-fastmail-and-m365-a-nerds-perspective-c9752c7e6531</link><guid isPermaLink="true">https://www.hurrikane.net/why-i-ditched-google-workspace-for-fastmail-and-m365-a-nerds-perspective-c9752c7e6531</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Fri, 08 Aug 2025 12:37:14 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043110494/35212637-dd34-42c5-be98-bcaa86482467.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>After years of wrestling with Google Workspace’s weird limits and “admin overkill,” I finally jumped ship — landing at Fastmail for email and calendar, and relying on my Microsoft 365 subscription for productivity (Word, Excel, etc.). If you run your own domains or want real control over your digital footprint, let’s skip the sugarcoating: <strong>Gmail’s business tier is full of hurdles, and the “personal” version won’t let you use your own domain.</strong></p>
<p>For me, the breaking point wasn’t just a bunch of small annoyances; it was realizing how business Google accounts have bizarre restrictions, especially around Gemini (AI) integrations. Whether it’s missing access to Nest or YouTube extras, or random blocks on key features like auto-forwarding, Google makes it harder than it should be if you’re not on a personal account.</p>
<h3 id="heading-what-was-i-missing-with-gmail-business">What Was I Missing With Gmail Business?</h3>
<ul>
<li><strong>Restricted access</strong>: Unexplainable limitations event with the usage of other Google products (like Nest, YouTube premium features, or Gemini AI assistants).</li>
<li><strong>Security “features”</strong>: Stuff designed to help (guessing) mega corporations, not smaller customers or end-users. Real-life example: trying to enable a basic automation to forward receipt emails to Expensify? Nope, not an option.</li>
<li><strong>Configuration headaches</strong>: Want to do something simple (like set granular email rules, unique signatures, or custom forwarding)? Nope, flat out not an option.</li>
<li><strong>Gemini integrations hamstrung</strong>: Some of Google’s best new AI features simply don’t work on business accounts, even if you’re a paying customer at a higher Gemini tier. Why??????</li>
</ul>
<h3 id="heading-why-fastmail-rocks">Why Fastmail Rocks</h3>
<ul>
<li><strong>Full control:</strong> I can do everything I couldn’t do with Gmail without hassle. The options exist for me to make the decision how my environment works, not Google.</li>
<li><strong>Blazing fast and clean</strong>: No ads, minimal bloat, snappy search — even with many years of email.</li>
<li><strong>Privacy-first</strong>: They’re transparent about security, and there’s no Big Tech “machine learning on your inbox” angle.</li>
<li><strong>Custom domains are a breeze</strong>: DNS setup guides are straightforward, and alias management is powerful.</li>
<li><strong>Responsive support</strong>: Real, helpful humans, not offshore support scripts.</li>
<li><strong>No “workspace baggage”</strong>: Fastmail just works, and doesn’t force you into an awkward ecosystem.</li>
<li>Calendar: Only Slightly Less Great</li>
</ul>
<p>Switching off Google Calendar wasn’t as painful as I feared. Fastmail offers nearly everything I need: event invites, subscriptions, cross-device sync. What’s missing is mainly polish — like automatic address lookups when adding a location (instead, you free-text the location with no Google Maps auto-complete). It’s a trade-off, but for most operational workflows, it’s minor.</p>
<h3 id="heading-what-about-docs-sheets-etc">What About Docs, Sheets, etc.?</h3>
<p>I still love Google Docs for some stuff, but the lock-in is real. With my Microsoft 365 subscription, I get the full might of <strong>Word, Excel, and PowerPoint</strong>, and Office Online is solid for cloud work. If you’re on a higher-tier M365 plan, you can install the native desktop clients — rocket-fast, and still the gold standard for compatibility.</p>
<h3 id="heading-whats-still-google-and-why">What’s Still Google (and Why)</h3>
<p>No need to be dogmatic. Here’s what Google still does best for me:</p>
<ul>
<li><strong>Google Photos:</strong> Best-in-class AI photo search. No rival even comes close for finding old pics by object, text, or place.</li>
<li><strong>Gemini + Google Home:</strong> Smart home tinkering is way simpler if you stay in the Google ecosystem. (More on that project soon.)</li>
</ul>
<h3 id="heading-migration-tales-no-sweat-just-speed-or-not">Migration Tales: No Sweat, Just Speed (or Not)</h3>
<p>Honestly, the migration was way easier than I expected. I moved about ten years’ worth of email — roughly 250GB of data — without breaking a sweat. Sure, it took a while for everything to process, but there were no major headaches.</p>
<p>Fun fact (or frustration?): Google seems to go out of its way to throttle data transfers, crawling along at just 10–30 MB/s. Meanwhile, when moving files with Microsoft OneDrive, I watched my entire 1 Gb/s Fios uplink get maxed out (~125 MB/s) — no delays, no nonsense. It certainly felt like Google wants you to linger in their ecosystem, while Microsoft just gets the job done.</p>
<h3 id="heading-the-bottom-line">The Bottom Line</h3>
<p>Getting my core email, calendar, and docs off Google feels less like “leaving” and more like taking back control. The difference? <strong>True ownership and flexibility</strong>. Google’s relevance to my life is shrinking by the day as privacy-first, user-focused options — think Fastmail, Proton, Skiff — raise the bar.</p>
<p>If you’re running your own domain or tired of being boxed in by Google’s “take it or leave it” attitude, I can say from the trenches: the grass can absolutely be greener somewhere else.</p>
<p>And just in case anyone at Fastmail see’s this, thanks so much for making email not suck!</p>
<p>From Google? You have the technology, talent and fully capability to make Workspace amazing…c’mon…let’s make it happen!</p>
<p><em>What’s your experience moving off Google? Got productivity or privacy tips? Drop them in the comments — the community always has something to teach, and I’m here for every workflow hack.</em></p>
]]></content:encoded></item><item><title><![CDATA[How CardPointers Helped Me Maximize Credit Card Rewards (and Save Hundreds)]]></title><description><![CDATA[As someone who’s always looking for ways to optimize spending — whether it’s for travel, daily buys, or even recurring bills — credit card perks are a big deal for me. But keeping up with which card to use at which store? Honestly, it’s a hassle. Tha...]]></description><link>https://www.hurrikane.net/how-cardpointers-helped-me-maximize-credit-card-rewards-and-save-hundreds-6e995c02d322</link><guid isPermaLink="true">https://www.hurrikane.net/how-cardpointers-helped-me-maximize-credit-card-rewards-and-save-hundreds-6e995c02d322</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Fri, 01 Aug 2025 15:56:13 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756062110865/5d9368ef-bd97-47dd-aa09-27d36da65ccb.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As someone who’s always looking for ways to optimize spending — whether it’s for travel, daily buys, or even recurring bills — <strong>credit card perks</strong> are a big deal for me. But keeping up with which card to use at which store? Honestly, it’s a hassle. That’s where <a target="_blank" href="https://cardpointers.com/">CardPointers</a> came into play, and in the past year alone, it’s easily saved me hundreds of dollars by telling me exactly which card to use, right on the spot.</p>
<h3 id="heading-the-problem-too-many-cards-too-many-offers">The Problem: Too Many Cards, Too Many Offers</h3>
<p>Let’s be real: if you’re reading this, you probably have at least a few credit cards. Each comes with its own rewards categories, changing quarterly promos, and hidden merchant offers that are tough to keep track of. I got tired of missing statement credits and cash back every time I swiped the “wrong” card.</p>
<h3 id="heading-discovery-finding-cardpointers">Discovery: Finding CardPointers</h3>
<p>As a technology guy, I know there’s a tool for nearly everything. After a quick search I stumbled upon CardPointers. It’s a tool that — after a quick setup — automatically tracks all my cards, points me to hidden Amex/Chase offers, and easily tells me <strong>which card to use at every store</strong> or online checkout. Their browser extension and simple mobile app mean I never have to think twice.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043113376/89fd3d24-61ab-47ff-9419-dcf60f47722e.png" alt /></p>
<h3 id="heading-real-savings-how-does-it-actually-work">Real Savings: How Does It Actually Work?</h3>
<ul>
<li><strong>Automatic Offer Tracking:</strong> Links to your accounts (read-only, no risk of moving money), so it always finds the best current deals.</li>
<li><strong>Smart Recommendations:</strong> Standing at a Target, gas station, or booking a flight? CardPointers tells you in seconds which card will net you the biggest reward or discount.</li>
<li><strong>Never Miss a Deal:</strong> It even tells you when to activate Chase/Discover rotating categories, or when you’re eligible for Amex offers.</li>
</ul>
<p>Honestly, it’s a bit sad how much I’ve previously missed out on before using this tool.</p>
<h3 id="heading-real-talk-my-personal-wins">Real Talk: My Personal Wins</h3>
<p>Here’s how CardPointers saved me real money in the past 12 months:</p>
<ul>
<li>I got a $25 restaurant credit after taking my team out to dinner…twice.</li>
<li>Scored extra 10% cash back at an online stores during a promo I would have missed.</li>
<li>Took advantage of several Amex Offers (think: Uber credits, dining deals), flagged automatically for me.</li>
</ul>
<p>All of this added up to well over $300 in savings, just by following the recommendations the app gave me.</p>
<h3 id="heading-security-and-privacy-notes">Security and Privacy Notes</h3>
<p>Coming from a security background, I appreciate that <strong>CardPointers uses read-only access</strong> and follows a privacy-first mindset. No sensitive card data is stored; it’s just there to maximize your rewards.</p>
<h3 id="heading-final-thoughts">Final Thoughts</h3>
<p>If you juggle multiple credit cards and want an <em>easy</em> way to earn more, save more, and never miss out on hidden perks — CardPointers is a no-brainer. I only wish I’d started using it sooner.</p>
<p><strong>Have you used CardPointers, or another tool, to optimize your rewards? Drop your stories in the comments — I’d love to hear how much you’ve saved!</strong></p>
]]></content:encoded></item><item><title><![CDATA[AI-Driven Threats: How Attackers Are Using Artificial Intelligence in 2025]]></title><description><![CDATA[The cybersecurity landscape in 2025 is defined by a paradox: the same artificial intelligence (AI) tools designed to protect digital infrastructure are now being used by attackers to their advantage. From hyper-personalized phishing campaigns to self...]]></description><link>https://www.hurrikane.net/ai-driven-threats-how-attackers-are-using-artificial-intelligence-in-2025-a762f87908aa</link><guid isPermaLink="true">https://www.hurrikane.net/ai-driven-threats-how-attackers-are-using-artificial-intelligence-in-2025-a762f87908aa</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sat, 26 Apr 2025 23:52:52 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043128461/157c48df-b5f9-40d6-9bf3-8686cd2a5915.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The cybersecurity landscape in 2025 is defined by a paradox: the same artificial intelligence (AI) tools designed to protect digital infrastructure are now being used by attackers to their advantage. From hyper-personalized phishing campaigns to self-evolving ransomware, AI has become the ultimate force multiplier for cybercriminals. This article breaks down how adversaries are leveraging AI in 2025, the real-world impacts on businesses and individuals, and actionable strategies to defend against these next-generation threats.</p>
<h3 id="heading-the-new-era-of-ai-powered-phishing-and-vishing">The New Era of AI-Powered Phishing and Vishing</h3>
<p>Phishing emails riddled with typos and awkward phrasing are relics of the past. In 2025, attackers use generative AI platforms like ChatGPT and DeepSeek to create messages that are nearly indistinguishable from legitimate communications. These tools analyze publicly available data, such as LinkedIn profiles, social media posts, or corporate newsletters, to create context-aware lures. For example, a fake invoice might reference a recent project deadline or mimic a colleague's writing style.</p>
<p>Voice phishing (vishing) has also evolved. Attackers now deploy AI-generated voice clones to impersonate executives during phone or video calls. In one 2024 case, a Hong Kong finance worker transferred $25 million to fraudsters after a deepfake video call with what appeared to be the company’s CFO and colleagues. The deepfakes were trained on publicly available conference recordings, highlighting how even low-resolution video footage can be used for malicious purposes.</p>
<p><strong>Why it works</strong>:</p>
<ul>
<li><strong>Personalization</strong>: AI scrapes data to tailor messages to individual roles, industries, or even personal interests.</li>
<li><strong>Scale</strong>: Automated tools generate thousands of unique phishing emails per hour, bypassing traditional spam filters.</li>
<li><strong>Adaptability</strong>: If a campaign fails, machine learning algorithms analyze detection patterns and refine tactics for the next wave.</li>
<li><strong>Flawless grammar and professional tone:</strong> No typos, awkward phrasing, or broken English.</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043122647/236112d2-95ca-45d4-8b66-0431670eb9e6.jpeg" alt /></p>
<p>AI’s Improvement on Phishing Emails</p>
<h3 id="heading-deepfake-social-engineering-trust-no-one-without-verification">Deepfake Social Engineering: Trust No One (Without Verification)</h3>
<p>Deepfake technology has moved beyond viral memes to become a cornerstone of corporate fraud. In 2025, attackers use AI to create synthetic media that mimics the appearance of executives, government officials, or trusted partners. The $25 million success previously mentioned used footage from public webinars to replicate voices and mannerisms, convincing an employee to authorize fraudulent transfers.</p>
<p><strong>Key tactics</strong>:</p>
<ul>
<li><strong>CEO or CFO Fraud</strong>: Fake audio or video of a CEO demanding urgent wire transfers.</li>
<li><strong>Fake Technical Support</strong>: Deepfake agents posing as IT staff to gain remote access.</li>
<li><strong>Disinformation Campaigns</strong>: Fabricated videos of executives making inflammatory statements to manipulate stock prices.</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043123944/c455c0ef-bea6-4f85-a4ff-ac7b1d556d68.jpeg" alt /></p>
<p>Deepfake Process</p>
<h3 id="heading-autonomous-malware-and-ransomware-20">Autonomous Malware and Ransomware 2.0</h3>
<p>Malware is no longer static code. AI-driven variants, like Agentic Learning Malware, analyze their environment in real-time, adapting to evade detection. For instance, if a strain detects it’s running in a sandbox, it will delay malicious activity or mimic benign processes. This adaptability makes traditional signature-based antivirus tools nearly obsolete.</p>
<p>Ransomware has also embraced AI through Ransomware-as-a-Service (RaaS) platforms. These tools automatically identify high-value targets (e.g., hospitals, law firms) and adjust ransom demands based on the victim’s revenue or insurance coverage. The March 2025 Blue Yonder attack exemplifies this trend: AI-powered ransomware crippled supply chain software used by Starbucks and Morrisons, causing store closures and shipment delays.</p>
<p><strong>Defense gap</strong>: Legacy systems struggle to keep pace with AI’s iterative learning. A 2025 Splashtop study found that organizations using AI-augmented security tools reduced breach response times by 96% compared to those relying on manual methods.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043125481/61cb678d-bd52-41f4-9267-119a09b6a67c.png" alt /></p>
<p>Static Malware Behavior vs. AI-Driven Malware: Key Differences</p>
<h3 id="heading-credential-stuffing-and-ai-powered-password-cracking">Credential Stuffing and AI-Powered Password Cracking</h3>
<p>Weak passwords are easier than ever to exploit. AI models, such as PassGAN (Password Generative Adversarial Network), can crack 51% of common passwords in under a minute by analyzing patterns in leaked datasets. In 2025, credential-stuffing bots use these models to test billions of username and password combinations across sites, often succeeding within hours.</p>
<p><strong>The numbers</strong>:</p>
<ul>
<li>18-character numeric passwords: Cracked in &lt;1 day.</li>
<li>10-character alphanumeric + symbols: Cracked in ~1 week.</li>
</ul>
<p>Even multi-factor authentication (MFA) isn’t foolproof. Attackers bypass SMS-based codes using SIM-swapping or AI-driven social engineering.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043126933/5e3992d0-6978-4789-9a49-4e2debdae399.png" alt /></p>
<p>Password Complexity vs. AI Cracking Time (2025 Benchmarks)</p>
<h3 id="heading-defense-strategies-fighting-ai-with-ai">Defense Strategies: Fighting AI with AI</h3>
<h3 id="heading-1-deploy-ai-driven-threat-detection">1. Deploy AI-Driven Threat Detection</h3>
<p>Modern security tools use machine learning to establish network baselines and flag anomalies. For example, an AI might notice that a device accessing sensitive files at 3 a.m. is statistically unusual and automatically isolate it. Darktrace’s 2025 survey found that 74% of organizations using AI-augmented defenses successfully neutralized ransomware before it was successful.</p>
<h3 id="heading-2-adopt-zero-trust-architecture">2. Adopt Zero-Trust Architecture</h3>
<p>Assume every user and device is compromised. Zero-trust frameworks require continuous authentication, limiting access to only what’s necessary. After the Blue Yonder breach, companies like Sainsbury’s mitigated damage by segmenting supply chain systems from core networks.</p>
<h3 id="heading-3-train-employees-on-ai-specific-threats">3. Train Employees on AI-Specific Threats</h3>
<p>Regular drills using AI-generated phishing simulations help teams recognize sophisticated lures. Focus on “emotional triggers” like urgency or authority, which are common themes in deepfake scams.</p>
<h3 id="heading-4-upgrade-to-phishing-resistant-mfa">4. Upgrade to Phishing-Resistant MFA</h3>
<p>Replace SMS codes with hardware tokens or biometric verification. Microsoft’s 2025 guidelines recommend FIDO2 security keys for high-risk accounts.</p>
<h3 id="heading-conclusion-the-double-edged-sword-of-ai">Conclusion: The Double-Edged Sword of AI</h3>
<p>AI is both the problem and the solution in 2025’s cybersecurity arms race. While attackers exploit generative models for fraud and malware, defenders counter with adaptive tools that predict and neutralize threats. The lesson is clear: Organizations that integrate AI into their security strategies will survive, and those that don’t will become statistics.</p>
<p><strong>Final recommendation</strong>: Audit your defenses for AI readiness. If your incident response plan doesn’t mention deepfakes or autonomous malware, it’s already outdated.</p>
]]></content:encoded></item><item><title><![CDATA[Choosing the Right Password Manager: A Comprehensive Guide]]></title><description><![CDATA[Introduction
In the digital age, passwords are the keys to our online identities. From social media accounts to banking information, our online presence is secured through passwords. However, managing multiple passwords can be difficult, leading to r...]]></description><link>https://www.hurrikane.net/choosing-the-right-password-manager-a-comprehensive-guide-c95a48efd83e</link><guid isPermaLink="true">https://www.hurrikane.net/choosing-the-right-password-manager-a-comprehensive-guide-c95a48efd83e</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sat, 29 Mar 2025 22:41:14 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756062178159/ac40c3c3-c98c-4042-8596-0cc60c3e73d7.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Introduction</strong></p>
<p>In the digital age, passwords are the keys to our online identities. From social media accounts to banking information, our online presence is secured through passwords. However, managing multiple passwords can be difficult, leading to risky practices such as using the same password for different accounts. This is where password managers come in. In this blog post, we will discuss the importance of password managers and review some of the most popular choices, including their pros and cons, focusing on 1Password as my preferred solution.</p>
<h4 id="heading-credential-stuffing-and-password-reuse">Credential Stuffing and Password Reuse</h4>
<p>Credential stuffing and password reuse are significant security threats that have become increasingly prevalent in the digital age. Cybercriminals exploit these vulnerabilities to gain unauthorized access to accounts, causing substantial damage to individuals and organizations. Understanding the mechanisms behind these attacks is crucial for developing effective preventive measures.</p>
<p>Credential stuffing involves malicious actors using stolen credentials from one data breach to attempt logins on various other websites. This method relies on the probability that many users reuse passwords across multiple platforms. When a breach occurs and user credentials are exposed, cybercriminals can use automated tools to test these credentials on other sites, hoping to find matches and gain access.</p>
<p>Password reuse exacerbates the problem by significantly increasing the risk of successful intrusions. Despite repeated warnings from security experts, many users continue to use the same password for different accounts. This practice might stem from the difficulty of remembering numerous complex passwords. However, it creates a critical vulnerability, as a compromise in one platform can lead to compromises across many others.</p>
<p>To mitigate this threat, security professionals recommend the use of password managers. These tools generate unique, complex passwords for each account and store them securely, reducing the likelihood of a security breach. Additionally, implementing multifactor authentication (MFA) adds an extra layer of security, ensuring that even if credentials are stolen, unauthorized access is still difficult.</p>
<p>Credential stuffing and password reuse are significant security concerns requiring vigilant preventive measures. By understanding these threats and adopting recommended security practices, individuals and organizations can significantly reduce their risk of falling victim to cybercriminal activities.</p>
<h4 id="heading-why-use-a-password-manager">Why Use a Password Manager?</h4>
<p>Password managers are tools that store and manage your passwords securely. They offer several benefits:</p>
<ul>
<li><p>Enhanced Security: Password managers generate complex, unique passwords for each account, reducing the risk of hacking.</p>
</li>
<li><p>Convenience: They save and autofill passwords, making logging into websites and applications easier.</p>
</li>
<li><p>Centralized Management: All passwords are stored in one place and can be accessed with a single master password.</p>
</li>
<li><p>Additional Features: Many password managers offer secure storage for sensitive information, password sharing, and security alerts.</p>
</li>
</ul>
<h4 id="heading-built-in-browser-password-managers">Built-in Browser Password Managers</h4>
<p>While convenient, built-in password managers in browsers may not offer the same level of security as dedicated password managers. Browser-based password managers are often targets for cyber-attacks, as browsers are frequently exploited for vulnerabilities. Additionally, browsers may not provide robust encryption protocols or security features such as two-factor authentication, leaving passwords more susceptible to breaches. On the other hand, dedicated password managers prioritize security with advanced encryption, secure authentication methods, and regular updates to address emerging threats.</p>
<h4 id="heading-popular-password-managers-pros-and-cons">Popular Password Managers: Pros and Cons</h4>
<p><strong>1Password</strong></p>
<p>1Password is popular among users due to its robust security features and user-friendly interface.</p>
<p>Pros:</p>
<ul>
<li><p>Strong encryption standards to protect your data.</p>
</li>
<li><p>User-friendly interface and easy to navigate.</p>
</li>
<li><p>Cross-platform compatibility, including Windows, macOS, iOS, and Android.</p>
</li>
<li><p>Secure storage for documents and sensitive information.</p>
</li>
<li><p>Travel Mode to hide sensitive data when crossing borders.</p>
</li>
</ul>
<p>Cons:</p>
<ul>
<li><p>A subscription fee is required for full access to features.</p>
</li>
<li><p>It may be overwhelming for users who prefer more straightforward tools.</p>
</li>
</ul>
<p><strong>LastPass</strong></p>
<p>LastPass is another widely used password manager known for its versatile features and free version.</p>
<p>Pros:</p>
<ul>
<li><p>Free tier that offers essential password management features.</p>
</li>
<li><p>Strong security measures, including encryption and multifactor authentication.</p>
</li>
<li><p>Easy-to-use browser extension for autofill and password generation.</p>
</li>
<li><p>Password sharing capabilities for family or team accounts.</p>
</li>
</ul>
<p>Cons:</p>
<ul>
<li><p>Recent security breaches have raised concerns about its reliability.</p>
</li>
<li><p>A paid version is required for advanced features.</p>
</li>
<li><p>The interface can be confusing for new users.</p>
</li>
</ul>
<p><strong>Dashlane</strong></p>
<p>Dashlane is known for its comprehensive security features and sleek design.</p>
<p>Pros:</p>
<ul>
<li><p>Advanced security features, including dark web monitoring.</p>
</li>
<li><p>Easy-to-use interface with a clean design.</p>
</li>
<li><p>Provides a VPN for secure browsing.</p>
</li>
<li><p>Autofill and password generation features.</p>
</li>
</ul>
<p>Cons:</p>
<ul>
<li><p>Higher subscription fees compared to other password managers.</p>
</li>
<li><p>Limited features in the free version.</p>
</li>
<li><p>It can be resource-heavy for older devices.</p>
</li>
</ul>
<h4 id="heading-advancements-in-password-usage-passkeys">Advancements in Password Usage: Passkeys</h4>
<p>Passkeys represent a significant advancement in the digital security landscape. Unlike traditional passwords, passkeys leverage public key cryptography to provide a more secure and user-friendly authentication method. A passkey is essentially a pair of cryptographic keys — public and private. The public key is stored on the server, while the private key remains secure on the user’s device. When logging in, the device uses the private key to sign a challenge from the server, verifying the user’s identity without ever transmitting the private key.</p>
<h4 id="heading-advantages-of-passkeys">Advantages of Passkeys</h4>
<ul>
<li><p>Enhanced Security: Since the private key never leaves the user’s device, it is significantly more difficult for attackers to intercept or steal it.</p>
</li>
<li><p>Simplified User Experience: Users can authenticate with biometric methods such as fingerprint or facial recognition, eliminating the need to remember complex passwords.</p>
</li>
<li><p>Phishing Protection: Passkeys resist phishing attacks because the server-specific public key ensures the user communicates with the legitimate service.</p>
</li>
</ul>
<h4 id="heading-the-criticality-of-multifactor-authentication-mfa">The Criticality of Multifactor Authentication (MFA)</h4>
<p>Multifactor authentication (MFA) is crucial to modern digital security strategies. It requires users to provide two or more verification factors to access a resource, adding an extra layer of protection beyond just a password. This approach significantly reduces the risk of unauthorized access, even if the password is compromised.</p>
<p>Importance of MFA</p>
<ul>
<li><p>Increased Security: MFA mitigates the risks associated with password theft, phishing, and brute force attacks by requiring additional authentication factors.</p>
</li>
<li><p>Protection Against Common Attacks: MFA helps prevent unauthorized access from stolen passwords, social engineering attacks, and credential stuffing.</p>
</li>
<li><p>Compliance and Regulations: Many industries and regulations now mandate using MFA to protect sensitive data and ensure compliance with security standards.</p>
</li>
</ul>
<h4 id="heading-how-password-managers-incorporate-mfa">How Password Managers Incorporate MFA</h4>
<p>Password managers are essential tools in implementing and managing MFA. Here are several ways password managers enhance the effectiveness of MFA:</p>
<ul>
<li><p>Securing Passwords: Password managers store and encrypt passwords, ensuring that users have strong, unique passwords for each account, reducing the risk of password reuse and compromise.</p>
</li>
<li><p>Generating One-Time Codes: Many password managers offer features to create one-time passcodes (OTP), which can be used as a second authentication factor in MFA setups.</p>
</li>
<li><p>Convenience and Accessibility: Password managers streamline the process of accessing and entering MFA codes, making it easier for users to comply with MFA requirements without sacrificing convenience.</p>
</li>
<li><p>Integration with Biometric Authentication: Advanced password managers integrate with biometric authentication methods, such as fingerprint and facial recognition, further enhancing security and user experience. Users can significantly bolster their online security by combining the robust security measures of password managers with the layered protection of MFA. The synergy between these tools ensures that even if one layer of security is breached, additional safeguards remain to protect sensitive information.</p>
</li>
</ul>
<h4 id="heading-conclusion">Conclusion</h4>
<p>Password managers safeguard and encrypt passwords, guaranteeing strong, unique passwords for each account, thus reducing the risk of password reuse and compromise. They also generate one-time passcodes (OTPs) for multifactor authentication (MFA) setups, facilitating a second layer of security. By streamlining the process of accessing and entering MFA codes, password managers make compliance with MFA requirements more convenient without sacrificing convenience. Advanced password managers integrate with biometric authentication methods, such as fingerprint and facial recognition, enhancing security and user experience. This combination of password managers and MFA provides robust security, ensuring that additional safeguards protect sensitive information even if one layer is breached.</p>
]]></content:encoded></item><item><title><![CDATA[Moving on From Wealthfront: A Journey to Better Financial Flexibility]]></title><description><![CDATA[Image from Pixabay
Introduction
Wealthfront has been popular for many investors seeking automated investment management and financial planning tools. However, like any platform, it has its limitations. For me, the lack of flexibility and specific nua...]]></description><link>https://www.hurrikane.net/moving-on-from-wealthfront-a-journey-to-better-financial-flexibility-edb6b0c49cb2</link><guid isPermaLink="true">https://www.hurrikane.net/moving-on-from-wealthfront-a-journey-to-better-financial-flexibility-edb6b0c49cb2</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Mon, 24 Mar 2025 20:02:30 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756062374360/e6a92b5e-6183-46fd-9df4-49196790fa6c.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Image from <a target="_blank" href="https://pixabay.com/illustrations/key-keyboard-growth-button-finance-951785/">Pixabay</a></p>
<h3 id="heading-introduction">Introduction</h3>
<p>Wealthfront has been popular for many investors seeking automated investment management and financial planning tools. However, like any platform, it has its limitations. For me, the lack of flexibility and specific nuances became significant enough to warrant a change. This post outlines my journey of separating cash management from long-term investments and why I moved away from Wealthfront in favor of more tailored financial solutions.</p>
<h3 id="heading-reasons-for-leaving-wealthfront">Reasons for Leaving Wealthfront</h3>
<p>While Wealthfront offers a robust set of features for automated investing and financial planning, I found a few aspects to be restrictive:</p>
<ul>
<li>Lack of Flexibility: One of the primary reasons I decided to leave Wealthfront was its rigid investment approach. As my financial goals evolved, I needed more control over my investment strategies and asset allocation. Wealthfront’s automated system was efficient for many but didn’t allow for the customization I desired.</li>
<li>Fees and Performance: Another concern was the fee structure and performance metrics, particularly in areas like tax loss harvesting. While Wealthfront does offer tax loss harvesting, I was interested in exploring platforms that might provide more advanced or customizable strategies to optimize my tax efficiency at a lower cost.</li>
</ul>
<h3 id="heading-new-setup-long-term-investments-frec">New Setup — Long-Term Investments: Frec</h3>
<p>After evaluating several options, I moved my long-term investments to Frec. Here’s why:</p>
<ul>
<li>Why Frec?: Frec offers lower fees than Wealthfront, which is crucial for long-term investment growth. Additionally, Frec provides more customization options, allowing me to tailor my investment portfolio to better align with my financial goals and risk tolerance.</li>
<li>Tax Loss Harvesting: One of Frec's key benefits is its potentially better tax loss harvesting performance. By optimizing tax efficiency, I can retain more of my investment gains, which is essential for long-term wealth accumulation.</li>
<li>Direct Indexing: Frec allows investors to own individual stocks that make up an index, such as the S&amp;P 500, instead of buying an ETF or mutual fund. This strategy enhances tax efficiency by enabling investors to offset capital gains with losses.</li>
<li>Portfolio Allocation Feature: Frec’s Portfolio Allocation feature empowers investors to rebalance their portfolios at their own pace, using options like cash deposits or leveraging a portfolio line of credit to avoid unnecessary tax events.</li>
<li>Portfolio Line of Credit: Frec offers a portfolio line of credit, allowing investors to borrow against their investments without disrupting their long-term strategy. This feature provides liquidity and flexibility in managing investments.</li>
</ul>
<p>So far frec has been amazing. I’m still dealing with getting the final details from Wealthfront but complete separation is within sight.</p>
<h3 id="heading-new-setup-short-term-cash-management-fidelity-cash-management-account-cma">New Setup — Short-Term Cash Management: Fidelity Cash Management Account (CMA)</h3>
<p>To manage my daily finances and monthly bills, I opted for Fidelity’s Cash Management Account (CMA). This decision aligns well with my existing Fidelity accounts, allowing for seamless integration of cash management with other financial assets. The CMA offers several advantages:</p>
<ol>
<li>Comprehensive Features: The Fidelity CMA provides a full suite of banking features, including a free debit card, checkwriting, bill pay, and mobile check deposit.</li>
<li>ATM Fee Reimbursement: Unlike standard Fidelity brokerage accounts, the CMA offers free ATM withdrawals worldwide with fee reimbursement, regardless of account balance.</li>
<li>FDIC Protection: Cash balances in the CMA are eligible for FDIC insurance coverage, providing an added layer of security.</li>
<li>Flexibility: The CMA complements rather than replaces existing brokerage accounts, allowing for separation of spending activities from long-term investments.</li>
<li>Cash Management Tools: Fidelity’s Cash Manager feature enables setting target balances, automated transfers, and overdraft protection, helping to maintain optimal cash levels.</li>
<li>Mobile Integration: The Fidelity Mobile® app allows for easy account management on the go.</li>
</ol>
<p>While the current interest rate on the CMA’s core account (3.96%) is slightly lower than that of regular brokerage accounts, it’s insignificant from Wealthfront’s rate (4%).</p>
<p>The user-friendly interface and positive customer service experiences further solidify the CMA as an excellent choice for managing short-term cash and daily financial needs.</p>
<h3 id="heading-new-setup-retirement-accounts-schwab">New Setup — Retirement Accounts: Schwab</h3>
<p>I decided to move my IRA and Roth IRA accounts to Charles Schwab, primarily to consolidate most of my financial assets under one platform for easier management and oversight.</p>
<p>By choosing Schwab, I can take advantage of their comprehensive platform, which offers a range of investment options and tools. Additionally, Schwab provides personalized support, assigning a consultant for any questions I might have, accessible either in-person at a nearby office or via direct phone contact.</p>
<h3 id="heading-new-setup-exploring-trading-options">New Setup — Exploring Trading Options</h3>
<p>In addition to managing my investments and cash flow, I’ve opened a new brokerage account at Fidelity to explore trading options. This decision was partly driven by a desire to stay engaged and active in the financial markets. Trading options provide an exciting challenge and an opportunity to learn new strategies, which keeps me busy and intellectually stimulated.</p>
<h3 id="heading-conclusion">Conclusion</h3>
<p>Moving away from Wealthfront was a deliberate decision to achieve greater flexibility and cost efficiency in my financial management. By separating my cash management from long-term investments and choosing platforms like Frec, Schwab and Fidelity, I’ve been able to tailor my financial setup more closely to my needs; getting the best from different providers.</p>
<p>If you’re considering your own financial setup, I encourage you to explore options that offer the flexibility and customization you need. Whether you’re optimizing fees, improving tax efficiency, or simply having more control over your investments, numerous platforms are available that can help you achieve your financial goals.</p>
]]></content:encoded></item><item><title><![CDATA[The Hidden Dangers of Commercial VPNs: Why Private Solutions Like Tailscale Are the Future]]></title><description><![CDATA[Image from Pixabay
Virtual Private Networks (VPNs) have become essential tools for privacy-conscious users, promising anonymity and security. However, commercial VPN providers face growing vulnerabilities to government interference, legal pressure, a...]]></description><link>https://www.hurrikane.net/the-hidden-dangers-of-commercial-vpns-why-private-solutions-like-tailscale-are-the-future-d22f7cb3404b</link><guid isPermaLink="true">https://www.hurrikane.net/the-hidden-dangers-of-commercial-vpns-why-private-solutions-like-tailscale-are-the-future-d22f7cb3404b</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Mon, 24 Mar 2025 16:25:26 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756063690403/38b00be1-dcd8-4691-ba5b-c4570ec5830e.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Image from <a target="_blank" href="https://pixabay.com/illustrations/map-world-vpn-international-4636843/">Pixabay</a></p>
<p>Virtual Private Networks (VPNs) have become essential tools for privacy-conscious users, promising anonymity and security. However, commercial VPN providers face growing vulnerabilities to government interference, legal pressure, and covert surveillance partnerships. Recent cases like Operation Nova — where law enforcement seized VPN infrastructure across five countries — and revelations about ExpressVPN’s ties to intelligence <strong>operatives</strong> prove even “secure” services can’t guarantee privacy. This post exposes how governments exploit commercial VPNs and why decentralized alternatives like Tailscale offer fundamentally safer networking.</p>
<h4 id="heading-how-commercial-vpns-work-and-why-theyre-vulnerable"><strong>How Commercial VPNs Work — And Why They’re Vulnerable</strong></h4>
<p><strong>The Illusion of Privacy in Centralized Models</strong></p>
<p>Commercial VPNs route traffic through centralized servers owned by the provider. While this hides activity from your ISP, it grants the VPN company full visibility into:</p>
<ul>
<li><strong>Browsing history</strong> (even if “no-log” policies exist)</li>
<li><strong>Device identifiers</strong> (IP addresses, geolocation, hardware details)</li>
<li><strong>Connection timestamps</strong> (used to correlate activity in investigations)</li>
</ul>
<p>These providers often operate in jurisdictions subject to Five Eyes alliance data-sharing agreements, meaning user data requested by one member government can be shared across 14 countries without your knowledge.</p>
<h4 id="heading-government-takeovers-when-secure-vpns-become-surveillance-tools"><strong>Government Takeovers: When “Secure” VPNs Become Surveillance Tools</strong></h4>
<p><strong>Example 1: Operation Nova (2020)</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043179376/2f937824-d4f6-4e90-bd72-7792d8352b6d.png" alt /></p>
<p><a target="_blank" href="https://www.europol.europa.eu/media-press/newsroom/news/cybercriminals%E2%80%99-favourite-vpn-taken-down-in-global-action">Reference</a></p>
<p>In December 2020, German police and the FBI dismantled <strong>Safe-Inet</strong>, a VPN service allegedly used by ransomware groups. Authorities:</p>
<ol>
<li>Seized servers in France, Germany, and the U.S.</li>
<li>Replaced Safe-Inet’s website with a law enforcement banner</li>
<li>Accessed logs showing attacks against 250 companies</li>
</ol>
<p><strong>Why This Matters</strong>: Safe-Inet advertised 5-layer encryption and “bulletproof” anonymity but couldn’t resist government seizure. Users’ real IPs were exposed, enabling follow-up arrests.</p>
<p><strong>Example 2: The IPVanish Contradiction</strong></p>
<p>In 2018, IPVanish — a “no-log” provider — handed user data to Homeland Security, revealing a suspect’s Comcast IP address. Despite marketing claims, they retained:</p>
<ul>
<li>Connection timestamps</li>
<li>Bandwidth usage</li>
<li>Original IP addresses</li>
</ul>
<p>This case proves U.S. subpoenas override privacy policies, even for providers based in “privacy-friendly” jurisdictions like Panama.</p>
<p><strong>Example 3: ExpressVPN’s Intelligence Ties</strong></p>
<p>ExpressVPN’s Chief Information Officer, Daniel Gericke, was a former U.S. mercenary hacker fined $335K for conducting cyber ops for UAE intelligence. While no direct wrongdoing was proven, this reveals:</p>
<ul>
<li>Commercial VPNs’ personnel may have government ties</li>
<li>Acquisition by Kape Technologies (owner of CyberGhost VPN) created potential conflicts of interest</li>
</ul>
<h4 id="heading-legal-frameworks-enabling-government-access"><strong>Legal Frameworks Enabling Government Access</strong></h4>
<p><strong>1. Data Retention Laws</strong></p>
<p>Countries like Australia and the UK mandate VPNs store:</p>
<ul>
<li>Connection logs (IPs, timestamps) for 2+ years</li>
<li>Metadata sufficient to identify users</li>
</ul>
<p>Example: The Investigatory Powers Act (UK) allows bulk data collection from VPNs without warrants.</p>
<p><strong>2. Intelligence Alliances</strong></p>
<p>The Five Eyes network (US, UK, Canada, Australia, NZ) shares VPN data through:</p>
<ul>
<li><strong>US Cloud Act</strong>: Compels U.S.-based providers to surrender data regardless of server location</li>
<li><strong>Mutual Legal Assistance Treaties (MLATs)</strong>: Bypass jurisdictional barriers</li>
</ul>
<p><strong>3. Covert Partnerships</strong></p>
<p>VPN providers often face undisclosed national security letters (NSLs) that:</p>
<ul>
<li>Prohibit disclosing government data requests</li>
<li>Require modifying infrastructure for surveillance</li>
</ul>
<h4 id="heading-why-private-vpns-like-tailscale-solve-these-risks"><strong>Why Private VPNs Like Tailscale Solve These Risks</strong></h4>
<p><strong>Architecture: Centralized vs. Decentralized</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043180915/34e61b1d-00e6-46d8-a8b1-09f2f65b4d15.png" alt /></p>
<p>Reference: <a target="_blank" href="https://tailscale.com/blog/how-tailscale-works">Tailscale</a> — A traditional hub-and-spoke VPN (centralized)</p>
<p>Tailscale uses a peer-to-peer mesh network where:</p>
<ul>
<li>Devices connect directly (no central server)</li>
<li>WireGuard encrypts traffic end-to-end</li>
<li>Keys stay on user devices (not even Tailscale can access them)</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1756043182050/9baec9f2-d14d-46a5-8a6c-e139a1edcdb2.png" alt /></p>
<p>Reference: <a target="_blank" href="https://tailscale.com/blog/how-tailscale-works">Tailscale</a> — A Tailscale point-to-point mesh network (decentralized)</p>
<p><strong>5 Key Anti-Surveillance Features</strong></p>
<ol>
<li><strong>Zero Trust Authentication</strong>: Devices authenticate via SSO/MFA, not shared credentials</li>
<li><strong>DERP Relay Avoidance</strong>: Prefers direct connections; uses relays only as backups</li>
<li><strong>No Central Logs</strong>: Tailscale’s control plane manages connections but can’t decrypt traffic</li>
<li><strong>Self-Hostable Control Servers</strong>: Tools like Headscale let you host the coordination server</li>
<li><strong>NAT Traversal</strong>: Works behind restrictive firewalls without port forwarding</li>
</ol>
<h4 id="heading-limitations-of-private-vpn-solutions"><strong>Limitations of Private VPN Solutions</strong></h4>
<p><strong>Technical Barriers</strong></p>
<ul>
<li><strong>Headscale Configuration</strong>: Requires Docker/CLI expertise vs. commercial apps</li>
<li><strong>No Geo-Spoofing</strong>: Tailscale doesn’t mask your location for streaming</li>
</ul>
<p><strong>Corporate Risks</strong></p>
<ul>
<li><strong>Relay Latency</strong>: DERP servers add 30–100ms latency in poor NAT setups</li>
<li><strong>No Layer 7 Filtering</strong>: Can’t block specific websites/apps</li>
</ul>
<p><strong>Legal Gray Areas</strong></p>
<ul>
<li><strong>Home Server Subpoenas</strong>: ISPs may log your self-hosted VPN’s IP</li>
<li><strong>Cross-Border Data Laws</strong>: GDPR still applies to EU user traffic</li>
</ul>
<p><strong>Recommendations for Secure Networking</strong></p>
<p>1. <strong>For Individuals</strong>:</p>
<ul>
<li>Use Tailscale’s free tier for device-to-device access</li>
<li>Enable Shields Up mode to block unsolicited inbound connections</li>
</ul>
<p>2. <strong>For Enterprises</strong>:</p>
<ul>
<li>Deploy Headscale on air-gapped infrastructure</li>
<li>Combine Tailscale with Cloudflare Tunnel for public-facing apps</li>
</ul>
<p>3. <strong>For High-Risk Users</strong>:</p>
<ul>
<li>Route traffic through Tor before hitting Tailscale nodes</li>
<li>Use mTLS to authenticate device fingerprints</li>
</ul>
<h4 id="heading-the-future-is-decentralized"><strong>The Future Is Decentralized</strong></h4>
<p>Commercial VPNs’ centralized architecture makes them inevitable targets for government coercion — whether through subpoenas, server seizures, or insider threats. Cases like Safe-Inet and IPVanish prove no-log policies are meaningless when faced with lawful intercepts.</p>
<p>Private solutions like Tailscale eliminate single points of failure through:</p>
<ul>
<li>End-to-end encryption immune to provider compromise</li>
<li>Self-hostable control planes (via Headscale)</li>
<li>Open-source transparency</li>
</ul>
<p>While not perfect, they represent a philosophical shift: <em>privacy isn’t a service to purchase, but a system to architect.</em></p>
]]></content:encoded></item><item><title><![CDATA[Enhancing Home Network Security with ControlD: A Comprehensive Guide to DNS @home]]></title><description><![CDATA[As cyber threats evolve, securing your home network demands proactive measures. Traditional ISP-provided DNS services often lack the privacy, security, and customization needed to combat modern risks. ControlD, a third-party DNS resolver, offers gran...]]></description><link>https://www.hurrikane.net/enhancing-home-network-security-with-controld-a-comprehensive-guide-to-dns-home-72408c10c768</link><guid isPermaLink="true">https://www.hurrikane.net/enhancing-home-network-security-with-controld-a-comprehensive-guide-to-dns-home-72408c10c768</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sat, 22 Mar 2025 19:54:53 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756062444468/612106d6-c26e-42db-9439-89d39d95509d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As cyber threats evolve, securing your home network demands proactive measures. Traditional ISP-provided DNS services often lack the privacy, security, and customization needed to combat modern risks. ControlD, a third-party DNS resolver, offers granular control over DNS traffic, enabling users to block malicious content, enforce privacy protocols, and even geo-unlock services without installing software on individual devices. This guide explores why ControlD stands out, how to configure it across devices and routers, and critical considerations for maximizing its capabilities.</p>
<h3 id="heading-why-dns-matters-for-home-networks">Why DNS Matters for Home Networks</h3>
<p>Domain Name System (DNS) acts as the internet’s phonebook, translating human-readable domain names (e.g., <code>google.com</code>) into machine-readable IP addresses. By default, most home networks rely on DNS servers provided by Internet Service Providers (ISPs). These servers, however, pose several risks:</p>
<ul>
<li><p><strong>Privacy Concerns</strong>: ISPs often log DNS queries to build user profiles for advertising or compliance purposes</p>
</li>
<li><p><strong>Security Vulnerabilities</strong>: Legacy DNS (UDP 53) transmits queries in plaintext, making them susceptible to interception and manipulation</p>
</li>
<li><p><strong>Limited Customization</strong>: ISP DNS lacks tools to block ads, malware, or adult content at the network level</p>
</li>
</ul>
<p>ControlD addresses these issues by combining encrypted DNS protocols with a global anycast network spanning 69 locations, ensuring low-latency resolutions while preventing ISP surveillance</p>
<h3 id="heading-why-controld-outperforms-alternatives">Why ControlD Outperforms Alternatives</h3>
<h4 id="heading-customization-without-complexity">Customization Without Complexity</h4>
<p>ControlD’s web interface allows users to create rules for:</p>
<ul>
<li><p><strong>Content Filtering</strong>: Block ads, malware, gambling, or adult content across all devices</p>
</li>
<li><p><strong>Traffic Redirection</strong>: Route specific services (e.g., Netflix) through proxy servers in 100+ cities to bypass geo-restrictions</p>
</li>
<li><p><strong>Device-Specific Policies</strong>: Assign unique profiles to devices — e.g., strict filtering for children’s tablets but unrestricted access for work laptops</p>
</li>
</ul>
<p>Unlike NextDNS or AdGuard Home, ControlD supports <em>transparent proxies</em>, enabling VPN-like IP masking without requiring client software. For instance, redirecting BBC iPlayer traffic through London ensures access while hiding your actual IP from the service.</p>
<h4 id="heading-privacy-by-design">Privacy by Design</h4>
<p>ControlD supports DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT), encrypting queries to prevent eavesdropping.</p>
<p>While Windows 11 natively supports DoH, older systems can still use ControlD’s legacy DNS resolvers or the <code>ctrld</code> utility for encrypted configurations</p>
<h4 id="heading-enterprise-grade-security">Enterprise-Grade Security</h4>
<p>ControlD’s infrastructure includes:</p>
<ul>
<li><p><strong>DDoS Mitigation</strong>: A global anycast network distributes traffic across servers, neutralizing volumetric attacks</p>
</li>
<li><p><strong>Malware Blocking</strong>: Real-time updates to block domains associated with phishing, ransomware, and command-and-control servers</p>
</li>
<li><p><strong>DNSSEC Validation</strong>: Ensures DNS responses are authentic and untampered, thwarting spoofing attacks</p>
</li>
</ul>
<h4 id="heading-limitations-and-workarounds">Limitations and Workarounds</h4>
<ul>
<li><p><strong>SNI Exposure</strong>: ControlD’s proxies don’t encrypt Server Name Indication (SNI), allowing ISPs to infer visited sites via deep packet inspection<a target="_blank" href="https://jmcglock.substack.com/p/control-d-revisited">7</a>. Once widely adopted, pair with ECH (Encrypted Client Hello).</p>
</li>
<li><p><strong>Direct IP Connections</strong>: Services using hardcoded IPs bypass DNS filtering. Mitigate by blocking known malicious IP ranges with firewall rules.</p>
</li>
</ul>
<h3 id="heading-dns-best-practices">DNS Best Practices</h3>
<ol>
<li><p><strong>Redundancy</strong>: Deploy ControlD on at least two devices/routers to avoid single points of failure.</p>
</li>
<li><p><strong>Scavenging</strong>: Enable DNS record aging to remove stale entries, reducing attack surfaces.</p>
</li>
<li><p><strong>Monitoring</strong>: Use ControlD’s query logs to identify unusual patterns (e.g., sudden spikes in blocked requests).</p>
</li>
</ol>
<h3 id="heading-conclusion">Conclusion</h3>
<p>ControlD redefines home network security by merging enterprise-grade DNS management with consumer-friendly customization. Whether blocking malware, bypassing geo-blocks, or safeguarding privacy, its toolkit surpasses traditional DNS services. For optimal results:</p>
<ul>
<li><p>Start with the free tier to test filtering rules.</p>
</li>
<li><p>Combine router-level configurations with device-specific profiles.</p>
</li>
<li><p>Regularly review query logs to refine policies.</p>
</li>
</ul>
<p>By adopting ControlD, you’re not just changing DNS resolvers — you’re taking control of your digital footprint.</p>
<p><strong>Final Thought</strong>: While ControlD excels in DNS-layer security, complement it with a VPN for full traffic encryption and IP masking — especially when accessing sensitive resources. Not all VPN solutions are equal…and I would avoid all <a target="_blank" href="https://www.hurrikane.net/the-hidden-dangers-of-commercial-vpns-why-private-solutions-like-tailscale-are-the-future-d22f7cb3404b">commercially available VPNs</a>.</p>
]]></content:encoded></item><item><title><![CDATA[Enhancing Network Security with AI: A DFIR Perspective]]></title><description><![CDATA[Image from Pixabay
The cybersecurity landscape has entered an era of unprecedented complexity. Cyberattacks unfold at machine speed, with adversaries leveraging automation and AI to bypass traditional defenses. For Digital Forensics and Incident Resp...]]></description><link>https://www.hurrikane.net/enhancing-network-security-with-ai-a-dfir-perspective-90aa2a2b57b7</link><guid isPermaLink="true">https://www.hurrikane.net/enhancing-network-security-with-ai-a-dfir-perspective-90aa2a2b57b7</guid><dc:creator><![CDATA[Brian Olson]]></dc:creator><pubDate>Sat, 22 Mar 2025 18:51:57 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1756062542361/dd194ce8-36f7-4b02-aba8-400d0f50d213.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Image from <a target="_blank" href="https://pixabay.com/photos/robot-artificial-intelligence-7768527/">Pixabay</a></p>
<p>The cybersecurity landscape has entered an era of unprecedented complexity. Cyberattacks unfold at machine speed, with adversaries leveraging automation and AI to bypass traditional defenses. For Digital Forensics and Incident Response (DFIR) professionals, this escalation demands tools that match modern threats’ scale and sophistication. Enter artificial intelligence — a transformative force reshaping network security by augmenting human analysts with capabilities that were once the realm of science fiction. From detecting zero-day exploits to reconstructing attack timelines, AI is revolutionizing how we defend digital ecosystems.</p>
<h3 id="heading-ai-driven-threat-detection-from-reactive-to-proactive-defense">AI-Driven Threat Detection: From Reactive to Proactive Defense</h3>
<p>Traditional signature-based detection methods struggle to keep pace with evolving threats like polymorphic malware and advanced persistent threats (APTs). AI-powered systems, however, analyze network traffic in real time, identifying anomalies that evade conventional tools. Machine learning models trained on historical attack data can recognize subtle patterns indicative of malicious activity, such as unusual data exfiltration spikes or unauthorized lateral movement. For instance, supervised learning algorithms classify known threats with 99% accuracy, while unsupervised models detect novel attack vectors by flagging deviations from baseline behavior.</p>
<p>Behavioral anomaly detection is particularly effective for combating insider threats. By establishing “normal” user activity profiles—such as login times, data access patterns, and device usage—AI systems can alert DFIR teams to deviations like a finance employee accessing sensitive R&amp;D files at 3 AM. Case in point: Intezer’s Autonomous SOC platform reduced false positives by 70% while identifying 40% more threats in a 2024 enterprise deployment.</p>
<h3 id="heading-ai-in-incident-response-accelerating-time-to-resolution">AI in Incident Response: Accelerating Time-to-Resolution</h3>
<p>When a breach occurs, every second counts. AI streamlines incident response by automating time-consuming tasks like log analysis and alert triage. Natural language processing (NLP) tools parse thousands of alerts daily, prioritizing critical incidents (e.g., ransomware activity) over low-risk events (e.g., failed login attempts). This allows DFIR teams to focus on high-impact investigations rather than drowning in noise.</p>
<p>Forensic analysis also benefits from AI’s pattern recognition prowess. During a recent supply chain attack, an AI tool reconstructed the attack timeline in 12 minutes — a task that would have taken a human analyst days. By cross-referencing malware hashes with global threat databases like VirusTotal, AI identified the attacker’s infrastructure and linked it to a known state-sponsored group. Such speed is critical for containing breaches before they escalate.</p>
<h3 id="heading-ai-enhanced-dfir-capabilities-beyond-human-limits">AI-Enhanced DFIR Capabilities: Beyond Human Limits</h3>
<p>Modern networks generate petabytes of logs daily, creating a haystack where critical evidence often hides. AI excels at finding needles in this haystack. For example:</p>
<ul>
<li><strong>Log Analysis</strong>: Transformer-based models (like GPT-4) summarize logs into actionable insights, highlighting suspicious IP addresses or unusual protocol usage.</li>
<li><strong>Evidence Preservation</strong>: Automated systems create forensic snapshots of compromised devices, ensuring chain-of-custody compliance while eliminating human error.</li>
<li><strong>Predictive Analytics</strong>: By correlating current threats with historical data, AI forecasts attack vectors, enabling preemptive hardening of vulnerable systems.</li>
</ul>
<p>In one case, a financial institution used AI to analyze 18 months of network traffic, uncovering a dormant APT that had evaded detection by traditional IDS solutions. The AI flagged irregular DNS queries masked as routine cloud backups, leading to the discovery of a sophisticated data exfiltration scheme.</p>
<h3 id="heading-challenges-to-consider">Challenges to Consider</h3>
<p>While AI offers immense potential, it is not a silver bullet. Adversarial machine learning — where attackers poison training data or manipulate models — poses significant risks. For instance, researchers recently demonstrated how subtly altered network packets could trick AI systems into classifying ransomware traffic as benign. DFIR teams must rigorously validate AI outputs and maintain human oversight.</p>
<h3 id="heading-the-future-of-ai-in-dfir">The Future of AI in DFIR</h3>
<p>Looking ahead, three trends will dominate:</p>
<ol>
<li><strong>AI-Quantum Hybrids</strong>: Quantum computing will turbocharge AI’s ability to decrypt intercepted communications and simulate attack scenarios.</li>
<li><strong>Privacy-Preserving AI</strong>: Federated learning models will analyze sensitive data without centralized storage, reducing breach risks.</li>
<li><strong>Autonomous Response</strong>: Self-healing networks will automatically isolate compromised nodes and deploy patches, minimizing downtime.</li>
</ol>
<h3 id="heading-conclusion">Conclusion</h3>
<p>I truly believe that AI won’t replace DFIR professionals — it’s empowering and supercharging them. By automating mundane tasks and surfacing hidden threats, AI allows analysts to focus on strategic decision-making and creative problem-solving. However, success hinges on balancing innovation with vigilance. As cyber adversaries increasingly weaponize AI, defenders must stay ahead by fostering collaboration between human expertise and machine intelligence. For DFIR teams, the message is clear: adapt or become obsolete.</p>
]]></content:encoded></item></channel></rss>