
Here's How to Host Your Own Encrypted Video Conferencing Solution
Updates to Zoom’s privacy policy — namely the suggested use of user data to train LLMs — have many folks scrambling for viable alternatives. One possible solution? Host your own private, encrypted video conference room.

Beyond Kali: 8 Cybersecurity and Privacy Linux Distributions You’ve Never Heard of
While Kali remains a community favorite, there are a number of other cybersecurity and privacy-focused Linux distributions worth… investigating. No pun intended. From penetration testing to malware analysis, digital privacy, forensics, and more — rest assured, whatever your use case, there’s a distro for it.