<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://amans.life/feed.xml" rel="self" type="application/atom+xml" /><link href="https://amans.life/" rel="alternate" type="text/html" /><updated>2026-03-17T23:48:58+00:00</updated><id>https://amans.life/feed.xml</id><title type="html">Blog | Lemar Aman</title><subtitle>Lemar Aman&apos;s Personal Blog</subtitle><author><name>{&quot;avatar&quot;=&gt;&quot;/assets/pics/avatar.jpg&quot;, &quot;bio&quot;=&gt;&quot;&quot;, &quot;location&quot;=&gt;&quot;Los Angeles, CA&quot;, &quot;email&quot;=&gt;&quot;lemaraman@protonmail.com&quot;, &quot;links&quot;=&gt;[{&quot;label&quot;=&gt;&quot;Email&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-envelope-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Website&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-link&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Twitter&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-twitter-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Facebook&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-facebook-square&quot;}, {&quot;label&quot;=&gt;&quot;GitHub&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-github&quot;, &quot;url&quot;=&gt;&quot;https://github.com/lemaraman&quot;}, {&quot;label&quot;=&gt;&quot;Instagram&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-instagram&quot;, &quot;url&quot;=&gt;&quot;https://www.instagram.com/lemaraman/&quot;}]}</name><email>lemaraman@protonmail.com</email></author><entry><title type="html">btc reflection and the market moving forward</title><link href="https://amans.life/btc-reflection/" rel="alternate" type="text/html" title="btc reflection and the market moving forward" /><published>2021-10-30T00:00:00+00:00</published><updated>2021-10-30T00:00:00+00:00</updated><id>https://amans.life/btc-reflection</id><content type="html" xml:base="https://amans.life/btc-reflection/"><![CDATA[<p><img src="/assets/pics/eth.jpg" alt="Eth" class="align-center" /></p>

<p>My last post on this blog was around the time Covid really began taking its toll globally, and I encouraged my readers at the time to consider investing a part of their portfolio into bitcoin. On the day I published that post, bitcoin was trading at $8900, and it has not gone below that price since. BTC traded at $12k within 3 months, $18k within 6 months, $40k within 8 months, and peaked at approximately $63k inside a year. This week it hit an ATH of $67k.</p>

<p>Without doubt, BTC has had its share of volatility and anyone who doesn’t have the capacity to handle the disgusting downswings should avoid trading it. I still think BTC has room to grow, but I’m also including a portion of my portfolio towards ETH.</p>

<p>A stock market crash is inevitable at this point (unless we see some significant structural changes) so I’m refraining from becoming too invested in any particular stock. Set and forget in <strong>VOO or VTI</strong>, and long semiconductor ETFs (<strong>TSM/SOXX &amp; INTC at &lt;45</strong>). If you’re a highroller you can take a chance on cannabis which has taken a hit and may have upward movement with Dems trying to move legislation forward. Also consider mining ops like <strong>GDX</strong> and green energy.</p>

<p>Obligatory I’m not a financial advisor and do your own DD.</p>]]></content><author><name>{&quot;avatar&quot;=&gt;&quot;/assets/pics/avatar.jpg&quot;, &quot;bio&quot;=&gt;&quot;&quot;, &quot;location&quot;=&gt;&quot;Los Angeles, CA&quot;, &quot;email&quot;=&gt;&quot;lemaraman@protonmail.com&quot;, &quot;links&quot;=&gt;[{&quot;label&quot;=&gt;&quot;Email&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-envelope-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Website&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-link&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Twitter&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-twitter-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Facebook&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-facebook-square&quot;}, {&quot;label&quot;=&gt;&quot;GitHub&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-github&quot;, &quot;url&quot;=&gt;&quot;https://github.com/lemaraman&quot;}, {&quot;label&quot;=&gt;&quot;Instagram&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-instagram&quot;, &quot;url&quot;=&gt;&quot;https://www.instagram.com/lemaraman/&quot;}]}</name><email>lemaraman@protonmail.com</email></author><summary type="html"><![CDATA[]]></summary></entry><entry><title type="html">the hand we&apos;re dealt</title><link href="https://amans.life/the-hand-we're-dealt/" rel="alternate" type="text/html" title="the hand we&apos;re dealt" /><published>2020-05-03T00:00:00+00:00</published><updated>2020-05-03T00:00:00+00:00</updated><id>https://amans.life/the-hand-we&apos;re-dealt</id><content type="html" xml:base="https://amans.life/the-hand-we&apos;re-dealt/"><![CDATA[<p><img src="/assets/pics/Raoul.jpg" alt="Inflation" class="align-center" /></p>

<p>If I had to relate the last 6 months of trades to anything, it would be the Goliath rollercoaster in my hometown; a slow and steady ascension followed by a terrifying drop off that’s seemingly going in perpetuity.
If you’re a dividend investor, while you took losses on your passive income recently, the game plan doesn’t change much. When you focus on cash flow from dividends you still get paid every month, year, quarter, whatever. Moving forward though, where futures are unpredictable, where can we invest to capitalize on the situation?</p>

<h2 id="the-doom-loop">The Doom Loop</h2>

<p>Baby Boomers.</p>

<ul>
  <li>Average age: 66.</li>
  <li>Amount of money in their pensions: Much.</li>
  <li>About to what? Retire.</li>
</ul>

<p>Pensions exist for spending when you retire, but prior to that, that money is invested into either the stock market or the <strong>credit market</strong>, where companies borrow money by issuing bonds.
The bonds are sought and bought because of the yield and everything is fine and dandy until the economy slows down. The problem is that over the last 5 years, as boomers are slowly selling off their stock to fund their retirements, companies are the main source of buyers in the stock market, buying back their own shares. Millennials though mostly flirting with index funds aren’t really buying stocks and truthfully, most people aren’t. When companies don’t have cash to pay debts during a recession, they ultimately stop buying back their shares and additionally, less are paying taxes so less are buying bonds.</p>

<h2 id="in-an-ideal-situation">In An Ideal Situation…</h2>

<p>The free market would allow prices to adjust so those with little to no assets can buy equities at cheap valuations, so there can be at least some expected return in the future.
But that’s not the case. Millennials are stuck with all-time high valuations in equity markets, minute interest rates from bonds and high prices on property.</p>

<h2 id="the-hand-were-dealt">The Hand We’re Dealt</h2>
<p>The government will not allow the some ~75 million baby boomer voters (who are also, basically, the demographic of the government) to go bust. They will be supported at all costs.
As debt has grown massively over the past 40 years due to decreased interest rates, a problem arises. Companies that can’t service their debts and ultimately go bust invite an insolvency crisis.
Unemployment rises, and pension plans deteriorate. Rather passing blame and instead just facing the reality of the situation,  it’s clear millennials aren’t inheriting an ideal financial market.</p>

<h2 id="insert-crypto">Insert: Crypto.</h2>

<p>This analysis is largely from concepts propagated by <a href="https://twitter.com/RaoulGMI" target="blank">Raoul Pal</a>. I’m a huge fan of his financial outlook and I encourage those looking for a better understanding of macroeconomics to study his work. He recommends <a href="https://www.amazon.com/Bitcoin-Standard-Decentralized-Alternative-Central/dp/1119473861" target="blank">The Bitcoin Standard</a> and encourages people to understand why bitcoin is a great asset for savings. There is a low probability of btc going to zero and while a possibility to fall drastically obviously exists, there is also a possibility of significant return.</p>

<p>There is an opportunity of asymmetric risk here. It’s as if you use a wooden plank to move a giant stone. Sometimes the wood will snap, but there will be times the stone moves.</p>

<p>In a scenario where a young adult has 5k in savings and is not inclined to invest in stocks because of valuations; they can afford to be wrong on btc. There is time to recover, and considering a long period of time, it’s possible to see btc contribute well to a retirement fund.</p>

<p>If you’re another type of investor, though, say real estate, dividends, index funds, etc…then what?
During a recession, prices fall, and it’s ideal to have cash on hand. Especially considering financial institutions likely to follow Chase suite when it comes to <a href="https://www.housingwire.com/articles/chase-now-requires-700-fico-score-20-down-payment-to-buy-a-home/">requiring lenders to have 20% down and a 700+ credit score</a>. Consider <a href="https://www.investors.com/news/warren-buffett-berkshire-hathaway-annual-meeting-2020/" target="blank">Buffet sitting on $137 billion in cash</a>, it might be ideal to open fewer long positions at the moment.</p>]]></content><author><name>{&quot;avatar&quot;=&gt;&quot;/assets/pics/avatar.jpg&quot;, &quot;bio&quot;=&gt;&quot;&quot;, &quot;location&quot;=&gt;&quot;Los Angeles, CA&quot;, &quot;email&quot;=&gt;&quot;lemaraman@protonmail.com&quot;, &quot;links&quot;=&gt;[{&quot;label&quot;=&gt;&quot;Email&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-envelope-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Website&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-link&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Twitter&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-twitter-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Facebook&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-facebook-square&quot;}, {&quot;label&quot;=&gt;&quot;GitHub&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-github&quot;, &quot;url&quot;=&gt;&quot;https://github.com/lemaraman&quot;}, {&quot;label&quot;=&gt;&quot;Instagram&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-instagram&quot;, &quot;url&quot;=&gt;&quot;https://www.instagram.com/lemaraman/&quot;}]}</name><email>lemaraman@protonmail.com</email></author><summary type="html"><![CDATA[]]></summary></entry><entry><title type="html">vulnerable dependencies</title><link href="https://amans.life/Vulnerable-Dependencies/" rel="alternate" type="text/html" title="vulnerable dependencies" /><published>2020-01-09T00:00:00+00:00</published><updated>2020-01-09T00:00:00+00:00</updated><id>https://amans.life/Vulnerable-Dependencies</id><content type="html" xml:base="https://amans.life/Vulnerable-Dependencies/"><![CDATA[<p><img src="/assets/pics/gears.jpg" alt="" /></p>

<p>Building modern software incorporates tons of code. We want sophisticated systems with great functionality and incorporating open source packages helps create them. Unfortunately in doing so, if a package that is implemented has itself a vulnerability, <strong>we’re introducing a vulnerability to potentially the entire system through that dependency.</strong>  A good example of this is Struts, a framework for Java, which was the library responsible for <a href="https://www.wired.com/story/equifax-breach-no-excuse/" target="blank">the Equifax breach</a>, with over  143 million consumers affected.</p>

<h2 class="text-center" id="the-exploit">The Exploit</h2>
<div class="language-java highlighter-rouge"><div class="highlight"><pre class="highlight"><code>
<span class="c1">// ContentTypeHandler Java class in Struts</span>
  <span class="kd">class</span> <span class="nc">ContentTypeHandler</span> <span class="kd">extends</span> <span class="nc">Interface</span> <span class="o">{</span>
  <span class="nc">ContentTypeHandler</span><span class="o">()</span> <span class="o">{</span>
    <span class="k">this</span><span class="o">.</span><span class="na">hasQualifiedName</span><span class="o">(</span><span class="s">"org.apache.struts2.rest.handler"</span><span class="o">,</span> <span class="s">"ContentTypeHandler"</span><span class="o">)</span>
  <span class="o">}</span>
<span class="o">}</span>

<span class="c1">//'toObject' method</span>
  <span class="kd">class</span> <span class="nc">ToObjectDeserialzer</span> <span class="kd">extends</span> <span class="nc">Method</span> <span class="o">{</span>
  <span class="nc">ToObjectDeserializer</span><span class="o">()</span> <span class="o">{</span>
    <span class="k">this</span><span class="o">.</span><span class="na">getDeclaringType</span><span class="o">().</span><span class="na">getASuperType</span><span class="o">*()</span> <span class="k">instanceof</span> <span class="nc">ContentTypeHandler</span> <span class="n">and</span>
    <span class="k">this</span><span class="o">.</span><span class="na">getSignature</span> <span class="o">=</span> <span class="s">"toObject(java.io.Reader,lang.Object)"</span>
  <span class="o">}</span>
<span class="o">}</span>

</code></pre></div></div>
<p><strong>Sample code used to detect vulnerability</strong></p>

<h2 class="text-center" id="pentest-credits-to-riyaz-walikar"><strong><a href="https://twitter.com/riyazwalikar" target="blank">Pentest credits to Riyaz Walikar</a></strong></h2>

<p>Triggered by sending a malicious XML POST payload with the “Content-Type” header set to “application/xml”.</p>

<script src="https://gist.github.com/riyazwalikar/473054c92463f24dfa763d263d95fca5.js"></script>

<p>Equipped with adequate payload the vulnerability allows code execution on the server. Code executed doesn’t block the parent thread as it uses the <code class="language-plaintext highlighter-rouge">java.lang.ProcessBuilder</code> class. Executing time delay commands dont help.</p>

<p><code class="language-plaintext highlighter-rouge">(ping -n 20 127.0.0.1, sleep 5 etc.)</code></p>

<p>So, send network packets to a self-controlled server. Linux, <code class="language-plaintext highlighter-rouge">wget</code> or <code class="language-plaintext highlighter-rouge">curl</code>. Windows, <code class="language-plaintext highlighter-rouge">ping</code> your server and use <code class="language-plaintext highlighter-rouge">tcpdump</code> to check for incoming ICMP packets.</p>

<p>The <code class="language-plaintext highlighter-rouge">ping</code> command in this payload will send 10 ICMP requests to the server running <code class="language-plaintext highlighter-rouge">tcpdump</code>.</p>

<script src="https://gist.github.com/riyazwalikar/1d8c73bcfe1ddea3d299dd8a8d0c431a.js"></script>

<p>Run the following tcpdump command on your server.</p>

<p><code class="language-plaintext highlighter-rouge">tcpdump -nni yourinterface icmp</code></p>

<p><img src="/assets/pics/Tcpdumpshowing2ICMPecho.jpg" alt="Tcpdumpshowing2ICMPecho" /></p>

<p>So it’s established the application is vulnerable, open up calc via shell commands to the server.</p>

<script src="https://gist.github.com/riyazwalikar/ae4e235d1cbe0b3eb9bf9d7b37c31450.js"></script>

<p><img src="/assets/pics/processexplorer.jpg" alt="Calc" class="align-center" /></p>
<center>Java process popped calc. voilà.</center>

<h2 class="text-center" id="richer-targets">Richer Targets</h2>
<p>Be cognizant of dependencies, don’t assume all supporting software products are flawless. Even if our system isn’t as attractive to attacks, we become a target by using a vulnerable framework since <strong>every organization using that framework is going to be vulnerable</strong>. Of course, the downside to an open source package is that anyone can read/reverse engineer it.</p>

<h2 class="text-center" id="its-not-all-rain-my-friend">It’s not all rain, my friend.</h2>
<p>In any case, tools are available to check for vulnerable dependencies like <a href="https://www.owasp.org/index.php/OWASP_Dependency_Check" target="blank">OWASP dependency check</a>, <a href="https://blog.npmjs.org/post/173719309445/npm-audit-identify-and-fix-insecure" target="blank">npm audit</a>, <a href="https://retirejs.github.io/retire.js/" target="blank">Retire.js</a>, and more. More importantly, <a href="https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax" target="blank">those dependencies should be updated and vetted on a consistent basis</a>.</p>]]></content><author><name>{&quot;avatar&quot;=&gt;&quot;/assets/pics/avatar.jpg&quot;, &quot;bio&quot;=&gt;&quot;&quot;, &quot;location&quot;=&gt;&quot;Los Angeles, CA&quot;, &quot;email&quot;=&gt;&quot;lemaraman@protonmail.com&quot;, &quot;links&quot;=&gt;[{&quot;label&quot;=&gt;&quot;Email&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-envelope-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Website&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-link&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Twitter&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-twitter-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Facebook&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-facebook-square&quot;}, {&quot;label&quot;=&gt;&quot;GitHub&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-github&quot;, &quot;url&quot;=&gt;&quot;https://github.com/lemaraman&quot;}, {&quot;label&quot;=&gt;&quot;Instagram&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-instagram&quot;, &quot;url&quot;=&gt;&quot;https://www.instagram.com/lemaraman/&quot;}]}</name><email>lemaraman@protonmail.com</email></author><summary type="html"><![CDATA[]]></summary></entry><entry><title type="html">basic privacy guide for noobs</title><link href="https://amans.life/basic-security-practices-for-noobs/" rel="alternate" type="text/html" title="basic privacy guide for noobs" /><published>2020-01-07T00:00:00+00:00</published><updated>2020-01-07T00:00:00+00:00</updated><id>https://amans.life/basic-security-practices-for-noobs</id><content type="html" xml:base="https://amans.life/basic-security-practices-for-noobs/"><![CDATA[<p><img src="/assets/pics/joegoldberg.jpg" alt="Creep" class="align-center" /></p>

<h2 class="text-center" id="dont-fall-victim-to-a-joe-goldberg">Don’t fall victim to a Joe Goldberg.</h2>

<p>If you haven’t watched <a href="https://www.youtube.com/watch?v=YfUv0VSoTJw" target="blank"><em>You</em></a> on Netflix, it gives a glimpse into the absurd amount of info people put out about themselves nowadays.  <em>Spoiler alert</em>. It’s not the best idea.</p>

<p>All jokes aside, I thought I’d open up the blog with some basic, easy to follow tips on improving personal security while using the web. You don’t have to be a security professional or even tech-savvy to follow along with this. If you do have any questions, feel free to shoot me an <a href="mailto:lemaraman@protonmail.com">email</a>.</p>

<blockquote>
  <p><em>But Lemar, why? I have nothing to hide. What’re they gonna do, look at pictures of my cat?</em>  <br /></p>
</blockquote>

<p>It’s a valid question. A very simple answer would be that your privacy is invaded by many sites you visit. Your internet service provider, search engines, governments, and private interests store <a href="https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html" target="blank">massive datasets</a> on us.</p>

<ul>
  <li>Even if you trust an entity with your information, it’s not promised to always solely belong to them. We’re seeing more frequent instances of <a href="https://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/" target="blank">personal data being sold to third parties</a>, and we all know companies <em>always</em> have our best interests in mind, right? If you think privacy isn’t important because you have nothing to hide, you might as well say free speech isn’t important to you because you have nothing useful to say. Privacy means <strong>something</strong> to everyone.</li>
</ul>

<p><img src="/assets/pics/gabsmashh-publicinfo.jpg" alt="gabbs" target="https://twitter.com/gabsmashh/status/1213871011826950144?s=20" class="align-center" /></p>

<p>Gotta get this one out of the way. Seriously, guys, <strong>stop sharing info about yourself if you’re not prepared for it to be stored on some server, somewhere, forever.</strong> Ditching socials isn’t an attractive nor dare I say, <em>feasible</em> option for most, but it’s probably the easiest way to limit public info about yourself. Recognize that public comments and broadcasting real information about yourself puts you at risk, more often than not.</p>

<p>Keep in mind moving forward that <em>typically</em> the more you beef up your security, the less convenient your time utilizing the web will be.
 Lets get into it.</p>

<h2 id="1-use-a-password-manager">1. Use a password manager.</h2>
<p>Convenience and security actually coexist with this one. Password managers allow you to store all of your passwords in one place on the cloud (a global network of servers). There are a few reasons for using one. Many data breaches occur because one website you used in 2006 got attacked, and your password was exposed. <em>You know</em>… that same password you use for basically every other website you visit, like club penguin. A good password manager generates unique passwords for each service you use, so you’re actually incorporating a ton of diversity into the log-in info you use. These managers usually have rigorous encryption, which makes it difficult for attackers to access them. As mentioned, you also get convenience with a password manager because you only have to remember one master password.</p>

<ul>
  <li>My favorite is <a href="https://www.lastpass.com/" target="blank">Last Pass</a>. You don’t need the premium version, free is fine. Make your master password <a href="https://howsecureismypassword.net/" target="blank">very secure</a>, and generate new passwords for the sites you use <strong>inside the password manager!</strong> The password manager can and should be used across different devices, which should be secure themselves with pins, passwords, and two-factor authentication when possible.</li>
</ul>

<p><strong>Edit 10/30</strong> Since this post, there has been some controversy with lastpass. I now recommend <a href="https://bitwarden.com/">Bitwarden</a>, you can <a href="https://bitwarden.com/help/article/import-from-lastpass/">migrate lastpass to bitwarden here.</a></p>

<h2 id="2-two-factor-authentication">2. Two-factor authentication.</h2>
<p>You’ve probably clicked <em>“Set Up Later”</em> on the prompts urging you to set up two factor authentication across various sites. Basically, two factor authentication makes it so even if someone gained access to your password, they’d need an additional code from your phone to gain access. Now, when I mention your phone, I mean a mobile app like <a href="https://www.google.com/landing/2step/" target="blank">Google Authenticator</a> or something similar, not your phone number. Using your phone number (as in, getting the authentication code over text) has been proven to be a great security risk because of <a href="https://www.maketecheasier.com/sim-card-hijacking/" target="blank">Sim Card Hijacking</a>, but it’s better than nothing. So, the next time the services you use prompt you to set up 2FA, just do it. Actually, go do it right now. Go.</p>

<h2 id="3-web-browsers">3. Web Browsers</h2>
<p>Use whatever web browser your heart desires, I guess. But, <strong>please</strong> be very wary of the add-ons and extensions you add to it, and how you have it configured. I will say you should definitely set up your default search engine to either <a href="https://duckduckgo.com/" target="blank">DuckDuckGo</a> or <a href="https://www.startpage.com/" target="blank">StartPage</a>. <strong>I highly recommend you follow the following steps on setting up FireFox. You only have to do this once, and then you’re good to go.</strong> Otherwise, skip to section 4.</p>
<ul>
  <li>Firefox is a very powerful browser that lets you control your privacy completely. Really, no other user-friendly browser compares. Getting maximum privacy and security settings will require some effort but in my opinion it’s very worth it.</li>
</ul>

<ol>
  <li>Download and install <a href="https://www.mozilla.org/en-US/firefox/new/" target="blank">Firefox</a>.</li>
  <li>Open up the “options” via the three dashed lines in the top right corner, and move to “Privacy and Security” via the tabs on the left. Change <strong>enhanced tracking protection</strong> to “Strict”. Don’t worry, this is unlikely to break any of the mainstream websites you visit and you can alter this setting on a per need basis as you deem fit.</li>
  <li>Under <strong>Cookies and site data</strong>, toggle delete when Firefox is closed. If you already have used firefox in the past, now is a good time to clear your data as well.</li>
  <li>Under <strong>Logins and Passwords</strong>, make sure “Ask to save logins and passwords” is <strong>unchecked</strong>. You can use the <a href="https://addons.mozilla.org/en-US/firefox/addon/lastpass-password-manager/" target="blank">LastPass Firefox Add-On for this</a>.</li>
  <li>Scroll further down to <strong>“History”</strong>, and change “Firefox will” to: “Use Custom Settings for history”. Toggle on “Always use privacy browsing mode”. This is important because over time, browsers pile up info on you and your revealing habits. Keep in mind, you won’t be able to check the history of sites you visit with this option.</li>
  <li>Under Address Bar, uncheck all suggestions. While this is convenient, it makes it so further information about you is collected.</li>
  <li>Under <strong>Permissions</strong>, click the Settings box for “Location”, “Camera”, “Microphone”, and “Notifications”. and select “Block new requests asking to access” for each one.</li>
  <li>Even though we trust Mozilla, disallow their request for <strong>Data Collection</strong>.</li>
  <li>Under <strong>Security</strong> uncheck “Block dangerous and deceptive content.” While it sounds like a great option to have, this service is actually provided by Google, which isn’t mentioned here. I’m not too fond of sharing with my info with Google, so we’ll be utilizing a different, more recommended extension for this service later on.</li>
  <li>Under <strong>Search Bar</strong>, change your default search engine to Duckduckgo. Opt out of search suggestions to prevent tracking.</li>
  <li>Under <strong>Home</strong> in settings, change your homepage and new tabs to open up with a blank page. Opt out of top sites and highlights.</li>
  <li>That does it for visible settings, but feel free to go even further by accessing settings under the hood.
    <ul>
      <li>Type about:config in your firefox url box. Click “Accept risks and continue”.</li>
      <li>Open up <a href="https://www.privacytools.io/browsers/" target="blank">PrivacyTools.IO</a>. Scroll down to the “How to disable WebRTC in Firefox” section, and follow the instructions. This will allow us to capitalize on some more settings we’ll set up later.</li>
      <li>Browse the rest of the instructions on privacytools.io and tweak your settings accordingly.</li>
    </ul>
  </li>
  <li>Add-ons and Extensions
    <ul>
      <li>Head over to <a href="https://addons.mozilla.org/en-US/firefox/" target="blank">The Firefox Add-Ons directory</a>.</li>
      <li>Search for <a href="https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/" target="blank">HTTPS everywhere</a>, and add it to your browser.</li>
      <li>Search for <a href="https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/" target="blank">Ublock Origin</a>, and add it to your browser. Alternatively, you could use <a href="https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/?src=search" target="blank">Privacy Possum</a> or <a href="https://addons.mozilla.org/en-US/firefox/addon/ghostery/?src=search" target="blank">Ghostery</a>.</li>
      <li>If at any time an add-on breaks a site you visit or it prompts you to disable your ad blocker, you can go into the settings for the add-on and allow permissions for the site. Do this at your own risk and only if you trust the website. You don’t have to use these add-ons, but they are the ones I like.</li>
    </ul>
  </li>
</ol>

<p>That’s it for add-ons. You can do your own research and decide whether you want to personalize it even further.</p>

<h2 id="4-virtual-private-networks-vpn">4. Virtual Private Networks (VPN)</h2>
<p>VPNs are a way to hide your identity on the websites you visit and from your internet service provider, as well as encrypt your traffic so as to prevent entities trying to track you. <strong>I cant emphasize this enough, stay away from free VPNs</strong>. <a href="https://techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/" target="blank">Using a sketchy VPN may compromise your personal security</a>. Pay the $5-$10 or so a month and use a decent service. I recommend <a href="https://www.ipvanish.com/" target="blank">IPVanish</a> but do your research into a provider that fits your budget and needs.</p>

<h2 id="5-back-up-your-data">5. Back Up Your Data.</h2>
<p>You’ve probably heard the term “Ransomware” in the media as of recent. Some major attacks, causing hundreds of millions of dollars in damages, have affected people and companies because attackers hold data captive for a price. Most of the time, even when the attackers are paid, the data is lost anyways. The best way to defend is to have a proper backup and restoration process. The golden rule is to keep your files backed up to <strong>at least</strong> 3 locations. This way, even if one goes down, you still have copies. Go buy a <a href="https://www.amazon.com/Seagate-Portable-External-Hard-Drive/dp/B07CRG94G3/ref=sr_1_5?keywords=hard+drive&amp;qid=1578473293&amp;sr=8-5" target="blank">hard drive</a> and backup your photos, files, and whatever else you think is important just in case. This isn’t even really a security protocol, more so a general process to make sure your files are safe in case they get damaged or lost.</p>

<h2 id="6-utilize-security-driven-services-and-products">6. Utilize Security-Driven Services and Products.</h2>
<p>For phone calls and messages, this might be <a href="https://www.signal.org/" target="blank">Signal</a>. For email this might be <a href="https://protonmail.com/" target="blank">Proton Mail</a>. Basically, most of the mainstream email service providers and just communication services in general have <a href="https://en.wikipedia.org/wiki/Privacy_concerns_regarding_Google" target="blank">terrible security protocol</a>, with some flat out reading your emails. The main take away from this section is that you should do your research and use products and services that you trust.</p>

<h2 id="7-change-operating-systems">7. Change Operating Systems.</h2>
<p>This one isn’t really for the average person, especially those who’ve grown accustomed to using an operating system. To summarize the benefits on why swapping to an operating system like <a href="https://www.parrotsec.org" target="blank">Linux</a> is ideal:</p>
<ul>
  <li>Windows is a popular choice. Roughly 90% of all computers on the web are using it. This means as an attacker, I’d want to develop my strategy and tactics biased towards Windows systems because there are just more fish in the sea. By swapping to a less used system, you’re improving your security through obscurity.</li>
  <li>Linux is open source(anyone can see the code that makes it). This might seem like a security nightmare, but is actually a critical element on why it’s secure. It allows the good guy professionals to inspect how the system is made and make sure there are no bugs or vulnerabilities.</li>
  <li>Probably the most significant advice I could give any organization or person is to limit admin permissions. Linux does this by having a better user privileges model. While windows users are generally given administrator access by default, Linux in contrast restricts admin access.</li>
  <li>If you aren’t fond of switching operating systems, attempt to <a href="https://www.youtube.com/watch?v=sB_5fqiysi4" target="blank">learn to use a virtual machine</a> for any risky online behaviour you may wish to engage in.</li>
</ul>

<h2 id="8-scaling-to-other-devices">8. Scaling To Other Devices</h2>
<p>Most of the information I wrote here can be applied to various devices, so apply it accordingly. Disable your bluetooth and location services on your mobile device when not in use, and enable your VPN on your mobile device as well. Get rid of apps you don’t use. Know that the texts you send have essentially no encryption. At the very least, limit permissions on your apps. Twitter doesn’t need your location. Snapchat doesn’t need access to your texts. Nice video about securing your phone <a href="https://www.youtube.com/watch?v=m_SN1CB3Kts" target="blank">here</a>.</p>

<h2 id="9-retain-and-work-towards-securing-pre-existing-personal-data">9. Retain and Work Towards Securing Pre-Existing Personal Data.</h2>
<p>Research yourself. You may be surprised at what you find. Ask Google to <a href="https://support.google.com/accounts/answer/3024190?hl=en" target="blank">provide you your data file</a>. Enter your email on <a href="https://haveibeenpwned.com/" target="blank">have I been pwned</a>. Search yourself up on <a href="https://www.google.com/" target="blank">Google</a>, and contact <em>‘owners’</em> of your data to see if you can get your information removed.</p>

<p>And that should do it. Again, if you have any questions or anything to add, feel free to shoot me an <a href="mailto:lemaraman@protonmail.com">email</a>.</p>]]></content><author><name>{&quot;avatar&quot;=&gt;&quot;/assets/pics/avatar.jpg&quot;, &quot;bio&quot;=&gt;&quot;&quot;, &quot;location&quot;=&gt;&quot;Los Angeles, CA&quot;, &quot;email&quot;=&gt;&quot;lemaraman@protonmail.com&quot;, &quot;links&quot;=&gt;[{&quot;label&quot;=&gt;&quot;Email&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-envelope-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Website&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-link&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Twitter&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-twitter-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Facebook&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-facebook-square&quot;}, {&quot;label&quot;=&gt;&quot;GitHub&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-github&quot;, &quot;url&quot;=&gt;&quot;https://github.com/lemaraman&quot;}, {&quot;label&quot;=&gt;&quot;Instagram&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-instagram&quot;, &quot;url&quot;=&gt;&quot;https://www.instagram.com/lemaraman/&quot;}]}</name><email>lemaraman@protonmail.com</email></author><summary type="html"><![CDATA[]]></summary></entry><entry><title type="html">early to the universe</title><link href="https://amans.life/Early-To-The-Universe/" rel="alternate" type="text/html" title="early to the universe" /><published>2020-01-02T00:00:00+00:00</published><updated>2020-01-02T00:00:00+00:00</updated><id>https://amans.life/Early-To-The-Universe</id><content type="html" xml:base="https://amans.life/Early-To-The-Universe/"><![CDATA[<p><img src="/assets/pics/earths.jpg" alt="Beyond" title="Parallel Earths" class="align-center" /></p>

<h2 class="text-center" id="maybe-someone-a-trillion-years-from-now-will-read-this">Maybe someone a trillion years from now will read this.</h2>

<p>An article written by <a href="https://www.forbes.com/sites/curtissilver/2016/08/15/are-earth-humans-the-aliens-early-to-the-universes-life-party/#2740bb00318d">Forbes</a> further corroborated by an article from <a href="https://www.nasa.gov/feature/goddard/most-earth-like-worlds-have-yet-to-be-born-according-to-theoretical-study">NASA</a> propagates the ideology that planet Earth has emerged early in the life of the Universe. Scientists estimate the Universe is roughly 13.8 billion years old, but according to the articles over 90% of Earth-like planets that will ever exist have yet to be formed. The last star isn’t expected to burn out until 100 trillion years.</p>

<p>If the current expansion occurring within our universe continues, descendants clever enough about prolonging their existence could do so into the many trillions of years in the future.</p>

<p>I can’t help but ponder about the many intelligent civilizations cognizant of their nature and the universe that will arise after us. There is beauty and disaster in humanity’s early arrival. On one hand, we’re among the primary wave of intellectually sentient beings that will exist and there is something special about our place in the cosmos, whatever that may be.</p>

<p>On a less optimistic view… you and I will be missing a lot. Intelligent civilizations that are inevitably bound to have significant time to develop could help less developed ones. Beings in the future might not have to worry about inventing the wheel or engineering a dyson sphere, because some good ol’ aliens are there to help them. We can go down the rabbit hole when speculating, but its undeniable that there will be exponentially more opportunity with the crucial element of time and a more hospitable universe.</p>

<p>You and I are here in a stimulating time. We have the opportunity within the next few decades to significantly transform our capabilities and maybe even some of the civilizations that arise on another planet. Convincing our civilization to stop squabbling over different pigments of skin and to become efficient towards this goal seems to be the biggest obstacle, though.</p>]]></content><author><name>{&quot;avatar&quot;=&gt;&quot;/assets/pics/avatar.jpg&quot;, &quot;bio&quot;=&gt;&quot;&quot;, &quot;location&quot;=&gt;&quot;Los Angeles, CA&quot;, &quot;email&quot;=&gt;&quot;lemaraman@protonmail.com&quot;, &quot;links&quot;=&gt;[{&quot;label&quot;=&gt;&quot;Email&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-envelope-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Website&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-link&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Twitter&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-twitter-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Facebook&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-facebook-square&quot;}, {&quot;label&quot;=&gt;&quot;GitHub&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-github&quot;, &quot;url&quot;=&gt;&quot;https://github.com/lemaraman&quot;}, {&quot;label&quot;=&gt;&quot;Instagram&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-instagram&quot;, &quot;url&quot;=&gt;&quot;https://www.instagram.com/lemaraman/&quot;}]}</name><email>lemaraman@protonmail.com</email></author><summary type="html"><![CDATA[]]></summary></entry><entry><title type="html">about</title><link href="https://amans.life/about/" rel="alternate" type="text/html" title="about" /><published>2020-01-01T00:00:00+00:00</published><updated>2020-01-01T00:00:00+00:00</updated><id>https://amans.life/about</id><content type="html" xml:base="https://amans.life/about/"><![CDATA[<p><img src="/assets/pics/me.jpg" alt="me" title="Just Me" class="align-center" /></p>

<h2 id="im-lemar-aman">I’m Lemar Aman,</h2>

<p>LA native and software developer.</p>

<p>I’ve worked as a private security consultant for the majority of my professional career, advising companies like <a href="https://www.aigusa.com/" target="blank">AIG</a> on improving security protocol. My focus is on helping people and businesses protect themselves as they navigate through the digital realm.</p>

<p>Want to chat? Feel free to <a href="mailto:lemaraman@protonmail.com">email me</a>, or open a <a href="https://github.com/amanlemar" target="blank">GitHub issue</a> if you have a question other people might be interested in.</p>]]></content><author><name>{&quot;avatar&quot;=&gt;&quot;/assets/pics/avatar.jpg&quot;, &quot;bio&quot;=&gt;&quot;&quot;, &quot;location&quot;=&gt;&quot;Los Angeles, CA&quot;, &quot;email&quot;=&gt;&quot;lemaraman@protonmail.com&quot;, &quot;links&quot;=&gt;[{&quot;label&quot;=&gt;&quot;Email&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-envelope-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Website&quot;, &quot;icon&quot;=&gt;&quot;fas fa-fw fa-link&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Twitter&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-twitter-square&quot;, &quot;url&quot;=&gt;nil}, {&quot;label&quot;=&gt;&quot;Facebook&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-facebook-square&quot;}, {&quot;label&quot;=&gt;&quot;GitHub&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-github&quot;, &quot;url&quot;=&gt;&quot;https://github.com/lemaraman&quot;}, {&quot;label&quot;=&gt;&quot;Instagram&quot;, &quot;icon&quot;=&gt;&quot;fab fa-fw fa-instagram&quot;, &quot;url&quot;=&gt;&quot;https://www.instagram.com/lemaraman/&quot;}]}</name><email>lemaraman@protonmail.com</email></author><summary type="html"><![CDATA[]]></summary></entry></feed>