Privacy & Identity Security
Privacy&
Identity
Security
The part of cybersecurity that follows people home.
Practical research and awareness on digital exposure, identity protection, data broker risk, and the human side of cybersecurity. For individuals, families, SMBs, and operators without a dedicated privacy team.
Why This Section Exists
This section focuses on the overlap between privacy, identity, and human behavior — the attack surface that extends beyond enterprise perimeters into family homes, personal phones, and the accounts of people who have never worked in security.
Most privacy content is either too legalistic, too consumer-gadget focused, or too vendor-driven. This section occupies the middle ground: practical guidance for families, executives, small businesses, and operators who are exposed, busy, and under-supported.
Not a framework. Not a product. A Deretti Cyber Labs research and awareness desk for the human side of security.
Launch Series
Five Articles
The launch series covers the full arc from philosophical foundation to practical action. Start with autonomy. End with field notes.
Why privacy is about control, not hiding — and why that changes how you defend it.
Credentials, MFA, phone numbers, data brokers, scams — how they connect.
34 items. 5 categories. Prioritized. Start with email; work outward.
SMS and TOTP MFA are bypassed at scale. Phishing-resistant MFA is the standard.
Your address, phone, relatives, and location history are commercially available.
By Audience
Four Tracks
The content is organized around who needs it. Technical and non-technical. Personal and organizational.
Personal & Family
For Individuals and Families
Accounts, phones, families, scams, personal data, and the quiet ways privacy is lost before anyone calls it a breach.
SMB & Executive
For Operators and Executives
Admin accounts, Microsoft 365 hardening, executive impersonation, break-glass accounts, and the personal-to-business identity boundary.
Awareness
Awareness Briefings
Short, practical, shareable briefings on active scam patterns, platform changes, and data exposure events.
Reference
Tools and Checklists
Directly actionable tools: checklists with step-by-step guidance, external resources, and recovery references organized by need.
Field Notes
Identity Exposure Notes
Short, practical observations on active scam patterns, data broker events, platform changes, and identity risks that affect real people right now.
How synthetic voice attacks work and why the only defense is behavioral.
The mechanics of SIM swap attacks and the carrier PIN that mitigates most of it.
Ongoing briefings on QR scams, data broker opt-outs, platform MFA changes, and identity recovery.
Origin Material
2022 Essay
A Philosophical Take on the Right to Privacy — the original essay that seeded this section. Substantially rewritten for currency.
blog.deretti.net →2023 Awareness
Our Personal Data Is a Goldmine for Cybercriminals — the practical identity awareness thread connecting family security and digital footprint.
blog.deretti.net →2022 Ethics
Will Technology Ever Rule the World? — the broader ethical and surveillance layer: data collection, civil liberties, and human control.
blog.deretti.net →