Clean and Simple the way life should be.

Spot the Fake: Phishing Challenge

One of these links is legitimate, the other is a clever fake. Can you tell the difference?

https://google.com

https://gооgle.com

Or I can tell you about the hardware in your computer. A malicious website might use this same technique to 'fingerprint' your device—building a unique profile that could be exploited. Attackers use this data to identify vulnerable components needing patches or updates, making it easier to target specific weaknesses. Even if they’re not actively exploiting a flaw, they might simply collect this information to track and profile you across the web.

To counter this, regularly update your system to patch vulnerabilities, disable unnecessary browser features like WebGL if fingerprinting concerns you, and consider using tools that block invasive scripts. Limiting the data your browser exposes can make it harder for malicious sites to build a detailed profile.

WebRTC Network Exposure Test

Click the button to check for leaks.

Things I Love about Technology


I mentioned I am a grizzled veteran of technology and that is true. One area I have always been drawn to are things that eventually evolved into Cyber Security. I love the chase of hunting down malware persistence in a registry or elsewhere on a system. I love managing EDR and or email security gateways/appliances. And I love helping others learn and do the things I do. Done right tech is not the mystery many make it out to be. I have a favorite phrase that holds very true. RTFM or read the frikkin manual. If more people did that a lot of IT would be looking for work and many more people would be safer than they are. Sadly, people have short attention spans and dislike a lot of technology, so they have people like me around instead.


What follows here are just a few examples of things the internet can do to you and for you. All of the controls on this page are designed to be opt-in / voluntary none are malicious, and all will show you from just a simple web page what someone can learn about you and your computer

Social Media Tracking Test

Checking...

I can show you where you are—or more precisely, where your computer thinks you are. But a malicious website might use this information for far more concerning reasons. Cybercriminals harvest location data to personalize scams, bypass security measures, and exploit regional vulnerabilities. Some use it for tracking or stalking, selling the information to shady brokers, while others refine phishing attacks or spoof legitimate access based on your whereabouts. A compromised geolocation can make you a more effective target, making security awareness crucial. To protect yourself, limit site permissions, clear cookies regularly, use a VPN, and disable location tracking for untrusted websites. Staying vigilant helps keep your digital footprint secure.

The Danger of Homoglyph Attacks

Cybercriminals use visually identical characters (like Cyrillic "о" vs. Latin "o") to craft fake URLs that look real at a glance.


This trick is used in:


Phishing emails—a malicious link disguised as a login page.


Fake websites—fraudsters mimic trusted domains for scams.


Malware downloads—users click thinking it’s a safe source.

How to Spot & Avoid Phishing Attacks

Copy & paste URLs instead of clicking—many fakes become obvious in plain text.

Look for Unicode tricks—hover over links to see where they really go.

Enable browser security features—some warn against misleading domains.

Use a password manager—they won’t autofill credentials on deceptive sites.

WebRTC can unintentionally reveal private IP addresses, even when using a VPN. Cybercriminals, advertisers, and surveillance tools can leverage this leak to:


Identify your real IP even behind proxies.


Fingerprint devices across different networks.


Map network structures for potential exploits.

How to Prevent WebRTC Leaks


Disable WebRTC in browser settings or use privacy-focused extensions.


Ensure VPNs offer WebRTC leak protection (not all do!).


Block WebRTC requests with firewall rules or privacy scripts.

Device & Hardware Information

Many websites can detect whether you're logged into social media accounts without requiring explicit consent.


They use:

Login status detection: Embedded scripts scan cookies for active sessions.


Autofill exploits: Sites may trigger autofill prompts to uncover stored credentials.


Pixel tracking: Hidden trackers send data back to advertisers or third-party analytics tools.

How to Stop It
Use browser privacy settings to block tracking cookies.

Disable autofill for sensitive fields like email and password entry.

Run script blockers (like uBlock Origin) to stop tracking pixels.

Log out of social accounts when browsing sensitive sites.


Want proof? Log out of one of the accounts shown in my widget and then refresh the page.