I would upvote you but my vote power is trashed right now.
I am approaching this from close to zero knowledge, so I am honing in on a format that touches on practical points that will be accessible to most folks that would follow the series (and started, like me, with little security background) but also respecting a sort of vector of development.
A good example is the article I cite by @citizen4. It begs the question, "Well then... How do we choose a VPN? A Google search doesn't seem to enighten the situation." That is a perfectly practical situation that hopefully we can treat soon.
If any questions come up for you, don't hesitate to ask. Maybe, we can find an answer together.
And thank you!!!
I would upvote you but my vote power is trashed right now.
I am approaching this from close to zero knowledge, so I am honing in on a format that touches on practical points that will be accessible to most folks that would follow the series (and started, like me, with little security background) but also respecting a sort of vector of development.
A good example is the article I cite by @citizen4. It begs the question, "Well then... How do we choose a VPN? A Google search doesn't seem to enighten the situation." That is a perfectly practical situation that hopefully we can treat soon.
If any questions come up for you, don't hesitate to ask. Maybe, we can find an answer together.
Best wishes!