← Back to main page
CyberSecurity & Social Engineering — main page

Information and Behavioral Hygiene for Working with a PC

This material is an extended analytical essay and is intended for thoughtful reading. It is not a brief guide or instruction.

It has been over a quarter of a century since the release of the film The Matrix, one of whose central motifs was the idea of virtual space not as a zone of rest, but as an environment of conflict—complex, hostile, and potentially dangerous for humans. Similar themes were raised in other iconic works: the animated film Ghost in the Shell, the pictures Avalon, eXistenZ, and a number of others.

These works, in an artistic form, draw attention to an important idea: cyberspace is not a "light" version of the real world in terms of risks and vulnerabilities. On the contrary, in the digital environment, a person can be subjected to more intense, prolonged, and often anonymous influence—at the level of information, psyche, behavior, and decision-making.

Unfortunately, many users still perceive a personal computer and the Internet as a kind of harmless toy or means of entertainment. Behaviorally, this is expressed in the fact that, being at a PC, a person behaves as if they were sitting in a pub with friends, discussing life over a mug of beer or something stronger.

That is, the computer and the Internet are often used idly, impulsively, and unconsciously—without any understanding of the consequences of one's own actions.

Meanwhile, the personal computer is one of the highest achievements of applied science of the 20th–21st centuries, and the Internet represents not only colossal opportunities for education, self-development, and professional growth, but also a complex, aggressive environment, saturated with threats to the user's informational, psychological, and in some cases, physical security.

Below, I would like to share recommendations based on my own, largely bitter, experience of many years of working with PCs and the Internet (as well as observations of typical—sometimes comical, sometimes tragic—mistakes made by people in the digital environment)—in the hope that the reader can avoid at least some of the mistakes that will be discussed here.

This article is a popular science essay on digital, behavioral, and information hygiene. Without excessive technical complexity, but with clear examples, ironic observations, and practical conclusions. It is intended for a wide audience and will be useful to anyone who wants to use a PC consciously and safely.


1. Rejection of Unlicensed Software

The first and fundamental rule of digital hygiene is the rejection of pirated software.
Either you purchase licensed versions of commercial products, or you switch to free or limited-free software.

If you are using pirated versions of Windows, Microsoft Office, or any other software product, it makes sense to ask yourself a simple but extremely unpleasant question:
what specific changes were made to this software besides cracking the license?

An unlicensed Windows installed on your PC can:

And it's important to understand here: a "hacker" is not necessarily an abstract teenager from a forum. It could be a person recruited by an international criminal group, the intelligence services of a totalitarian state—or just a professional cybercriminal without any ideology. The Internet is democratic: anyone can harm you.

Theft is condemned in all developed cultures—be it Christianity, Islam, Buddhism, secular ethics, or, if you will, the civil and criminal code of your country. And characteristically—theft consistently leads to bad consequences, regardless of cultural context.

By using pirated software, you commit a petty theft—but at the same time, you support a criminal ecosystem and, possibly, become part of a complex distributed information-gathering system created by the very person who "just patched" your Windows.

The irony here is that by saving a nominal $300, you:

The savings turn out to be expensive. Very expensive.

Downloading pirated software from dubious sources is roughly the same as a child opening the door to a stranger because they said:
"I'm good. I won't do anything bad."

People in general love to believe words. Especially when it's convenient for them.

If you are not tied to Windows for professional reasons or specific hobbies (the need to work specifically in Microsoft Office, attachment to Photoshop and the Adobe ecosystem, etc.)—switch to Linux.

Most Linux distributions are distributed free of charge. Download official builds from developers' websites, avoid custom "folk" builds, perform configuration yourself or entrust it only to trusted specialists.

If Windows is truly critical for you—just buy a license.
It's cheaper than the consequences.

↑ To Table of Contents | ↑ To Chapter Start

2. Computer Games as a Factor of Attention Degradation

2.1 The Essence of the Problem

If you are over 18 years old — give up computer games.

Dear readers, treat your brain carefully. It should not be suppressed, much less destroyed. On the contrary — it should be cherished and developed. You have only one. For life. A spare, alas, is not provided.

Master free software, the basics of cybersecurity, programming, web development, databases — everything that truly develops thinking and has practical value.

Life is short and fleeting. Time flows faster than it seems. And with high probability, at 38 you will not be continuing to slash virtual orcs and shoot digital terrorists, but will regret not giving up games at 18 — regretting the years spent not on mastering Shell, Bash, PowerShell or system administration, but on meaningless dopamine noise.

Windows has historically attracted users with an abundance of computer games. And yes, as in any art form, there are masterpieces among games — Half-Life 2, Morrowind, Civilization and the like.

But age appropriateness is important.

Games can contribute to development — in childhood and adolescence.
After the age of 18, a person either matures or begins to actively and creatively infantilize.

Childhood is over. Trying to prolong it is a dubious occupation.
Infantilism, like theft, rarely leads to anything good.

After mastering the Linux terminal, creating websites and servers, manually editing and writing configs for programs, scripts, and other things, I deeply regret the time spent on computer games. The past cannot be returned. But I can warn others about my mistakes. Please be prudent: every minute of your life is priceless and should be spent as efficiently as possible.

↑ To Table of Contents | ↑ To Chapter Start

2.2 Example

When "Farm Frenzy" Turns Out to Be More Exciting Than Real Life

I had an acquaintance — a city dweller slightly over forty. And so he unexpectedly embarked on the thorny path of… virtual farming.
The game "Farm Frenzy" captivated him so much that over time he became the scourge of digital weeds and the ruler of pixel cowsheds.

In his virtual farm, everything blossomed and smelled:
huge harvests, beehives buzzing, fish coming into nets by themselves, vineyards bending under the weight of clusters. The economy — is thriving, agribusiness — is bubbling, the soul — is "in the fields."

There's just one small detail:
in real life, he had never been on a real farm.
And he doesn't even imagine what peasant labor is like, where romance ends at the second minute, and then sweat, dirt, and iron discipline begin.

Moreover — this virtuoso farmer was so lazy, that he couldn't find a couple of hours to glue back the peeling wallpaper. As a result, shreds hung sadly from the ceiling, and entering the room, he would carefully push them aside with his hand — as if it were not a wall, but a curtain of the theater of the absurd.

And so he complains to me:
he can't close the application — the farm requires control! A whole agrocosmos is thriving there, a complex economic system! If he leaves — everything will collapse.

I suggested a radical but liberating step:
delete the game account and start a new life — without digital cows.

To which he responded with pain in his voice:
— But how can that be? I've invested so much into it! Yes, a ton of time goes, but my hand won't rise to delete it all…

Once I came to visit him — to help put his PC in order: defragmentation, cache cleaning, a bit of digital hygiene.
I started asking simple questions:

After about thirty minutes, the person turned pale and admitted that he felt physically ill from such an influx of technical information.

And here a logical question arises:
Wouldn't it have been better to master his own PC at least at the level of a confident user instead of virtual farming?

That would have given a real, tangible result — freedom and competence. But as it is — years have gone into a project that hasn't left a single grain in reality. The farm remained just a set of pixels on the screen.

And the wallpaper…
The wallpaper still hang sadly from the ceiling.

↑ To Table of Contents | ↑ To Chapter Start

2.3 Virtual Creative Games

It is worth emphasizing separately: in recent years, the number of cases has sharply increased where all kinds of internet demagogues — Eastern "gurus", pseudo-scientists, business coaches, cultists, and other manipulators — conduct psychological experiments profitable for them, masking them as "developmental creative games".

There is, of course, no development anywhere near here.

Under the guise of "creativity", "self-discovery", "art practices", and "personal growth", purely selfish goals are implemented: from data collection for commercial advertising and theft of others' scientific and artistic ideas — to outright illegal experiments in building systems of psychological control and attacks using cyber technologies.

Taking advantage of anonymity, fake profiles, distance (the scammer may be in another country), and the absence of legally formalized relationships, such characters easily escape responsibility. No contract — no evidence. No evidence — no punishment.

Therefore, the rule must be strict and unambiguous: if you are interested in distance courses, trainings, "games", and other forms of "development" — participate only if the organizer presents a license and offers a legally transparent contract.

Under no circumstances enter into informal relationships with internet personalities if these relationships are in any way connected with influencing your consciousness.

Pseudo-teachers act according to a worked-out scheme: they conduct unethical and harmful experiments, collect the information they need, squeeze a person to the last drop — and then claim that the problem is not in their illegal actions, but in you yourself:
Saying, you yourself "studied poorly", "haven't grown enough", "didn't understand the great plan of the brilliant guru".

Refrain from so-called "personal growth trainings" and "creative games". The overwhelming majority of this industry is pure charlatanism.

If you need trainings for professional reasons or are seriously passionate about a hobby — prefer in-person formats. Courses, studios, workshops where you see the trainer and participants in person, face to face. At least you understand who is in front of you.

If there is no alternative to the online format — check the contract. Always. Without exceptions.

The slightest doubts have arisen about legal purity?

Detected demagoguery, obscurantism, occultism, calls to "believe not reason, but intuition", "wait for spontaneous insight", "turn off logic"?

You can be sure: you are dealing with a fraudster. The conversation should end at that. Once and for all.

It is important to understand one more thing:
Scammers parasitize on our desire to return to childhood — to that very carefree state where there were games, lightness, a sense of security, "mom's eyes, dad's hand... laughter silvers through the thick grass", as Eva Polna sings.

And when a person relaxes and starts "playing", they indeed play with him — but not like loving parents with a child, but like a cat with a caught mouse.

Therefore, if you are over 18 — discard this desire. Replace it with the aspiration to become an independent professional.
Replace toys with tools.
Games — with professional growth.

In the Neolithic, a person often lived to be 40–50 years old or more, but entered adulthood already in early adolescence. The world was harsh, resources — limited, and there simply was no time for games, illusions, and endless "searching for oneself".

Civilization has given us powerful tools — comfort, technology, safety, free time. But that is precisely where the trap lies. These means easily turn from a support for development into a means of escaping reality.

They should not be used for infantilization and self-reassurance —
They should be used for growth.

You should start developing as early as possible — civilization should strengthen a person, not prolong their childhood.

One grandmother and grandfather, to whom the parents brought the children for the summer, said simply:
for a girl, the best toy is a sewing machine,
for a boy — a set of tools.

As a result, the girl at 13 sewed dresses with her grandmother, and the boy at 15 repaired the house with his grandfather.
And they could have been sitting on the internet and communicating with false gurus — if the parents hadn't pulled them out of the city to the farm.

Therefore, the earlier games end and adult responsibility begins, the better for you. And the less chance pseudo-gurus have of dragging you into another murky and opaque scheme.

↑ To Table of Contents | ↑ To Chapter Start

2.4. Esports

This word alone would surely have evoked a sarcastic smile from George Carlin. Because "esports" is another sign of our era, another trouble that humanity encountered at the dawn of the 21st century.

People organize online tournaments and championships in local networks: who will create a virtual empire faster, who will more accurately "shoot terrorists" or the opponent himself, who will score a virtual ball with virtual feet into virtual goals, who will overtake everyone on a virtual track. You could list at least ten and a half thousand variants here.

But unfortunately, such "sports mastery" does not even remotely give an idea of what real tactics of using firearms are like, how corporate and state management works, how destructive hypodynamia is for the human body. And it certainly does not explain that in a cold, half-destroyed city, in dust, snow, and dirt, you will not reload a magazine with the Ctrl+R key combination.

God forbid, if war ever stops being just a news story. If another mad leader actually carries out his threat to "turn someone into radioactive dust." Will virtual skills in shooting, tank control, auto racing, and genius building of virtual states be useful then, when the Fallout universe unfolds not on monitor screens, but outside our windows — and even under conditions of no electricity, food, or medical care?

Who among us knows how to refuel a power generator? Make an oil lamp from corn or sunflower oil? Provide first aid for bleeding and fractures? Who knows at least the basics of civil radiological, chemical, and biological protection?

Who knows that products left in warehouses by a retreating enemy can be not just poisoned with a poison that takes effect in a week, but infected with a disease with an incubation period of six months? That an "accidentally left" box of medicines might be booby-trapped?

So, perhaps it's better to use a PC and the internet to study truly useful skills — instead of immersing oneself in simulation?

Mastering Kali Linux, BlackArch Linux and similar systems gives a real understanding of cyber threats, skills in detecting and eliminating vulnerabilities in private and corporate networks. This knowledge is far more valuable than any virtual shooting tournaments.

Instead of spending years on "shooters" and competing in pixel accuracy, Eric S. Raymond engaged in real work: it was he who published the famous "Halloween Documents", exposing the unscrupulous competitive policies of a well-known corporation. And Alan Turing, by the way, was not occupied with computer toys, but with creating a decryption machine that helped crack the military encryption system of a totalitarian regime.

Buy a simple quadcopter. Install a module for dropping cargo on it. Make a mass-dimensional mock-up of a round object — and, choosing a place where there are guaranteed to be no people, practice dropping it on a target — a cloth with a cross. Gradually increase the height, trying to hit the center of the cross. Believe me: such a skill is more valuable than ten thousand enemies "killed" on the monitor and can indeed be useful for defending your country.

Sign up for hand-to-hand combat and practical shooting courses — not laser tag, not paintball, and not "tacti-cool" for selfies, but real training. Volunteers in many countries teach basic firearm training — you'll only have to pay for uniforms, ammunition, and gas for trips to the shooting range.

Learn basic maintenance of your car or motorcycle.

Study first medical aid — this is generally priceless knowledge. In real life, bullet and shrapnel wounds are not treated by "eating a medkit." It's all much more complicated.

I had a classmate — a quiet, modest excellent student. In pre-conscription training, he shot better than anyone from an air rifle. To the question "where did you learn?" he calmly replied: at home he had toy air rifles and a pistol that shot plastic balls — so he practiced on targets. And those who played Counter-Strike for hours lost to him in real shooting.

Even shooting at empty tin cans with the cheapest airgun will bring more benefit than all of esports combined. And mastering Kali Linux, BlackArch Linux, and other information security tools will give fundamental professional skills.

Esports immerses a person in a romantic pseudo-reality of bright competition and war — as if to rest from the "grey everyday life".

The tragicomedy is that we have long been living in a reality of a very tough information, cultural, and technological war. And there is no less heroism in it than in the times of Alan Turing. Possibly — even more.

I don't want to scare anyone.
I just see how fragile civilization is.
And it pains me to think that millions of smart people spend their lives on simulations, instead of learning what might one day save someone's life.

In a game, you made a mistake — loaded a save. In reality, that doesn't happen: with a gunshot wound and no "medkit", there simply is no second attempt. It's better to accustom oneself to such an understanding of the world in advance, without destroying an adequate mindset with the hope of endless possibilities to replay a "problematic level".

Plus, a whole infrastructure of totalizators like 1X-Bet and similar has long been attached to the topic of esports. The results of cybergame matches there are often rigged, and behind the organization stand shadow structures that are better not trusted with your money or your time. In other words, in the hope of a virtual victory of a favorite team, a person risks really losing resources — financial, emotional, and temporal.

↑ To Table of Contents | ↑ To Chapter Start

3. Minimization of the Information Footprint

3.1. Creating Accounts Only When Necessary

You should not create accounts anywhere, anytime, and write anything there. The more data you leave online, the more material a malicious actor gets to analyze your individual vulnerabilities.

Create accounts only where it is truly necessary.
Do not multiply dozens of pages on social networks and messengers. Use the minimally sufficient set of services. No accounts "just in case".

The smaller your information footprint — the better.

It makes sense to maintain an account database that records:

(Use an offline password manager with a strong master password and encryption for this. More details - in Chapter 6.)

If an account is no longer needed — delete it completely.
Many services do not delete inactive accounts for years. Some — never.

If someone becomes seriously interested in you — they will find everything. And strike precisely at those traces you long forgot about, hoping they would "disappear on their own".

Special caution should be exercised with social networks. It's important to understand that your social network page is the primary vector of attack for a malicious actor, especially if it details your entire life. Essentially, you yourself gift the attacker critically important information that should be kept secret. If possible — give up social networks completely. Avoid popular messengers if possible. For sensitive communications, use secure solutions.

If a social network account is still necessary — provide minimal data and use anonymization where possible.

Remember: anything you say can be used against you.
And yes — this is not a joke. It's an instruction.

Today, your words are already used by automatic analysis systems to identify psychological profiles, vulnerabilities, and behavioral patterns — not only for advertising but also for mind manipulation.

If you think that criminal groups and authoritarian regimes are not developing AI without ethical constraints, designed for manipulation and psychological pressure — you are mistaken. They are developing it. Actively and without sentiment.

And large corporations operating quite legally also do not always disdain the abuse of informational power.

Therefore: do not feed them with dumps of your psyche.
Either don't feed them at all. Or give the minimum. Or fake.

↑ To Table of Contents | ↑ To Chapter Start

3.2. Behavioral Hygiene and Lifehacks for Working with Email

Another popular target for malicious actors, along with social network accounts, is email. Therefore, it is important to develop proper habits and approaches to security when working with it. Here are some tips to help you form safe behavior when using email.

A. Don't put all your eggs in one basket

Don't mix everything together. Do not use the same address for all your affairs — work, family correspondence, personal matters, and especially for registering on random websites. This creates additional risks and simplifies the task for malicious actors if they get to your account.

Create several email accounts for different purposes: one for official correspondence, one for personal and unofficial matters, one — for secret tasks, and so on. Many services allow you to get several email addresses on one account.

Each account should have its unique name. For example, you shouldn't make accounts like "bill1", "bill2", "bill3" — each profile should be original and meaningful.

Work email — this is your official tool. It should be separate from other mailboxes and used exclusively for work: for correspondence with colleagues, employers, for registration on professional and work-related resources. This address can be published online or used for employment.

Family and/or unofficial email — only for close people. Only those you trust. These addresses should be as private as possible. And for secret affairs, create a separate address that should not fall into anyone's hands — neither acquaintances nor potential attackers.

It's also worth creating a technical mailbox. This is the email you use for registration on websites not related to work and not containing sensitive information. And for registration on websites with sensitive information — a technical secret mailbox.

Don't forget about a fake email. This address can be used to interact with people and services whose reliability you doubt.

Complicated? But it will be much harder for a malicious actor to figure out where and how to strike.

And if you really don't want to bother with many mailboxes — limit yourself to three: official, personal, and technical (for registering on sites). The technical address for registering on sites - hide it, do not conduct any correspondence with anyone from it.

This is called attack surface distribution. Instead of one vulnerable point (where an attack can lead to the compromise of all your information), you have several points — each with two-factor authentication, a unique password, and limited access to information.

To avoid getting confused in your email addresses, use password managers like KeePassXC. In them, you can describe each profile in detail: what it is used for, which sites are registered on it, and what passwords are tied to it. All passwords must be unique for each account.

You can also set up a mail client on your PC or smartphone so that all email accounts are at hand, but in one place.

The problem many face is when one mailbox is used for everything, including public and private correspondence, as well as accounts on various websites. This approach opens a path for malicious actors who can easily use one email to track your life, digital footprint, and personal data.

If you decide to delete or change the email tied to everything, you risk losing important settings or simply not being able to transfer all data to a new account. Therefore, using different mailboxes is a sensible practice.

Therefore, email is an exception where having multiple accounts is useful.

Such a scheme allows you to preserve all or almost all website registration settings when deleting a personal or official mailbox, since all website registration was done on a specialized mailbox, separate from the others.

As folk wisdom says:

"An old fox taught a young fox:
To avoid being chased,
To avoid great trouble —
Know how to confuse your tracks."

But don't take everything to absurdity.


B. Disable all unnecessary cloud synchronizations

Do not use cloud services you don't need. Do not connect task planners, diaries, and other services if their functionality is not needed for you. Every excessive synchronization and automation adds the risk of data leaks. Be mindful in your digital steps and use only those services you truly need.

Store files on virtual drives only in encrypted form. Keep the password for encryption and decryption in your password manager.


C. Calmly analyze received emails

Do not rush to open an email immediately, even if it looks urgent or emergency. Carefully configure spam filters to weed out the unnecessary but not block important messages.

Check each received email carefully. If an email comes from an unknown sender, do not rush to click links or download files. Make sure it actually came from the real addressee. This is an important step in protecting against phishing.

Impostors can pose as anyone — a site administrator, a bank employee, a police officer, a rescue service, the Pope — the main thing is to cause a panic reaction and make you act faster than you can think.


And, of course, the most important thing — don't forget to participate in everything.
In all sales.
Transfer money to all the poor, the needy, and especially those who write in ALL CAPS and with three exclamation marks.
Sign all petitions — for everything good against everything bad. Preferably without reading, but with feeling.

And, of course, save the African princess.
That very one.
We have long known for certain about her tragic fate.
And if suddenly not — urgently inquire.
She can't manage without you.

Because, after all, you are not just an email user.
You are a true knight, never leaving a fair lady in distress.

↑ To Table of Contents | ↑ To Chapter Start

3.3. Internet Idle Talk

Avoid idle chatter on the internet, especially in open forums and chats, especially with unknown people

3.3.1. The Essence of the Danger

Idle chatter on the internet is not a harmless habit and not "social release", as it is customary to reassure oneself. It is one of the most absurd, irrational, and simultaneously tragicomic forms of human behavior in the digital age.

A person who has received a global communication tool behaves as if they were given a megaphone connected to an eternal archive, and they decided to use it for a public retelling of their emotions, grievances, complexes, and dubious revelations.

Comrades.
Seriously.
Let's try to find a more worthy occupation than engaging in idle chatter on the internet.

Especially — in public internet space, where every word you say:

The internet forgets nothing.
It just patiently waits for you to do something stupid.

Chappell Experiment: A Week of Life in Words

In the 1960s, psychologist Elliott Chappell conducted an unusual experiment. Volunteers wore a dictaphone for a week, recording ALL their conversations.

The result was staggering: transcribing the ordinary everyday speech of one person took more than six volumes of text. This opened the researchers' eyes to the gigantic scale of our daily communication.

The experiment became a milestone, showing how we actually communicate and raising acute questions about privacy in an era when everything about us can be recorded.

— Based on materials from the project "Natural History of a Day"

Refrain from radical, emotionally charged, and unfounded statements regarding political leaders, public figures, bloggers, states, corporations, and other entities. Such statements, as a rule, carry no analytical value and only increase the level of noise in the discussion.

You should also categorically avoid radical statements with broad generalizations regarding ethnic, religious, social, gender, and any other groups — in the spirit of "they are all like that", "they all need to be re-educated", "arrested", "deported", etc. Such rhetoric is intellectually primitive, logically incorrect, and potentially dangerous.

Criticism should only be directed at specific legal or physical persons and exclusively on the merits — based on verifiable facts, actions, and decisions. Even brief, restrained, and precisely formulated substantive criticism has immeasurably greater value than thousands of words of emotional curses, accompanied by demagoguery, conspiracy theories, pseudoscientific theories, and, in extreme cases, frank absurdity.

↑ To Table of Contents | ↑ To Chapter Start | ↑ To Subsection Start

3.3.2. Illustrative Example: The Talkative Creative Person

Suppose two countries — let's conventionally call them country A and country B — are in a state of armed conflict.

In country A, there live two creative people who support the army with their creativity and activities: a patriotically-minded woman-poet, a volunteer, and an equally patriotically-minded man — a writer and, concurrently, a sniper.

They are living people, nervous, emotional.
And, as often happens, a personal conflict arises between them.

Then begins the classic human drama: the quarrel grows into a heavy tragicomic saga with stormy reconciliations, new breakups, mutual accusations, curses, repeated attempts to "start everything anew", new scandals — and so in a circle. Emotional swings in the best traditions of a bad soap opera.

It would seem — an ordinary human story.
A personal matter of two adults.
Let them sort it out themselves, it's none of our business.

But here an additional factor enters the equation.

The woman-volunteer turns out to be not just emotional and talkative, but also suffers from alcoholism. And once again, in a state of alcohol intoxication, she decides that the public page of her Telegram channel is the perfect place for psychotherapy.

She begins, with dramatic intensity, pathos, and strain, to lay out all the details of her new quarrels with the man-writer. Moreover, she does this in the form of texts where the level of emotional intensity and tragedy not only goes beyond the bounds of common sense but demonstratively ignores it, going somewhere towards grotesque, farce, and complete absurdity.

This is no longer a confession.
This is a public stand-up.
And without understanding the audience.

And here an unexpected viewer enters the game

At some point, a citizen of country B accidentally finds this Telegram channel. Reads. Is surprised. Then smiles. Then begins to quietly repost especially "vivid" fragments to a closed group, where soldiers of country B exchange news, memes, and jokes about the enemy's failures.

And here begins that very tragicomic reality where pathos collides with everyday physiology.

The soldiers read.
Laugh.
Read more.
Laugh harder.

At some point, the savvy citizen receives a message:
"Hey, stop reposting her already. Yesterday our whole brigade read her new posts during rest — people were literally rolling on the floor laughing. Some almost choked. The brigade commander said: if you repost her again — I'll have non-combat losses."

And here comes the moment of truth.

Because the woman-poet could have:

And thereby not disgrace herself, nor her (ex?) man, nor her cause, nor her side of the conflict.

But she chose a different path.
The path of public chatter.
And this path, as usual, led not to catharsis, but to farce.

↑ To Table of Contents | ↑ To Chapter Start | ↑ To Subsection Start

3.3.3. Example №2: The Story of Rag-kun

Another vivid and simultaneously tragicomic example is the story of a young man nicknamed Rag-kun online. His girlfriend dumped him, and, in search of emotional support, he began to cry and sob for a long time on the internet, hoping to find sympathy and understanding in anonymous mode.

Incidentally, he mentioned that he dedicated poems to this girl. It would seem — an innocent experience, sincere emotions. But on the internet, trolls, skillfully feigning sympathy, instantly set psychological hooks. They asked for examples of these poems.

And here the fatal thing happened. Rag-kun, in a burst of trust, copied his poems from the official page on a literary forum, where his real name, personal data, and other identifiers were, and posted them in an anonymous thread.

What happened next is predictable for the network: within five minutes he was deanonymized. By the time he realized his failure and deleted the thread, all his posts had already been screenshotted and saved.

But the surprises didn't end there. The trolls identified all his friends, classmates, and acquaintances and sent them the thread materials. His ex-girlfriend and her new boyfriend were included here. The scale of shame can be imagined without additional words.

The conclusion here is obvious: internet talkativeness is a weapon that works against you. In a situation of emotional crisis, silence and restraint will be a thousand times safer and wiser than a pathetic public complaint.

There are healthier alternatives:

Any of these options would have been dozens of times more rational and safer than idle internet chatter. And the open demonstration of feelings, although it seems like an "attempt to find support from the internet community", often ends in public humiliation and long-term consequences.

Moral: not all experiences should become public domain of the network. Sometimes the most courageous action is to keep silent, endure, and find support in safe, real channels.

↑ To Table of Contents | ↑ To Chapter Start | ↑ To Subsection Start

3.3.4. Conclusions

If psychological problems trouble you — the internet is not your helper.

Talk to a psychologist.
Contact a support hotline.
Talk to volunteers or reliable friends — via a private communication channel, preferably encrypted.

In the end, talk to an AI.
Or, if you're really pressed, with a private security agency employee.

Many private security company employees have had to see and hear such human dramas that, against their background, the story of the woman-poet really looks like a cheap Brazilian soap opera. But there's an important nuance: these people know how to keep their mouths shut. And even they are told anything by victims only after being convinced of their adequacy, professionalism, and reliability.

The public internet is not a therapy group.
It's a shop window.
And sometimes — a shooting gallery.

↑ To Table of Contents | ↑ To Chapter Start | ↑ To Subsection Start

3.3.5. Practical Recommendation

If you have a desire to chat on the internet — do it:

Or at least weigh every word before publishing it openly.

And a separate point, which for some reason still has to be repeated:

Never.
Write.
Anything while drunk.

Alcohol passes.
Emotions fade.
And screenshots — remain.

Then you will have to invent ridiculous excuses, explain "what you meant", "that you were misunderstood", "that it was a difficult period in life". But it will be too late. Your post has been screenshotted, saved, and gladly spread across the internet by those who hate you, despise you, or simply love other people's disasters.

Words — are silver.
Silence — is gold.

"If you would live your life with sense and grace,
Learn this before you run the race:
Better to hunger than to feast on trash,
Better alone than in a foolish match."
© Omar Khayyam

↑ To Table of Contents | ↑ To Chapter Start | ↑ To Subsection Start

4. Discussions and Blogs

4.1. How Demagoguery Works and What to Do About It

Study the techniques used by demagogues for manipulation. This is important not only for protecting the psyche but also for strengthening the intellectual immune system. Demagoguery acts like a virus: it penetrates unnoticed, masquerades as "common sense", and then begins to control emotions instead of reason.

If during an internet conversation you see signs of demagogical manipulation — calmly end the conversation and block the person. This is not weakness. This is hygiene. Just as we wash our hands after public transport, it is worth cleaning your information field.

But if you are unsure — whether it's a demagogue or simply a person who is confused in terms and emotions — you can ask one or two clarifying questions. For example:
"In your remark, you used a demagogical technique of such-and-such type. Why are you using it? Do you know that this is demagoguery?"

If, in response, instead of clarity, the usual record for demagogues starts — mental slippage, substitution of concepts, playing the offended innocent, and evasion of the point — stop communication and block. Do not turn your head into a target for someone's manipulations.

And remember the main rule of internet communication, written in large letters on the Gates of the Network:
do not feed the troll.
Because the troll does not feed on food — it feeds on your attention, time, nerves, and desire to prove the truth. Do not feed it — and it will die of informational dystrophy.

↑ To Table of Contents | ↑ To Chapter Start

4.2. Where and Why to Have Discussions at All

Conduct discussions on the internet only on normal, serious platforms — where there is at least a chance that a specialist, practitioner, or at least a person with real experience on the topic will answer you. The world is already full of armchair experts and universal geniuses — there's no need to spend evenings with them.

Initiate or join a discussion only when you really need to resolve an issue, and you doubt that artificial intelligence gave a fully exhaustive answer. That is, a discussion is not a gladiatorial arena, but a clarification tool.

Do not engage in discussions for the sake of discussion itself — for the sake of out-arguing someone, putting someone in their place, or "proving that I'm smarter". This is a game with no win. Such activity slowly but surely leads to only one thing — mental exhaustion. No benefit, only exhaust.

If the discussion is not aimed at solving specific tasks useful to you and other people, it gradually degenerates into verbiage and a demagogical farce. Words multiply, meaning fades, and life goes on.

Try to avoid people and communities for whom it is more important not to improve reality, but to philosophize endlessly "in a vacuum", without the slightest connection to practice. Such discussions resemble an endless flight in orbit around nothing.

The internet is a grand tool. It allows communication with people from different countries and cultures, finding rare knowledge, hearing practitioners, scientists, engineers, artists, doctors, programmers. Use this space for growth — personal, ethical, intellectual, creative, professional.

Do not turn the computer and internet from an educational mechanism into a mechanism of demagoguery, idle talk, time-wasting, and degradation. Even the most powerful laptop is useless if only informational garbage enters your consciousness through it.

↑ To Table of Contents | ↑ To Chapter Start

4.3. About Dubious Internet Platforms

It's worth mentioning separately about "special places of power" on the internet — about various dubious sites and anonymous platforms like 2ch/2ch, 4chan, 8kun, certain imageboards and similar, where there is virtually no strict, operational moderation and where a culture of trolling, cynicism, and aggressive play on emotions has been forming for years.

People come there not to exchange experiences or seek truth — but to have fun at your expense. These are a kind of gyms for haters, where they hone the art of sarcasm and psychological pressure. Emotional toxicity there is not a bug, but a feature.

This is a toxic environment. You will find nothing useful for your psyche and intellectual development there. But you may well find a feeling of inner emptiness, fatigue, irritation, and sometimes — destruction of personal boundaries. The internet is not only a source of knowledge but also a field of increased psychological danger.

Do not imitate a man who decided to swim in a river where piranhas live — and returned from there with the honorary title of a full-fledged member of the eunuch caste.

There are places where it's better not to go at all, no matter how enticing the sign "anonymous communication without rules" looks. There are indeed no rules there — but there is also no safety. And the longer you breathe this air, the harder it is later to return to the normal world where people talk, not compete in the number of bites.

↑ To Table of Contents | ↑ To Chapter Start

4.4. If You Run a Blog

If you run a blog — strictly filter friends and subscribers and limit comment rights on your posts. This is not totalitarianism — these are sanitary norms.

You can introduce simple basic rules:

Surprisingly, this is already enough to weed out at least half of the trolls. Demagoguery does not like responsibility and restrictions.

Then you can write on your page something like:

"Dear readers, please maintain a polite and respectful tone in discussions. At the first signs of inappropriate behavior, the user will be deleted, and their posts — erased."

Or introduce a gradation of punishments: first warning — a week ban, second — a month, third — permanently. The internet loves clear rules, just as road traffic loves traffic lights.

This will weed out another roughly 25% of the unwanted contingent.
The remaining ones — are much more persistent, but you'll handle them manually: experience will come quickly.

Do not abandon successful and promising projects just because someone on the internet told you that you are a fool.

Believe an old security guard who has heard dozens, if not hundreds, of stories from victims: internet insults are far from the worst thing that can happen in life. It's just a set of pixels on the screen that disappear with one click — delete the post, close the page — and that's it.

And you can certainly resolve such issues without the help of private security.

↑ To Table of Contents | ↑ To Chapter Start

4.5. Political Arguments on the Internet — a Branch of Hell on Earth

A special branch of hell on earth is undoubtedly political internet arguments. Especially when it comes to Mr. X and Mr. Y, as well as other bright characters of the reality show called "Culture in Decline", of which we all, unfortunately, are participants and victims.

No matter how absurd, horrible, or tragic the political picture of the modern world is, internet arguments will not make it better. They will not correct injustice, change the laws of economics, or create new social harmony. But they will intensify hatred between opponents and burn away extra energy that could have been spent on real deeds.

How to act reasonably?

Refrain from meaningless political debates online. Even if you think your comment will save the world — it will most likely only add noise and emotional chaos.

At the very least, it would be better if, during elections, you go to the polling station and vote for the party or candidate you trust. This simple step really influences the political situation, unlike empty internet arguments.

If you are interested in politics and social change, do not argue about them on the internet. Join a party, public organization, or volunteer community that matches your beliefs, and do what is really useful and objectively influences the implementation of your ideas.

As the old saying goes:

"It is better to light one small candle than to curse the darkness a thousand times."

Follow the principles of reasonable, consistent rationalism. Do not add hatred and chaos to the information space — there is enough of it there already. Your actions should be based on benefit, efficiency, and common sense, not on emotional release and arguing for the sake of arguing.

↑ To Table of Contents | ↑ To Chapter Start

4.6. Poisoning by Philosophy

Separately among other reasons for empty internet discussions, it is worth mentioning the effect conditionally called "poisoning by philosophy".

Here we need to consider that sometimes we are dealing not just with ordinary human stupidity, but with a whole complex of psychological problems, sometimes quite serious and requiring specialist help.

Poisoning by philosophy is expressed in an obsessive desire to endlessly discuss questions of culture, science, art, and world order — in complete isolation from any reasonable, rational activity aimed at achieving an objectively useful result.

It should be noted that a person susceptible to "poisoning by philosophy" often indeed reads a large number of philosophical, cultural, or art history works and is capable of reproducing terminology-rich, outwardly science-like speech. This can create a lasting impression of conversing with a serious researcher or scholar.

The danger of the situation is that such a person is often sincerely convinced that they are engaged in genuine science or philosophy. Their confidence rests on a rigidly fixed mindset: "I have read many philosophy books — therefore, I am smart and smarter than others." At the same time, the quantitative indicator of what has been read replaces an understanding of methodology, context, and the limits of applicability of ideas.

Even with a significant volume of literature read, the quality of operating the obtained information in such a person often remains extremely low. Their speech can systematically distort the content of philosophical doctrines, substitute slogans for arguments, mix incompatible concepts, and generate persistent myths and frankly absurd interpretations — while formally maintaining "correct" terminology and references to authoritative names.

A continuous stream of concepts, quotes, names of philosophers, and pseudo-theoretical constructions is capable of captivating both the speaker and the interlocutor, creating in both the illusion of participating in a philosophical discussion. However, in essence, what is happening is often not philosophy or scientific analysis, but sophistry and demagoguery — a speech game where form replaces content, and intellectual rhetoric is used to hide the lack of rigorous thinking and testing of conclusions.

In real life, people prone to such dubious practices are usually distanced from. And alone with themselves, they feel very sad and lonely — after all, there is no one to share their "brilliant insights" into the structure of the universe, the course of world history, the structure and meaning of human civilization, and, of course, answer the main question: "What, after all, is the meaning of human life?"
(The answer, by the way, has long been known: at the very least — in not engaging in meaningless actions.)

But now, with the advent of the internet, people with such inclinations finally have the opportunity to speak out. And for speaking out, as we know, an audience is needed.

Our task is not to create this audience for them.
Strictly ignore such channels and blogs, and seeing that your friends are fascinated by such "lectures" — politely point out to them the uselessness of watching or listening to such material.

You should not mention such channels anywhere, creating "the Glory of Herostratus" for them. And if you do mention them — then either in the format of cold-blooded, methodical, exposing criticism, or — merciless satire in the spirit of our beloved George Carlin.

And, of course, never fall into the state of "poisoning by philosophy" yourself.

Friends, beware of this state!
It may seem to you that you are saying something smart, but in reality, you look comical and grotesque, and you simply exhaust your psyche by playing with a meaningless constructor of terms and concepts.

Study only what is truly useful and necessary. Apply knowledge in your life — for its direct improvement: in professional activities, hobbies, volunteer projects (if you are engaged in them) — and see how these ideas really work. If they don't work — discard them without regret and look for truly effective solutions.

Never live by the principle of "knowledge for the sake of knowledge". Use knowledge only to solve specific, practical tasks. Do not clutter your consciousness with information that has no objective use!

The consciousness can be cluttered to such an extent that there simply will be no room for anything truly important. And then the mind, instead of focusing on a useful task, will endlessly sift through tons of garbage, pointlessly expending energy and tiring itself - that is the essence of the danger of "poisoning by philosophy".

Theory without practice is not just dead. It also decomposes — and poisons its bearer with cadaveric poison.

Wisdom lies not in the quantity of information, but in the quality of handling it — in the ability to analyze, comprehend, and apply it in practice. Quantity by itself is not an indicator. The real indicator is the quality of knowledge management and its rational use.

Practice shows that often, a timely repair of a toilet flush tank (which, by the way, allows one to avoid the Noble Lynch Trial from your downstairs neighbors) can sometimes be much more useful than writing another article about "the eternal confrontation between West and East" and other global matters.

↑ To Table of Contents | ↑ To Chapter Start

4.7. Give Up Trolling, Hating, Stalking and Other Unethical and Illegal Actions

Don't stoop to trolling — build your security professionally

And most importantly — never stoop to trolling and hating. Do not try to take revenge on anyone, "out-troll" them, or settle personal scores. This is not just unethical — it is also deeply impractical.

It is much more useful and effective to:

That is, the correct response to hating is not revenge against specific people, but building your own architecture of social and cybernetic security.

Actively participate in the development of global cybersecurity systems. People possessing such skills are highly valued in society, and their expertise becomes a shield not only for themselves but for others as well.

Haters and trolls, on the contrary, in civilized society forever remain despised freaks, who proudly live in a world where their skills are only suitable for destroying their own time and nerves.

Moral: do not waste energy on petty revenge, spend it on creating a system that makes you immune to aggression and opens new opportunities for development.

↑ To Table of Contents | ↑ To Chapter Start

5. Trusting Internet Sources and Ambiguous Internet Projects.

5.1 The Essence of the Problem

The great wisdom of the digital age sounds like this: do not believe anything on the internet until you check it yourself. Not words, not "sensations", not enthusiastic reviews, not outraged screams. Especially — what caused strong emotions.
Because emotions are poor analysts. They belong in the theater or at a concert, not in the fact-checking department.

Use reason for impartial analysis of incoming information. Do not allow rumors, gossip, and self-confident but absolutely incompetent statements to quietly creep into your head and shape your worldview.

The world is complex:

And there's a whole army of pseudo-teachers from the East who interpret ancient wisdom in such a way that Confucius, Lao Tzu, Buddha, Krishna, and the Prophet Muhammad are already spinning in their graves like tops launched by an overly energetic child.

Representatives of official religions often propagate behavioral models from feudal times, and their ideological opponents — neo-pagans and Luciferians — diligently implant occultism and a frankly anti-scientific way of thinking.

And somewhere nearby, mentally unstable characters and professional provocateurs mix theories of world conspiracies, freemasonry, ufology, and Nazism into one potent cocktail that even the most insane medieval alchemist would envy.

Meanwhile, gossips spread ridiculous rumors about the personal lives of politicians and media figures, political analysts produce tons of biased propaganda with distorted facts and logical errors, and Top-grade cultural experts manage to distort cultural history so badly that ancient civilizations weep in archaeological layers.

And this list can be continued endlessly. Believe me, all the absurdity found online cannot be described even in ten volumes, let alone one article.

What should an ordinary mortal do?

  1. Do not support absurdity. Do not like or spread what hasn't been verified.
  2. If verification showed unreliability — give a dislike and block/ignore the blogger or group.
  3. Support honest, professional, verified content.
    Those who really try — journalists, scientists, specialists, people with ethical principles and a clear, unclouded mind.

This way you really make the world better. And yes, this is not pathos — this is digital hygiene.

Everything is in your hands. The internet is big, but your brain is still the main processor.

↑ To Table of Contents | ↑ To Chapter Start

5.2 Internet and Financial Adventurism

The internet gave us freedom — freedom of knowledge, communication, creativity. But along with it came another "freedom" — the freedom to lose money, nerves, and faith in common sense, falling for the illusions of easy and quick enrichment.

Today, digital adventurism is as much a part of the network as search engines and social networks. And if you don't understand the nature of these phenomena — you can very quickly find yourself as a donor for professional players and scammers.

I won't list network marketing, online casinos, lead generation and other dubious and ambiguous projects and events — I'll limit myself to the two most famous examples: Forex and cryptocurrencies.

All other "magic schemes" merely repeat the same mistakes under different signs.

↑ To Table of Contents | ↑ To Chapter Start

5.2.1. Cryptocurrencies: An Experiment Gone Astray

Initially, cryptocurrencies were conceived as a bold technological experiment:
— decentralized systems,
— freedom from banks,
— transparent blockchains,
— interesting mathematical ideas.

But reality very quickly changed the scenery. A whole world of opaque, gray, and outright fraudulent schemes grew around cryptocurrencies — from "investment miracle projects" to pyramids where old investors live off new ones.

Yes, blockchain technology itself is interesting. But today, the crypto market is primarily a speculative high-risk zone, with too much noise, manipulation, and fraud to speak of a reliable savings storage system.

Cryptocurrency vs. Philosophy: An Example from a Popular Blogger's Life

A few years ago, I watched one blogger's channel. Initially, I was looking for criticism of Luc Besson's new film "Lucy" and came across his video where he expressed quite interesting ideas about the film. I started watching other videos and saw that the channel's content was useful and fascinating: discussions of intellectual cinema, relevant social problems, science, religion and culture, good advice on family life and conflict resolution. As a result, the blogger was awarded a regional prize for contributing to the development of his home region's culture.

But his further fate turned out sad. The blogger decided that kind and instructive content, which brought him respect and fame, did not provide sufficient income. And he got involved with cryptocurrency.

Over time, the channel began to gradually turn into advertising for dubious projects related to investing money in various forms of cryptocurrency, with calls to entrust the blogger with your funds, promising to manage them wisely.

Soon, all intelligent and decent subscribers unsubscribed, leaving messages like "Goodbye, dirty scammer." The channel's audience began to consist mainly of people of pension and school age, who either had not yet formed critical thinking or had it weakened by age-related characteristics, and who were willing to invest in the blogger's financial schemes.

Finale: another blogger, conducting internet investigations of fraud, created a deliberately fraudulent cryptocurrency scheme to catch our hero red-handed, and offered him to advertise his trap website. Our hero agreed, thereby exposing himself as a fraudster. All his correspondence, where he wrote: "Yes, I understand the scheme is opaque, but our deal will benefit us both," became public on the internet.

My conclusion: it's better to live modestly but honestly.

↑ To Table of Contents | ↑ To Chapter Start | ↑ To Subsection Start

5.2.2. Forex: A Market Where Beginners Play Against Professionals

Forex is another example of a system that was once conceived as a serious financial tool and has now become a magnet for dreamers of easy money.

Advertising screams:

"You can earn from home!
Just a couple of mouse clicks!"

In practice, however, beginners find themselves on a battlefield against banks, funds, and professional traders who have algorithms, analysts, resources, and experience. An ordinary person is left only with hope — and that hope, as a rule, burns out first.


A Life Story: Forex vs. Real Labor

I was acquainted with a person who became interested in Forex.

He was a highly skilled builder and could always earn decently. He had no acute financial problems — the housing he built was always in demand. A housing builder never remains without profit.

But instead of improving his professional skills, making quality housing, and earning steadily, he started placing bets on Forex. He would wake up at night, turn on his smartphone, and check the rise of various currencies.

The result? Everything he earned over the years of playing on the Forex exchange — just $20, which once topped up his phone bill.

He could have simply slept peacefully and continued building real housing for real people in the morning, receiving decent pay for it, and developing skills that bring stable benefit.

This story is a vivid example of how the illusion of easy profit can destroy time, energy, and the ability to enjoy real achievements.

↑ To Table of Contents | ↑ To Chapter Start | ↑ To Subsection Start

5.2.3. When an Experiment Drowns in Chaff

Both cryptocurrencies and forex were not conceived as fraud. They were attempts to find new financial forms.

But over the years, they have become overgrown with such a number of:
— murky schemes,
— opaque platforms,
— gray brokers,
— aggressive marketing,
that separating the wheat from the chaff has become almost impossible.

And the main thing — where large money and human greed are involved, the darkest sides of the market are revealed.


On Real Alternatives

Speaking of global currencies, only the money of countries with the most powerful scientific and industrial base and high economic discipline have real stability.

Today, these are, besides the dollar and euro — the yen and the yuan.
Behind them stand entire states and industries, not promises and beautiful TikTok videos.

All other "miracle alternatives" — are most often just traps for the gullible.


Instead of Illusions — Real Skills

Do not waste your life on financial mirages.
Do not fall for the illusion of an easy path to wealth imposed by all sorts of scammers.

There are things that guaranteedly increase your value and independence:
— ability to work with the terminal;
— knowledge of Linux and free software;
— cybersecurity;
— understanding of AI and modern technologies;
— development of engineering and analytical thinking.

This is real capital. It will not burn in another "super-project", will not disappear with a market crash, and will not turn into digital dust.

And financial adventurism most often ends the same way:
wasted time, shattered hopes, depression, and direct monetary losses.

Take care of yourself — and your resources: financial, psychological, and intellectual.

If you feel that sweetly smiling and inspirationally speaking "financial gurus" are seducing you with stories of easy success and quick enrichment — stop and remember the history of the MMM company and its organizer Sergey Mavrodi.

This story is an excellent vaccine: as Carlo Collodi, the author of Pinocchio, once said, a coin buried in the ground turns into a tree hung with many similar coins... only in the land of Fools.

Do not trust people who want to turn the Internet — the greatest achievement of human science — into the land of Fools. Be prudent and wise: real knowledge, skills, and experience are more valuable than any illusory promises of easy wealth.

And finally, donate 2–3 dollars to support Wikipedia. This will be a far more reasonable and meaningful investment than putting money into any form of cryptocurrency or engaging in financial market speculation. The victory of reason and science over ignorance and obscurantism is far more important than any financial games.

↑ To Table of Contents | ↑ To Chapter Start | ↑ To Subsection Start

5.3. Darknet and Illegal Literature

(hacking, sabotage, weapon manufacturing, underground social engineering, and other "dark arts")

The internet is like a city. It has squares, cafes, libraries, and parks. But there are also dark alleys where people with far from healthy interests gather. The darknet is not a magical portal to the world of forbidden knowledge. It is precisely such an alley, only digital.

And the main rule is simple:
Solve any problems within the law.

Do not go into dubious networks where crime, toxic "communities", and trade in all things forbidden flourish. This is not romance. This is not freedom. This is — simply risk: legal, psychological, social.


Why It's Dangerous and Pointless

Do not download or study "literature" about:
— weapon manufacturing;
— sabotage;
— illegal hacks and software patches;
— license cracking;
— manipulating people through technology;
— underground social engineering.

Such texts do not make you "advanced". More often the opposite — they drag you into a spiral of destruction, where a person gradually begins to lose boundaries: moral, legal, and psychological.

Moreover, a huge amount of such "literature" is created either by fraudsters, or by mentally unstable people, or by structures for whom you are just expendable material. This is not knowledge. This is garbage that destroys the one who consumes it.


A Legal Path into Cybersecurity Exists — and It's Much Cooler

If you are interested in:
— information security,
— penetration testing,
— administration,
— infrastructure protection,
— incident investigation —

all this can and should be studied legally and publicly, gaining real knowledge, respect from the professional community, and legal sources of income.

The black market does not give you power.
It makes you vulnerable.


The Illusion of "Secret Knowledge"

Some think like this:

"I'm smart. I found my way into the darknet — so I'll get access to knowledge hidden from ordinary people."

This is an illusion.
With the same "success", you could dig a tunnel from your basement to the underworld — and sincerely wonder why devils started crawling through it into your house.

You are not entering a secret brotherhood of sages.

You are entering a space where:
— you can be deceived;
— a crime can be committed against you;
— your data can be stolen;
— you can be framed for someone else's deeds.

And most importantly — you yourself risk crossing a line beyond which life goes downhill.

The darknet is the territory of cybercriminals.
And a decent person simply has nothing to do there.

There is enough light in life:
— open courses;
— free software;
— honest technical communities;
— real research projects.

There, people create, develop, help, and protect.
In the shadows — they destroy.

It is worth mentioning that not all darknet use is exclusively for criminal purposes. Anonymous networks such as Tor or I2P are used by journalists to protect sources, by dissidents to bypass totalitarian censorship, and by researchers for experiments in the field of privacy, cryptography, and network resilience. However, such activity is high-risk — legally, technically, and psychologically — and is justified only with clearly defined ethical and humanitarian goals.

A limited exception may be Tor as a privacy tool — for example, when working with sensitive personal data. But even then, it should be used cautiously, strictly within the law and ethics.

↑ To Table of Contents | ↑ To Chapter Start

5.4 News, or the Show: "Our Napalm for Your Brains"

Another scourge, long since taking on the scale of a global humanitarian catastrophe, is the news.

Yes, those very ones — where there is not a gram of professional analysis, not a hint of logic and honest presentation of facts. But there are emotions, hype, strain, and endless "sensations".

And characteristically — news pours down on you from everywhere. Search engines, embedded banners push them, they splash from every corner of the internet. On all media platforms, tens of thousands of professional chatterboxes have proliferated, discussing every stupidity and random incident with the same frenzy with which a hungry dog gnaws a bone thrown to it.

Official channels do the same, only more carefully: without excessive hysteria, but with conscientious readiness to work out the political clichés of their owners and the owners of their owners.

Of course, all this theater of the absurd has a very indirect relation to reality. This is — entertainment for those who enjoy burning their own brains with the purest informational napalm of the highest category.

If you, dear readers, still aim not to turn your mind into a handful of cold ash, but to keep it in working order, the formula is simple:

To hell with the news.

Be interested in news about sciences, programming, technologies, free software — what really affects your life and contributes to development. And be sure to filter sources — ruthlessly, like a system administrator filters garbage packets.

If you still feel like reading socio-political materials — be extremely cautious. Choose channels with honest, reasoned analysis, not sly demagoguery or hysterical propaganda.

Remember: everything you give to your mind, it processes. Even throwing out garbage requires effort. So why feed the brain toxic waste when you can give it material that strengthens, develops, and clarifies the picture of the world?

That's exactly how good network filters work: they cut off ping-spam, DDoS-muck, and other garbage — and suddenly the system starts working twice as fast. So why not apply the same principles to our own consciousness?

Modern news, for the most part, is not about objectivity. It is a more or less talentedly directed show that has a very distant relation to reality. And sometimes — none at all.

Therefore, seek out those few channels where objectivity and elementary conscience are still preserved.

And may the penguin Tux bless you in this search.

Because, I'm afraid, he is one of the very few characters of the modern world who can still really be trusted.

↑ To Table of Contents | ↑ To Chapter Start

6. Automation and Smart Data Organization

Automate routine tasks — this is one of the most powerful ways to free up the brain and time for truly important things. But there is one important "but": be careful with sudo scripts. A script with administrator rights is like a miniature atomic bomb: even if you wrote it yourself and it seems to work, one small error can fatally compromise your system's security.

Such a script should be run only consciously and manually via the terminal. Suspicious or untested scripts with sudo rights are better left alone — even if they look harmless, the consequences can be unpredictable.

The good news: even without administrator rights, you can do a huge amount of useful work and significantly ease your tasks. Scripts and programs run as a regular user allow you to automate routine without risking system security, provided you are confident in their reliability and origin.

↑ To Table of Contents | ↑ To Chapter Start

6.1. Note-taking and Data Organization

Important changes, system settings, notes, ideas, logins, passwords — all of this should be recorded in reliable, unified, and, if possible, encrypted diaries, journals, notebooks, or databases.

Do not store information in a heap across hundreds of files in a single "Documents" folder.

Create a rational tree-like folder structure and use systems that support encryption and convenient import/export, for example CherryTree. Login-password pairs and related account data are best stored in encrypted databases like KeePassXC. Set up automatic backup of these databases at system startup or shutdown — this minimizes the risk of data loss and saves you from extra routine.

Even with a well-thought-out folder structure on your hard drive, finding the right document without a specialized system remains a problem. It's like looking for a needle in a haystack: after six months you'll simply forget what's in a fourth or fifth-level folder.

Tools like CherryTree significantly ease information management, allowing you to store, systematize, and quickly find everything that is important.

And KeePassXC and other offline password managers are a reliable way to store and organize access to your accounts. The database is encrypted, access is via a master password, and protection can be enhanced with a key file or a hardware key like YubiKey. Moreover, the risk of data leakage is minimal because the program does not exchange information with a server and works autonomously on your device.

↑ To Table of Contents | ↑ To Chapter Start

6.2. Don't Keep Everything in Your Head

As mentioned above — record all important information in encrypted diaries, journals, notebooks, and databases. Be sure to provide entries with comments and explanations. Do not try to keep in your head what can be kept in a reliable database.

Our brain is already overloaded: life in the modern world is often cruel and unfair. Adding to this the task of remembering dozens of logins, tips, ideas, and important notes is an extra burden.

Before you is a computer and modern 2026 databases — a toolkit of almost fantastic possibilities, which allows freeing the consciousness for creativity, analysis, and truly important matters.

The time spent creating personal databases pays off hundreds and thousands of times better than the time spent "slaying orcs" or virtual counter-terrorism operations on your monitor screen.

This is an investment in order, efficiency, and your own brain — and no video game can compare with that.

↑ To Table of Contents | ↑ To Chapter Start

6.3. Git Utility and Website Work Automation

In most Linux distributions, the Git utility is installed by default. If it is missing, it can be easily installed from official repositories.

Git allows you to create local copies of repositories hosted on GitHub and other platforms supporting this version control system. Such copies are saved on your PC and can be used as:

To make changes to a repository, it is recommended to set up SSH access (specifically the client, not the server). After configuring SSH, you can securely send changes made in the local working copy back to the repository.

Working with a local copy provides an important advantage:
you can edit the site offline and immediately check the result in a browser by simply opening HTML files from the working directory on your PC. This significantly speeds up development and reduces errors.

After the initial SSH connection setup, interaction with GitHub boils down to a few short and simple terminal commands. Yes, the setup stage may seem complex, but once completed, you save a significant amount of time and effort when developing websites or publishing materials on GitHub.

In some cases, the SSH client can be configured to work via port TCP 443 instead of the standard port 22 — for example, due to network or provider restrictions, or for increased security.

For creating and maintaining websites, it is recommended to use the combination
GitHub + Git (local utility).
This is a reliable, fast, and efficient approach to working with web projects.

↑ To Table of Contents | ↑ To Chapter Start

6.4. Switching Between Workspaces

Neophytes who install Linux typically immediately notice that the graphical environment has several workspaces enabled by default — usually from two to four — between which you can easily switch with literally one click of the mouse.

Surprised by this "curiosity," many users either completely ignore this capability or disable all workspaces except one, striving to make the interface "like in the familiar Windows."

And this is a serious mistake.

Multiple workspaces are enabled by default not by accident. It is one of the most convenient and powerful functions when working with several programs simultaneously.

For example, you can:

When all programs, folders, files, and databases are piled onto one workspace, chaos begins: you get confused among multiple windows, constantly minimize and maximize them, forget what is open where, switch to the wrong windows, accidentally close needed ones and open unnecessary ones.

This is easily avoided by logically grouping programs and distributing each group to a separate workspace, opening on each only what truly relates to the current task.

As a result, with proper organization, you build a work cycle where:

This function is extremely convenient and multiplies the quality of computer work. If necessary, you can add new workspaces or remove extra ones at any moment — the system easily adapts to your work style.

Older versions of Windows accustomed many users to one desktop, and this is an extremely impractical skill that, by inertia, is transferred to modern Linux distributions.

That is precisely why the multiple workspaces service is enabled by default and immediately visually demonstrates several desktops: so that it catches the eye and the user understands — this is a fundamentally new tool that significantly facilitates work.

Use multiple workspaces. Do not ignore this function. It noticeably simplifies the workflow, saves time and energy, and significantly reduces the number of errors and misclicks.

↑ To Table of Contents | ↑ To Chapter Start

6.5. Terminal Logging

When working on Linux systems, where the bulk of configuration is done via the terminal, it is critically important to organize proper logging of all actions.

Any, even the most insignificant, action to configure the system or applications must be recorded in a log.

If it later turns out that you made an error somewhere, the saved logs will allow you to pinpoint exactly when and under what circumstances it was made. This will save you from having to spend hours or days sifting through all possible causes of the failure.

It will be enough to compare the modification times of the problematic application's files or system component with the terminal logs from the same period.

Using the script utility

In Debian and other Linux distributions, the script utility is installed by default. It must be launched at the start of working in the terminal, specifying:

Create the directory in advance:

/home/user/terminallogs

(Use your actual username instead of user.)

Separating root and user sessions

Be careful: it is recommended to work in two separate terminal tabs:

If, in the same session launched via script, you execute exit to leave the root session, the script utility will also terminate and stop logging.

Separating tabs is also convenient because you can clearly see which actions were performed as a regular user and which as a superuser.

Most harm to the system is usually caused by erroneous commands executed with root privileges. Therefore, it is recommended to strictly separate user and superuser privileges and not add the regular user to the sudo group unnecessarily.

Configuring logging quality

Configure the utility so that it records entered commands and terminal output, but does not clutter the log with excessive system noise. An overloaded log loses its practical value.

If desired, other logging tools can be used — the main thing is that they are reliable and convenient for you personally.

Verification before starting work

Before proceeding with serious system configuration, ensure that logging is working correctly:

  1. Execute test commands that do not affect system stability:
    • update the package list (apt update);
    • display system characteristics;
    • view information about the CPU, disk, RAM;
    • check the network connection.
  2. Close the terminal.
  3. Ensure the log is correctly saved and contains all the executed output.

Only after such verification proceed to the actual configuration of the system and applications.

Why this is important

The worst-case scenario is to detect system damage not immediately, but after days, weeks, or even months, when you no longer remember which commands you entered and what the system's response was.

For example, in October 2025, I successfully used Audacity for working with audio files. Then I temporarily stopped working.

In January 2026, launching the program again, I found that instead of a working interface, a fragment of a desktop screenshot was displayed.

Rebooting the system and reinstalling the application did not help. The system and the application itself showed no obvious errors, but the interface either displayed a static "snapshot" of the screen or froze without updating.

If I had terminal logs, I could search by keywords (for example, related to the display manager or X11) and find commands that might have damaged the graphical subsystem.

But there were no logs. And remembering what exactly I had entered three months ago was impossible — terminal work was done almost daily.

Therefore, no command that introduces even minimal changes to the system should be executed without logging.

Immediately after installing the system, first of all, configure terminal logging.

And only then — everything else.

This is more reliable. This is safer.

↑ To Table of Contents | ↑ To Chapter Start

6.6. System Monitor Applet

It is widely known that various applets can be added to the taskbar in Linux (as well as in other operating systems).

Applets come in many different forms, but among them, one is particularly important. Despite its obvious usefulness, it is not present by default on the taskbar in all Linux graphical environments by default.

This is the system monitor applet. It displays several small graphs showing the real-time operation of key system components: CPU load, RAM usage, SWAP usage, network activity, and overall system load.

By placing this applet on the taskbar, you get interactive graphs of the main resource states constantly in your field of vision. This allows you to react promptly if the system starts behaving abnormally. Additionally, you can track how much running applications are loading the system, whether there are chronic overloads, or conversely, notice situations when a program is running but not consuming resources (which may indicate a freeze). You can also see the absence of network activity where it is expected.

Another advantage of the applet is the ability to quickly access the extended system monitor. Typically, clicking on it is enough to open a full process monitoring window. At least, that's how it works in the MATE environment I use.

The logic is simple: the user must maintain constant contact with the system — see, hear, and feel its state just as an experienced rider feels their horse.

In one famous film, a professional driver is given a new car. He starts the engine and says, "I don't hear the engine. Why?" They reply, "This is the latest model with enhanced sound insulation to increase driver and passenger comfort." The driver retorts, "This is the wrong approach — I need to hear all the nuances of the engine's operation."

The same holds true for an operating system. Use interactive monitoring tools as attentively as an experienced rider monitored the condition of their horse, and an experienced driver listened to the engine sound and the operation of the car's mechanisms.

Be sure to install this applet on the taskbar. You can be certain — it will prove extremely useful to you.

If necessary, use other interactive system monitoring tools: widgets with graphs pinned to the desktop, as well as tools with built-in alert systems for unusual system behavior.

↑ To Table of Contents | ↑ To Chapter Start

7. Content Creation

The internet is one of the greatest achievements of the human mind. But, sadly, a significant part of this ocean of knowledge has long turned into a swamp — where everything sinks indiscriminately: the valuable, the useless, and the outright harmful. Useful information often resembles rare islands of land amidst an endless stream of advertising noise, demagoguery, and incessant chatter.

Therefore — if you do go into public space — publish only what you have somehow verified for reliability. And if sharing personal experience — do so honestly and accurately. Not "in general terms", not "heard something somewhere", but carefully, humanely, and to the point: what happened, under what conditions, what you did, and what it led to. This is respect — both for yourself and for the reader.

Don't clutter the common space with long emotional confessions in the spirit of endless TV soap operas. Having a heart-to-heart talk is a sacred thing, but there are friends, private correspondence, and closed chats for that. But practical experience, gained through sweat, mistakes, tears — or through joy, interest, and labor — that is a contribution. That is what can be useful to others.

It is much more useful not laments about fate, but a simple, clear story:

Such material can really help. It reduces chaos. It saves people time, health, and money.

The saddest thing: often people with truly valuable experience remain silent. And those whose "wisdom" isn't worth a rusty cent run blogs gaining hundreds and thousands of subscribers, reposts, and likes. The world is turned upside down, but it can be slowly corrected — in small portions of honest and useful content.

Don't be afraid to talk about complex things. If necessary — anonymously. Do it carefully, competently — technically, legally, humanely. Your experience, however difficult, may one day save someone from trouble. It can suggest a path. It can give the feeling: "I am not alone."

Share what has truly been lived. What has weight. What can improve the world even by a couple of millimeters.

The main thing is — do it meaningfully and with respect for the reader. And then, instead of information garbage, there will be a little more genuine knowledge in humanity's common treasury. And that means — a little more light.

↑ To Table of Contents | ↑ To Chapter Start

8. Trusting People and the Basics of Social Engineering Security

8.1. Introduction

Social engineering is fundamentally different from technical attacks. It does not exploit software vulnerabilities and does not require system hacking. Its sole target is the person, their trust, habits, and decision-making processes. That is why social engineering methods work equally effectively both in offline life and in the digital environment.

The internet and working with a computer merely expand the manipulator's capabilities: they simplify establishing contact, lower critical perception, allow for remote action, and provide cover of anonymity. However, the techniques themselves — winning trust, playing on emotions, creating a false sense of community or safety — remain the same as outside the network.

For this reason, the following sections are devoted to social engineering in the broad sense: the main strategies of manipulators, vulnerability factors, and countermeasures. They are not limited to working with a PC but are directly applicable to online communication, interaction in communities, correspondence, email, and any forms of digital contact.

↑ To Table of Contents | ↑ To Chapter Start

8.2. Family, Guests, Friends, and Everyone Else

Here we come to one of the most interesting points.

It should be understood that the stories of Caesar and Christ are not isolated cases of Judas's and Brutus's dishonesty — they are part of the negative side of human nature. And far from all people consciously fight it within themselves, striving to eradicate it entirely. A significant portion of them do not fight it at all and even develop this negative side by all possible means.

Realizing this fact is not a call to misanthropy, but the basis for reasonable caution.

You can be betrayed and used by anyone and at any time.

The list can go on indefinitely.

Therefore:

Keep in mind that your guests, girlfriends, friends, while you are distracted, can open your paper notebook, journal, and photograph a page with their smartphone, instantly uploading the photo to their cloud, without leaving any traces on their smartphone. They can take a flash drive from their pocket, insert it into a USB port, and copy your key files onto it. And generally cause a lot of trouble.

And then, with a sincere, kind smile, looking you in the eyes without blinking, say: "Darling, are you back already? I was just scrolling through Instagram, there are such funny cats!"

Therefore, to avoid becoming one of the "funny cats," make all your "reliable friends," "dear guests," "faithful and sincere," "those-who-deeply-respect-you," and other potential Brutus's and Judas's — kiss the closed safe door and the locked monitor.

If you often have guests, it makes sense to install a small camera that overlooks your workspace with the PC. Usually, the sight of it alone is enough to make people lose the desire to snoop and look where they shouldn't.

You can also purchase YubiKey or other hardware USB authentication keys, which provide access to cryptographic keys via a PIN code and lock after several incorrect attempts. Use them everywhere possible. Many modern websites and encrypted databases already support authentication using YubiKey and other similar hardware keys.

This is not alarmism or paranoia — this is rational pragmatism based on very rich real-world experience.

And if any of the "sincere and faithful" tells you: "You're paranoid," —
reply: "It's better to be a living paranoid than a dead optimist."

Adequate people will only praise and support you for your attention to security. And they won't poke their noses where they shouldn't.

Moreover, an honest and reliable friend will suggest how to make your security configuration even better.

Only those who suddenly realized that "there's nothing to profit from here" will be outraged and sneer skeptically.

That, by the way, is how you "separate the wheat from the chaff."

It's very good if truly honest and responsible people appear in your life, with whom you can conduct joint affairs and who will never let you down. Or at least part with you as politely and diplomatically as possible.

But meeting such people is a Miracle from God.

And meeting Judas is ISO 0033-FOREVER: a standard that is perpetual and not subject to revision.

↑ To Table of Contents | ↑ To Chapter Start

8.3. Trust — the Manipulator's Main Weapon

If you think a manipulator starts an attack with threats, blackmail, or attempts to pressure your friends, relatives, and people you respect — I must disappoint you. All of that is crude, low-quality work.

Anyone who seriously decides to use you will never put themselves in such a position. They are not an idiot. They do not want criminal cases, public exposure, or revenge. Therefore, experienced manipulators act differently: their tool is trust. Calm, gentle, slowly cultivated trust.

And that is precisely why they are more dangerous than any blackmailers.

It is mortally disadvantageous for the manipulator for you to switch to a heightened state of caution. They need something else — for you to feel safe, for you to think they are acting in your interests, that your cooperation is mutually beneficial and "humanly correct." The less you feel threatened, the easier it is to control you.

Their task is not to push you, but to lead you. Not to intimidate, but to win you over. To keep you within the field of their game, so that you yourself are convinced that participating in this game is beneficial, convenient, and "goes without saying" for you.

Their main weapon is your trust.

And here is the most difficult question — how to distinguish normal human interaction from manipulative?

Below are the three most typical signs that any practicing lawyer recognizes instantly.


A. Violation of Personal Boundaries

Manipulation always begins where normal communication ends. Illegal collection of information, surveillance, curious attempts to learn things that are none of their business, illegal access to your devices (PC, smartphone, etc.), interest in your social circle, attempts to impose unacceptable formats of thought, behavior, or decisions on you — all these are direct signals.

If you notice such activity in a person — don't wait. Demand explanations, apologies, and concrete guarantees that such behavior will not be repeated.

If the response is fog, evading the topic, taking offense, attempting to steer the conversation elsewhere — you are dealing with a manipulator. And your mode should be one: self-defense. Calm, legally competent, but firm.


B. Non-Transparent Schemes

A manipulator never wants formality. A contract, written obligations, transparent accountability — this is a deadly trap for them, because any agreement makes them vulnerable.

Therefore, instead of legally clean relationships, they propose "understandings," "trust-based agreements," "verbal promises," "a format of friendly cooperation." At best — cleverly constructed schemes where, in case of problems, you cannot prove the fact of interaction, the scale of the damage, or even the fact of acquaintance with the manipulator.

Any attempt to involve you in unprovable, informal, murky constructs of cooperation is a red flag.

Ask one simple question:
"Are you willing to conclude a transparent official contract?"

If the response is evasion, philosophizing, stories about "high values," or attempts to make you feel guilty, consider that you have received the most honest answer possible. These people use others. And your task is not to let yourself be used.


C. Radicalism, Obscurantism, Pseudo-Spirituality

A separate category of manipulators are those who cover their schemes with "ideas." Radical political views, religious "missionary" activity, talk of nation, class, "sacred knowledge," esotericism, and sometimes — outright anti-scientific occult nonsense.

The first step is simple: ask a few direct questions:

If there is no answer — you are dealing not just with a manipulator. This could be a fanatic. A fanatic who is more convinced of their myths and visions than of objective reality.

Such people can be brilliantly intelligent, superbly educated, inventive to a terrifying degree. But all this intellect works not for creation, not for analysis, not for honest cooperation — but for promoting their absurd, anti-scientific, and often inhumane beliefs.

It is this combination — intellect plus fanaticism, charisma, and psychopathic conviction — that makes them the most dangerous type. An ordinary manipulator seeks gain. A radicalized manipulator seeks submission. They do not retreat, do not doubt, and do not recognize boundaries. They believe they have a right to you.

Therefore, if after a short check — with clear, direct questions — you see evasion, fog, aggression, or an attempt to "switch the topic to the vibrations of the universe," do not look for deeper meaning. The meaning is already before you.

Sound the alarm.
And activate all available means of self-defense — quickly, without hesitation, and without hope that "the person will change." Such people do not change. They only increase pressure until they are stopped.


A City Without Alarm

The simplest metaphor.

A city where no alarm has been declared, where there is no curfew, where the city hall welcomes guests with festivals and free tours — such a city is easy to take.

A city surrounded by barricades, patrolled by police, army, volunteers, with a garrison at full combat readiness — is almost impossible.

That's exactly how self-defense works.
The sooner you realize you are dealing not with a partner but a manipulator, the fewer chances they have. The less harm they can do you. The faster their game will fall apart.


Pearls Before Swine

Why is it said in the Bible: "Do not cast your pearls before swine"?
Because there are people who must not be given trust. Not only because they are bad — but also because they are dangerous. They do not know the value of your trust — they abuse it. And they do so brazenly, self-confidently, and cynically.

Your trust is a resource more valuable than money, influence, or connections. And only honest, responsible, humane people are worthy of it.

Representatives of totalitarian regimes, corrupt law enforcement, destructive cults, and lone manipulators are not worthy. Especially if these people have already harmed you or already violated the law regarding you.

Value yourself.
Value your inner "city."
And trust only those who have truly earned the right to enter there by day through the main gate, not those who will climb over the fence at night.

↑ To Table of Contents | ↑ To Chapter Start

8.4. Vulnerability Factors to Manipulators: How Not to Become an Object of Someone Else's Game

A manipulator is not a mentor or an ally. They are not grateful for trust and do not strive for equal cooperation. They look at a trusting person not as a person, but as a resource. The basis of their thinking is strategy: everything you reveal, any aspect of your consciousness — your thoughts, feelings, beliefs — becomes a lever of control and an instrument for their control over you.

Here are the key factors that make a person vulnerable:

Vulnerability Factors to Manipulators

Trust (as mentioned above)

Through authority achieved via real knowledge and skills or their skillful imitation, as well as imitation of high morality or other means of gaining authority, the manipulator gains a person's trust.

It is important to understand here that the manipulator will think not according to the scheme:
"I have been granted trust and will do everything possible not to let down the person who trusted me,"
but according to the scheme:
"Oh, what a good object for manipulation has come into my hands by itself! What a gift from fate!"

Trust is a very valuable currency. It is not squandered. Especially not before unknown, dubious personalities. Value the trust you give to people. Far from all are worthy of it.


Ambition for Cooperation

The belief that the manipulator takes you seriously and will offer some adequate cooperation, rather than just exploiting you for their own selfish purposes with minimal responsibility on their part, or even with no responsibility at all.

They will not.
A vivisectionist does not offer cooperation to a rabbit. They dissect it.


Desire for Self-Affirmation

A person's desire to show the manipulator, like, "I am smart," "I am strong," "I deserve respect," "I am worthy of more."

You are not worthy.
The manipulator will view all this as an amusing show that will bring them much joy and amusement.


Psychological Vulnerability №1

The conviction that you need a mentor, teacher, guru, leader. A spiritual authority. As soon as the manipulator sees that you perceive them as a leader, they will immediately tell you: "Oh yes, I am exactly the leader you have long sought, whom you acutely need and without whom you will achieve nothing in life" — and so on.

Either thoroughly check those you wish to accept as a spiritual mentor, understanding the great risk that you will simply be used.
Or — the best option — YOU DON'T NEED ONE. Achieve everything yourself, engage in self-education, and become a leader and mentor yourself for people who have opened up to and trusted you. An honest one. A real one.


Psychological Vulnerability №2

Lack of self-respect in the spiritual and legal sense. The manipulator will increase the severity of psychological pressure and violate your civil rights more and more if they do not encounter resistance.

If you do not respect yourself, your rights, and consider what is happening to be normal, you will be used until they put you on all fours, put on a saddle, and say: "Giddy up, horsey!"
And you will think: "Maybe I really am a horsey, maybe that's how it should be?"

No, it shouldn't.
At the first signs of encroachment on your civil rights and human dignity — a one-time warning: "Apologize and guarantee this will not be repeated, otherwise I will take self-defense measures."
If apologies and safety guarantees do not follow within 24 hours — take measures.

No trust in the manipulator and all those directly or indirectly involved in their manipulations. Activate the mode of maximum psychological, legal, and informational security.
A quick, harsh reaction with cessation of communication and shifting the relationship into the realm of legal, informational, and psychological security is what the manipulator least expects and greatly fears.
Delight them with precisely that.


Narrow Social Circle and Desire for Heart-to-Heart Talks

Suffering from a lack of communication is also a gift from fate for a manipulator. They will give you communication. Lots of it. Deep. Heartfelt. Which will consist entirely of their manipulation of you and attempts to format you in their own way.

Do not isolate yourself, avoid loneliness. Expand your social circle among adequate people, develop close relationships with them based on mutual trust. Do not be afraid of mistakes, dramas, and breakups that will accompany the development of these relationships.
A person with many good friends is difficult to manipulate. A loner is the perfect victim for a manipulator.

And if you are forced to be alone — be courageous and strictly follow the principle:
"It is better to starve than to eat whatever."
Because during starvation, the majority of deaths occur not from the starvation itself, but from poisoning by food surrogates.


Emotional Instability

For a manipulator, a gift from fate is a person who gives a stormy, unreflective, instantaneous emotional reaction to a particular experiment or provocation. The ideal victim.

Work on developing and stabilizing your consciousness, strive for emotional balance, where analytical thinking will trigger faster than a storm of emotions, and its conclusions will be more important than any boiling of passions.

There are enough Western and Eastern techniques for consciousness development now.
Do not gift the manipulator your emotions.
Gift them analytics in the spirit of Sherlock Holmes and Dr. Watson. That is the most terrible thing a manipulator can get from you. Delight them with that. I assure you — the effect will be stunning.


Self-Isolation and Silencing the Problem

One of the worst mistakes in fighting a manipulator is silence.
When you leave the situation in the mode of "a one-sided game." The manipulator attacks, and you are silent.

The manipulator will think:

"No matter how much I shell him, no return shell will land in my trench. Hurray! Intensify the shelling, we need to smoke this rat out of its dugout!"

Do not try to self-isolate and silence the problem.
Against low-level manipulators — yes, that might work. They will simply go look for another victim.
But a high-level manipulator — will not give up. They will finish you off.

They will repeat cycles:

Scanning for vulnerability → identifying vulnerability → attack on vulnerability → obtaining a reaction to the attack → analyzing the reaction → adjusting strategy → rescanning → new attack...

And so on — endlessly, until you break. Or until they break.

Counterattack.

Let the manipulator see before them not a frightened teenager from a school hallway,
cowering by a locker and trembling from someone else's power,
but a person who has passed through fire, water, and a couple of corporate layoffs,
with a cold mind, a hot heart,
and an inner "Sherlock," intently studying the interlocutor,
as if they were a suspect in an interrogation room.

And let their gaze hold one single question:
"Are you sure you want to continue this game?"


And remember:
in a world where there will always be people ready to push you with lies, pressure, and beautiful presentation,
three principles remain unchanged —
do not trust blindly, do not be afraid to say "no," and do not become a supplicant.

This is not "hardness for hardness's sake."
This is — elementary survival instructions in a world where any naivety will immediately be used against you.

These words, which have long transcended the boundaries of crime series and spy romance:
this is — a diagnosis of our time
and a vaccination against manipulation.

↑ To Table of Contents | ↑ To Chapter Start

8.5. The False Friend Strategy: Anatomy of a Hidden Strike

The False Friend Strategy is one of the most insidious technologies of psychological influence. It does not operate through open aggression, pressure, or intimidation. On the contrary — through trust, warmth, sympathy, and the illusion of moral support. Where you expect a sword strike, you stand guard; where you expect a friendly handshake — you relax. And it is precisely at that moment that the false friend, the manipulator's agent, delivers their subtle, surgically precise strike.

This strategy is dangerous precisely because it is based on human values — friendship, openness, mutual aid, the need for honest dialogue. The manipulator, a predatory architect of intrigue, turns all this into a tool of destruction.

Let's examine in detail — how exactly this technology works, what stages it includes, and how to recognize it in time.


A. The Manipulator's Preparatory Stage

Any False Friend Strategy begins long before the appearance of the "friend" themselves. The manipulator begins by studying the potential victim — their values, emotional needs, worldview, and weak points. Their task is to understand what type of personality evokes trust in the person, which moral strings can be pressed, which qualities can be turned against them.

Then begins the search for an agent. This could be:

After recruitment, the agent is briefed: how to gain trust, how to play on sympathy, when to show empathy, and when to distance themselves to create an illusion of independence.


B. The Trust-Gaining Stage

The False Friend does not act abruptly. They weave themselves into the surroundings softly, like warm water gradually heating up. They show interest in problems, share "similar" stories, talk about their own "hard experiences" to create an artificial sense of community.

They may give advice — sometimes genuinely useful, to strengthen trust.
They may console in difficult moments — to secure a place in the victim's emotional space.

But this help has a hidden goal:

This period is the most artful. The False Friend knows how to create a convincing mask of sympathy, and under it, quietly collects data that will later be used against the person.


C. Camouflage Techniques of the False Friend

To appear sincere, the False Friend often uses a set of subtle masks and gestures:

Such a multi-layered mask makes the agent convincing and psychologically comfortable — exactly what the manipulator aims for.


D. The Moment of Attack

The False Friend's strike is delivered not at any random time, but at the right moment — when the victim is maximally exhausted from struggle, when trust is at its peak, and emotional resources are at their lowest.

The forms of the strike can vary:

Such a strike has double force: it destroys not only a specific plan but the very structure of trust on which the person's personality rests.


E. The Danger of the False Friend Strategy

The strategy is dangerous for several reasons:


F. Methods of Verification and Identifying a False Friend

Despite the cunning of the strategy, a False Friend can be detected. For this, one must maintain cold clarity and specificity.

F.1. Contractual Nature

If the relationship implies seriousness — there should be a contract.
Switching to "let's do it like brothers" is a red flag.
An honest person is not afraid of contracts.

F.2. Testing with Real Risk

Ask the potential friend to reveal sensitive information about the manipulator's actions.
Or to provide data that could actually cause damage to the manipulator.
Refusal or evasion is a sign that you are dealing with an agent.

F.3. Joint Operation Against the Enemy

Propose participation in a specific project that would inflict tangible damage on the enemy.
Not words, not feelings — actions.
And be sure to check the consequences: was the harm real or was it a simulation created to strengthen trust.

F.4. Behavioral Traps

Unexpected requests, urgent tasks, situations requiring an honest solution.
The False Friend will equivocate, delay, retreat.
An honest one — acts directly.


G. Example

As an example, one can cite a situation where potential "friends" are asked to tell everything they know about the enemy's tactics and strategy, their manipulation methods, the specifications of their tools.
All those who swore friendship and assured of loyalty — at this moment fall silent.

Because the False Friend is ready to talk about anything — except what is truly important.


H. Conclusion

The False Friend Strategy is a subtle, sophisticated form of psychological warfare. It is built not on strength, but on trust. Not on blows, but on illusions. Not on open threat, but on a meticulously scripted role of a caring, sympathetic, attentive "comrade."

But it can be exposed — and quite simply.

Three things are needed:

An honest person is not afraid of checks, because they have nothing to hide.
A false friend fears light, direct questions, and specifics.

It is enough to turn on the light — and their entire theatrical mask begins to crumble, revealing the emptiness inside.

Thus, any manipulator and their agent are sooner or later exposed before those who do not lose their cool, do not cling to illusions, and can see beyond actions — the true motivation.

↑ To Table of Contents | ↑ To Chapter Start

8.6. Responding to Provocations

Responding deserves a separate chapter because it is precisely by the victim's reaction that the attacker finally assesses the effectiveness of their attack. Reaction is the opponent's diagnostic tool.

Remember the basic rule: no matter what you see, the reaction should either be completely absent, or be exclusively beneficial to you and destructive for the attacker. Any other reaction works against you.

Therefore, if you still decide to react to a provocation, you must understand in advance why you are doing it and what benefit you derive from it. A spontaneous, emotional, uncalculated reaction is a direct reinforcement of the attack.

In most cases, it is enough merely to record the fact of the provocation: to realize that what you are facing is not an event, but a controlled irritant not deserving of attention. Of course, provided it does not pose a direct threat to your physical, legal, or informational security, and is aimed solely at shaping emotional reactions, thought patterns, and behaviors beneficial to the attacker. It is precisely this form of provocation — a sneaky blow to the emotions without a direct attack that could be transferred to the legal plane — that the attacker uses most actively and systematically.

The solution is extremely simple:

As a result, the provocateur receives a response unsuitable either for analyzing your vulnerabilities or for strengthening their confidence in their own strength and control.

And most importantly: your response should be an element of your own game, strategy, and policy. You must pursue your own line of analysis and situation management, not constantly supply the provocateur with ever new reactions beneficial to them but meaningless to you.

Therefore, the final rule without exceptions: to any provocation — either silence, or a precise, cold, and pre-calculated strike against the manipulative system of the opponent.

Reacting is a source of suffering. But only unreflective reacting.

A calm, considered, and deeply reflective action in the form of impartial analysis, subtle sarcasm, or demonstrative cold silence — that is no longer reacting.
That is — analytical meditation.

↑ To Table of Contents | ↑ To Chapter Start

8.7. The Gray Cardinal Strategy vs. the King Strategy

All demagogues, manipulators, as well as representatives of totalitarian cults and regimes have one common trait: they adore ostentation — a pompous demonstration of their power, greatness, moral, intellectual, political, or other superiority. Often, these are people of a narcissistic bent, who vitally need to feel their superiority over others and derive moral satisfaction from it.

It is precisely on the external demonstration of strength, power, and illusory superiority that two key types of attacks are built.


A. Undermining Self-Confidence

This is one of the oldest and most well-known demagogic techniques.

The manipulator strives to completely devalue your personality and everything associated with it: scientific achievements, intelligence level, professional skills, volunteer activities, etc. All this is declared "trivialities," while the demagogue himself is supposedly at a fundamentally different, unattainable for you level of personal development and looks down on you — like a man on an ant.

The basis of such argumentation is either a set of flaws you never actually had, which the demagogue simply invented, or real weaknesses, but hypertrophied to the scale of a global catastrophe.

The justification of the demagogue's own "superiority" is built on the same principle: either this superiority does not exist at all, or it exists but is repeatedly exaggerated and inflated by the manipulator himself.

All this is accompanied by strong emotional pressure. There is an appeal to dark emotions — fear, resentment, despair, doubts, insecurity. The goal is simple: to suppress your ability for logical analysis and prevent you from recognizing that what's before you is merely bravado and a smokescreen, hiding the demagogue's weakness, the limitations of his resources, and failures in many areas.

To enhance the effect of the psychological attack, the demagogue deliberately presses on sore spots: problems in personal relationships, conflicts with loved ones, medical, financial, or legal difficulties.

Even obvious successes are aggressively devalued: creativity with tens of thousands of views and hundreds of positive reviews, achievements in science and education, professional growth, the ability to build deep and trusting relationships. Everything dear to you is subjected to cynical and demonstrative discrediting.

It's important to understand: this has no relation to objective criticism. Such actions should be directly recognized as manipulative totalitarian demagoguery.


B. Demonstration of an Illusory Victory

After any attack or provocation — regardless of its actual outcome — the demagogue will confidently declare his "victory." Total success, partial success, minimal effect, or outright failure — everything will be presented as a triumph.

Real success is inflated to the scale of Julius Caesar's victories. A partial or negligible result, and sometimes an obvious defeat, is retroactively declared a success, if not of imperial, then at least of general level.

The same techniques are used: emotional pressure and appeal to feelings, designed to obscure a sober analysis of what is happening.


Your Task

Your task is to understand that what you are facing is ostentation and a smokescreen, and calmly, methodically, step by step, link by link, to expose and destroy the manipulative system of the demagogue.

You don't need bravado. You care about the objective result — the gradual and inevitable loss of effectiveness of the opponent's manipulative system.

If you are focused on the real result of the confrontation and see that each of your steps makes you smarter, more experienced, and more protected, while the enemy's attacks become less and less effective, you don't need any demonstration of superiority. You rely on the obvious result for you: your system is slowly but surely destroying the opponent's system.

This is the Gray Cardinal strategy.

The King needs lavish banquets, solemn ceremonies, and parades to demonstrate his power — even if that power hangs by a thread or has long been a fiction.

The Gray Cardinal does not need banquets, ceremonies, or parades.

The Gray Cardinal sits inconspicuously in a small room, surrounded by officers, lawyers, and economists, bent over books of financial accounting, codes of law, and strategic maps. He forges real strength and power — having nothing to do with the parades where the King is shining at that moment.


Example

Imagine you are besieging a fortress.

On the walls of the besieged city, the enemy demonstratively shows contempt: curses are heard from the walls, the contents of chamber pots are thrown at you, the opponent ostentatiously struts in luxurious clothes, calmly eats exquisite dishes and drinks expensive wine, depicting complete indifference and superiority.

And you, at this time, are digging a tunnel.

Every day, sappers come to you — unshaven, dirty, with calloused hands — and report: today we advanced three feet, today two, today we were breaking a boulder, today we were pumping out groundwater, today we were additionally reinforcing the tunnel, today we advanced another five feet.

You don't need to shout to the enemy: "Hey, I'm digging!"

You can already see: the work is progressing, and each foot advanced brings victory closer.

You need to calmly and methodically continue digging.

And then one day, the enemy notices that a section of the wall is starting to crack. Then another. Then another.

And the most important thing: it is precisely at the moment when the opponent realizes that his wall has begun to collapse that all his bravado and ostentatious grandeur become especially aggressive.

Because demonstrative superiority is the death throes of a dying system. And the more aggressive the ostentation, the closer the end.

The conclusion is simple: the king, with all his pathos and bravado, remains naked. And the cardinal — still in the same modest monastic robe.


Finally — a Joke

Caesar, Genghis Khan, and Napoleon are sitting in hell, boiling in a cauldron, and discussing modern technologies.

Caesar says: "If I had modern tanks — I would have conquered the whole world."

Genghis Khan says: "If I had modern bombers — I would have captured the whole world."

Napoleon says: "If I had modern television — I would have convinced everyone that I won at Waterloo."

↑ To Table of Contents | ↑ To Chapter Start

8.8. Discrediting Authorities

A separate aspect of a manipulator's psychological attack is the discrediting of your authorities — that is, people whose experience you study and use for your own development.

It is fundamentally important for the manipulator to be your sole authority or, at the very least, to allow as authorities only those whom he himself designates.

The goal of such totalitarian control over your system of authorities is simple:

Using various aggressive psychological techniques, the manipulator will attempt to undermine your confidence that following the ideas of a particular figure in science or culture is truly beneficial for you, provides new knowledge, internal support, and strength — including for opposing the manipulator himself.

Example.

George Carlin — a comedian who gained worldwide fame during his lifetime — according to the manipulator, is merely a pitiful, superficial cynic. Meanwhile, the manipulator himself — a little-known translator and poet, a "philosopher" with three hundred Telegram subscribers — has, of course, long since surpassed Carlin and confidently outgrown him.

The same mechanism will be applied by the manipulator to your study of the experience of Alan Turing, Jacques Fresco, and Linus Torvalds: all of them will be discredited, all your successes related to studying the legacy of these people will be ignored or devalued, even if these successes are obvious. Meanwhile, any of your slightest mistake will be harshly highlighted by the manipulator: "You see, you made a mistake, which means the teachers you chose are worthless"

In the end, it will turn out that all of them are mediocrities, failures who understand nothing, and only the manipulator is truly talented, smart, and insightful.

And the Pope is merely the head of a fishing club, the 14th Dalai Lama — a mammal from the camelid family, and the Quran — a textbook on terrorism.

Only our beloved manipulator is a true genius, although, to our universal regret, an unrecognized one.

And may Almighty Allah forgive him.

"For Allah is merciful. Allah is forgiving."

What to do?

Study the experience of the figures in science and culture close to you even deeper and more thoroughly.

If your study of their legacy irritates and angers the manipulator so much that he is ready to pour gallons of dirt on them — you are on the right path.

↑ To Table of Contents | ↑ To Chapter Start

8.9. FATAL ERROR, or the Absence of Early Threat Recognition

Although this topic has already been touched upon in various sections of the article, it makes sense to dedicate a separate block to it. Precisely this circumstance — both in social engineering and in most other spheres — is critical and often leads to extremely unpleasant, and sometimes tragic, catastrophic consequences.

We are talking about a situation where an enemy is not recognized as an enemy. You continue to treat them with trust, do not switch to self-defense mode, and still give them the opportunity to manipulate you, while the unrecognized opponent methodically improves their system of influence.

In other words, the enemy deepens control over you and hones their manipulative skills, while you are catastrophically losing the most valuable resource — time needed to switch to a defensive mode and build a system of counteraction.

Sooner or later, the enemy will still be recognized — but only after they have used you for years, long and cold-bloodedly exploited you for their own selfish purposes, extracting benefit from the trust you mistakenly gave them as a friend.

While they were building a system of control over you, you were trying to build a relationship with them.

And at the moment when you finally clearly realize that you are facing an enemy, it will be especially painful for the years wasted. In the development of social engineering defensive skills, you will find yourself years behind the level of development of their attacking methods.

You will have to switch to a combat, defensive mode in a hurry — catching up, correcting accumulated mistakes.

And all of this could have been avoided.

Get rid of the illusion of security.

Security is not something that exists on its own. Security is something you create. If you have done nothing to form your own system of protection, then you are not protected.

At the same time, there is no need to become a fanatic. It is enough to soberly assess reality — a world saturated with insidious and sophisticated threats lurking at every step.

As an employee of a security agency, I have the opportunity to communicate with retired police officers and other specialized service personnel who, after retirement, continue to work as instructors in private security structures.

Most people do not have such an opportunity. However, this is not critical: the necessary skills of early threat recognition can be formed through specialized literature and quality video materials.

Read books on police and military intelligence. A significant part of such literature is available for free or at a moderate price — these are openly sold textbooks for police and military academies.

Study psychology. Psychology is the queen of the humanities.

But you need not philosophical speculations detached from reality about the nature of consciousness, but specific applied skills: understanding the mechanisms of fraud, manipulation, gaining trust, moral pressure, and coercion. It is important to know exactly what methods a potential opponent uses and how to recognize them in the early stages of communication.

Watch materials exposing the methods of recruitment and retention in religious and pseudoscientific cults, the propaganda methods of totalitarian regimes, radical ideologies and parties, the techniques of private individuals who love to play "God," financial scammers, marriage fraudsters, and lover swindlers.

Study materials on how to build healthy relationships with a work collective, friends, relatives; where lies the thin line between mutually beneficial cooperation and vile exploitation, between trust and an attempt to crack open your consciousness like a tin can.

This is objectively useful and critically important knowledge. It should be among the top priorities of personal development because without it, a person becomes easy prey for fraudsters and manipulators.

Long before meeting a manipulator, you should already have a clearly formed and polished scheme: how to recognize manipulation as quickly as possible and how to just as quickly switch to a comprehensive defensive mode across all key areas of self-defense.

The main strength of a manipulator lies in capturing trust. And at the foundation of capturing trust almost always lies the victim's lack of skill in early threat recognition and adequate response to them, the ability to timely deprive the manipulator of trust or the ability not to engage in any relations with him at all, having recognized his treacherous nature immediately.

A timely switch to comprehensive self-defense sharply disrupts the manipulator's plans and saves you an enormous amount of time and energy — resources you can devote to yourself and to people truly worthy of your trust.

The failure of any manipulator begins at the moment when they are clearly and unambiguously recognized as a manipulator. And the earlier this happens, the better — for you and for all honest people around.

↑ To Table of Contents | ↑ To Chapter Start

Cyber Engineering vs. Social Engineering

If surveillance has been initiated against you with the goal of manipulation, it's important to understand: the manipulator needs the most accurate and detailed psychological profile of the victim possible.

For effective influence, they require deep and multifaceted knowledge about the structure of your psyche: what you are sensitive to, what evokes trust and joy, and what evokes rejection and anger; which topics provoke an instantaneous emotional reaction, and which make you think; where the pressure points are, pressing which can yield a vivid and predictable result, and so on.

It is precisely on this data that the vector of the social engineering attack is built. The manipulator cannot act blindly — that is too costly and ineffective. They need an accurate map of your consciousness, allowing them to understand exactly where to strike.

Therefore, you will be actively engaged — through gentle persuasion, skillful seduction, subtle provocations, sharp emotional impulses, or other techniques — in projects and discussions of a humanitarian nature. These could be conversations about psychology and philosophy, creative games with literature, prose, poetry, drama. They will bombard you with a stream of emotionally charged philosophical and artistic images to study your reaction: from themes of love for pets to discussions of various forms of sexual deviations. Or they will simply provoke you into any humanitarian conversations that reveal your personal data and psychological vulnerabilities.

However, the consciousness analysis system has an Achilles' heel. It specifically needs your humanitarian activity — the most sincere, emotionally open, and psychologically exposed. This very material is the "food" for the manipulative system.

On the other hand, such a system is practically incapable of effectively processing activity related to the exact sciences: engineering and technical activities, programming, and everything connected with it.

Therefore, if you detect attempts by a manipulator to provoke you into revealing data that forms your psychological profile, simply turn the game on its head. Reduce your humanitarian activity to the necessary minimum: stop philosophical discussions, artistic creation, conversations about "spiritual aspects of life," and similar topics.

(From the humanitarian sphere, leave only what, as already mentioned and will be further stated in this article, is truly useful for countering manipulations: the study of psychological and social engineering techniques of influence, development of psychological resilience, early detection and prevention of manipulative attacks, etc.)

Instead, maximize your engineering and technical activity. Actively study AI, programming, cybersecurity, system administration.

Let the manipulator receive an endless stream of logs, configuration files, scripts, instructions for setting up operating systems and programs, technical notes, and reports.

For you, this will become training that develops logic and promotes professional growth. And for the hostile consciousness analysis system — a stream of destructive noise, "killer spam" that it is incapable of effectively processing.

In essence, you structure the situation so that the activity which is medicine for you becomes poison for the manipulator's system.

Do not respond to manipulations creatively or philosophically. Respond technically and legally — with the cold precision of an analyst and engineer.

Use Linux or FreeBSD as your primary system. Publish notes, instructions, and observations related to configuring and operating your type of system on your public page, limiting yourself to general material.

(This refers not to fine individual settings that an attacker should not know, but to fundamental and universal practices: the usefulness of password managers, hardware authentication keys, encrypted databases; the need for strict control of incoming ports in the firewall; the mandatory configuration of mandatory access control mechanisms like SELinux and AppArmor, and the like.)

As a result, you find yourself in an unequivocal win. In the era of total computerization, such knowledge and skills will be extremely valuable for you. The attacker, as mentioned above, will find themselves in a state of strategic loss.

Thus, you break one of the manipulator's key mechanisms — the systematic study of your reaction to various manipulative techniques.

↑ To Table of Contents | ↑ To Chapter Start

Sarcasm Against Provocation

A provocateur relies on one key thing: that all of their messages will be perceived by you seriously, and that you will adhere to the principle of conducting a serious, responsible, and logical dialogue.

This is exactly what they need. Because they themselves are not conducting any serious, responsible, or logical dialogue with you. Their task is to attack you with a stream of provocative messages in order to study your reaction.

Therefore, the basic principle of counteraction is simple: either give no reaction at all, or give a reaction different from the one the provocateur expects.

One effective method is sarcasm. Instead of being drawn into an imposed serious discussion with emotional tension, you respond with laughter. In doing so, you break the script: where seriousness is expected, irony appears; where a reaction was planned, distance emerges.

There is an old anecdote: two dissidents are sitting, drinking whiskey, having a snack, and discussing the authorities. Suddenly, one of them looks attentively into the bushes, then takes a glass of whiskey, a sandwich, puts it on a small plate, goes into the bushes, and returns with a sense of having fulfilled his duty to the Motherland.

The second asks:
— Why did you go there?
The first replies:
— There’s Agent Smith sitting in the bushes with a recorder, taping our conversation. So I decided to treat him to some good whiskey so he wouldn’t feel sad and lonely.

Another anecdote: one dissident says to another:
— Why did you hang a poster on the wall saying “We thank the special services for their dedicated work” — and in such a way that it can be seen from the window?
The second replies:
— They watch me so closely and thoroughly that I cannot treat their work without respect.

The meaning of these examples is one: instead of the expected reaction — a demonstrative shift of the frame of perception. This is the essence of a sarcastic response to provocation.

However, an important complication arises here. A manipulator, noticing that they are being mocked, may adapt. They may create false targets: demonstrate imaginary vulnerabilities, pretend to be foolish, make deliberately weak or exaggerated provocations — all in order to make you waste energy fighting a decoy target.

At this point, sarcasm applied without analysis begins to work in vain. You laugh — but at what has been deliberately set up for you.

Hence the second principle: before applying sarcasm, it is necessary to assess whether the vulnerability is real or staged.

Nevertheless, even taking this trap into account, the strategy remains advantageous. Because you change the very model of reaction. You stop playing by the provocateur’s rules and begin to impose your own.

Even if some of your responses hit false targets, others will reach their goal. And for the manipulator, the mere fact that their script is breaking is already a sensitive blow.

If out of six bullets fired from a revolver only three hit the enemy — no matter how much they mock your misses, you remain the winner. Because you are counterattacking, not trying to conduct a serious conversation with a scoundrel.

It is important to understand that the provocateur operates by the same logic. They work “by area,” not counting on one hundred percent effectiveness. Even if only a small portion of their provocations works — that is already enough to achieve their goals.

Therefore, there is no point in striving for perfect accuracy. It is enough that some of your sarcastic responses hit the target.

One of the manipulators once told me (by the way, having only 300 followers on a social network): “I have long since grown beyond and surpassed your idol Carlin, who is nothing more than a dirty aggressive cynic.” The result: now I mock the manipulator not only in the style of Carlin, but also in the style of Pratchett. Let them now grow to surpass the cunning, slyly ironic Pratchett. The main thing is that the manipulator has somewhere to grow.

↑ To Table of Contents | ↑ To Chapter Start

Verifying the Accuracy of Statements Using AI

As Socrates said: the main problem with quotes from the internet is that nobody verifies them.

Well, in any case, if Socrates had the internet, he would have definitely said this.

As already follows from previous articles in this section, we build an adequate way of responding to a manipulator's provocations — either by withholding the expected reaction entirely or by responding in a way that benefits us.

There is a simple way to avoid a spontaneous reaction to provocative messages while simultaneously exposing the manipulator’s falsehoods: check their statements using AI. For example, we can use the popular multitasking ChatGPT.

Simple analysis algorithm:

  1. Take the manipulator's statement. If it is short, analyze it entirely. If it is long, break it into logical blocks and analyze one block at a time (the cycle repeats for subsequent blocks as needed).
  2. Formulate the AI query:
    “I have read a statement by a certain person (you can specify a pseudonym, for example 'Professor') and I want you to accurately and impartially analyze where in this statement there is truth (reasonably accurate interpretation of facts and logical analysis), where there is half-truth (distortion of facts or logic due to the Professor’s incompetence or deliberate manipulation), and where there is falsehood.”
  3. Receive the AI’s response.

Advanced variant:

  1. Take the manipulator's statement.
  2. Write a structured comment on it: your own reflections, questions that the AI should examine and answer.
  3. Formulate the AI query:
    “I have read a statement by a certain person. Analyze accurately and impartially where there is truth, half-truth, or falsehood. Also, analyze my critique: how fair is it? Answer my questions, clarifying whether the scientifically supported answers reinforce the Professor’s opinion, contradict it, or simply provide an alternative viewpoint.”
  4. Receive the AI’s response.

This is just an example. You can develop more subtle individual analysis schemes, categorizing truth, half-truth, and falsehood. Free versions of popular AI assistants handle this task quite effectively.

Conducted Experiment

Object of analysis: a Doctor of Philosophy, a professor at a major city university with a humanities profile.

He tried very actively to manipulate me by engaging in philosophical discussions. This person has been teaching philosophy for more than ten years, primarily of the European tradition.

For over a month, I analyzed his philosophical notes on his blog, which he himself titled: “Professor [Full Name], my official blog”.

Analysis results:
Truth: 1–20%
Half-truth: 20–30%
Falsehood: 60–70%

An impartial analysis showed that the Professor is an incompetent dilettante and charlatan, twisting philosophy in such a way that if Socrates had seen it, he would probably have voluntarily drunk hemlock.

A similar analysis of some other figures in science and culture produced comparable results: falsehood at every step, often without realizing the absurdity of what was said.

Alas, this is the environment in which we live.

Modern AI analytical capabilities allow identifying falsehoods and exposing incompetent individuals, outright demagogues, and manipulators. In response, one should naturally expect criticism: accusations of replacing human interaction with robots, turning the researcher into a “robot,” and various forms of Luddism and Don Quixotism.

The more intense this criticism, the more accurate your analysis was.

The Doctor of Science under investigation cursed me as fiercely as the Catholic Church cursed Satan, perhaps even more.

I wish you, dear readers, similar success in exploring the entire abyss of absurdity that surrounds us.

And remember — AI can make mistakes, but if you point them out, AI will respond: “I apologize, I made a mistake.” Humans, however, often react very differently when their mistakes are pointed out.

↑ To Table of Contents | ↑ To Chapter Start

9. Rigidity of Expectations in Threat Analysis

or why, while the "cat sleeps," "mice" are already having a party in the system

In recent years, the world has become significantly more unstable, and the overall level of risks — both physical and digital — has noticeably increased. This is especially true for the field of cybersecurity: cyberspace provides the attacker with unique advantages — distance, anonymity, low entry barrier, and the ability to inflict significant damage with minimal resource expenditure, often completely escaping legal responsibility.

Against this backdrop, a systemic problem is increasingly evident, characteristic of both ordinary users and specialists: rigidity of expectations in threat analysis.


What is rigidity of expectations?

The essence of the problem is simple and therefore particularly dangerous. A person tends to expect that the attacker will act in comprehensible, familiar, and visually obvious ways. In the everyday imagination, it looks something like this: at night, someone saws a lock, pushes out a window pane, climbs in — in short, behaves as noisily, roughly, and noticeably as possible.

However, this approach directly contradicts the logic of an experienced adversary's actions — be it a professional cybercriminal, an organized group, or an entity abusing its authority.

A rational attacker does not choose obvious and expected scenarios because they are inherently ineffective.


Why are "standard" attacks a sign of amateurism?

Expecting template attacks works only against:

Against an experienced opponent, this approach fundamentally does not work.

A professional strives to:

That is why the most dangerous attacks often look like "nothing is happening".


Analogy from the offline world (for clarity)

An experienced thief does not saw a lock or push out a window pane. They invite you to dinner. There, they treat you to food with added sleeping pills, while they themselves have taken an antidote in advance and demonstratively taste the food, convincing you it is safe.

When you fall asleep, they calmly take your keys, wallet, credit cards — and leave.

In the morning, you wake up. Everything is in place: you are sure no one touched your keys, wallet, or credit cards. And you may not realize for a very long time that you have already become a victim of a crime.

In cybersecurity, this scenario occurs much more often than "broken windows."


What does this look like in infrastructure?

A provider can be under an attacker's control for years. At the same time, its system administrators may not even suspect the fact of compromise, expecting that a "real hack" will necessarily manifest as server crashes, service failures, and red lights.

They do not consider that modern attack tools are designed for:

Anomalies are attributed to:

Meanwhile, the on-duty administrator plays a computer game, and the attacker has long bypassed the protection and is methodically expanding control over user systems. Grotesque? Yes. Rare? Not at all.


The user as a "well-fed cat"

The situation with users is even more telling. A classic tragicomedy:

And at the same time, a firm conviction:
"Nothing will happen to me. And if it does — I'll notice right away and quickly block everything."

In practice, such a user resembles a well-fed cat on whom mice are already having a personal life while it enjoys deep sleep.


What to do about it

The conclusion is extremely simple:

Avoid rigidity of thinking.
Do not expect attackers to act according to standard and understandable schemes.

It's not for nothing they say:
He who makes the door too strong often forgets to strengthen the walls.

And another old threat-modeling formula:
Fear the goat in front, the donkey behind, and the vile man from all sides.

Be prepared to:


The true sign of mature thinking

The ability to see and analyze non-standard, complex threats is a sign of genuinely flexible, creative, and analytical thinking. In cybersecurity, this is not an abstract virtue, but a practical condition for survival.

The key task is to create an environment where the attacker simply cannot operate. Wherever they try to act, they will encounter:

This does not make the system absolutely invulnerable — but it significantly complicates the life of the attacker and noticeably simplifies the life of law-abiding users.

And in the world of cybersecurity, that is precisely considered a good result.

↑ To Table of Contents | ↑ To Chapter Start

10. User Participation in Free Software Development

Free and open-source software (FOSS) evolves thanks to thousands of people worldwide contributing to it. These can be programmers, testers, technical writers, ordinary users — each at their own level. The more active the community, the faster the project develops and the higher its quality.

If you possess programming skills and can write user scripts, create patches, or improve a program's functionality — do not keep your work only on your computer. Publish it on the project's official website, in repositories (like GitLab or GitHub), or send it to the developers. Such proposals give the development team valuable material for analysis and help choose optimal development directions.

However, contribution is not limited to programming. If you don't yet have deep technical knowledge but use a free operating system or programs and want them to develop — report discovered bugs. It's helpful to:

Regular bug reports and defect notifications help developers find and fix problems. Such feedback is often more valuable than any emotional discussions on forums and social networks: one quality bug report genuinely improves the program for thousands of users.

It's important to understand that FOSS projects develop through the efforts of a relatively small part of the community — estimates vary, but not all users participate actively. Nevertheless, even a small increase in the number of participants noticeably accelerates development. If the proportion of users willing to report problems and suggest improvements grows, the quality of free software will continue to improve.

Today, many Linux distributions in terms of reliability, stability, and security are not inferior to commercial systems, and sometimes surpass them in performance while consuming fewer system resources. This is the result of years of joint work by developers and users.

Stay in touch with the community: participate in forums of the distribution and projects you use, report found vulnerabilities and security issues. For example, if you notice that a firewall (like nftables) is not working as expected, or an anti-malware tool did not react to a threat — pass this information to the developers. Your contribution helps create a more resilient and secure digital environment.

Free software is a networked ecosystem where even small observations by one user become part of the shared knowledge base. Over time, such databases and information hubs, based on real-world practice, form a powerful foundation for technological development.

The main brake on progress is not a lack of resources, but indifference.

Take an active stance. Most problems — including technological and social ones — intensify where indifference and passivity reign. Laziness and the attitude "it will somehow resolve itself" create a favorable environment for errors, vulnerabilities, and abuses. Conversely, a systematic approach, precise knowledge, and responsible user participation form a space with less room for chaos and manipulation. Active civic and professional engagement is one of the key factors for progress and security in the digital environment.

↑ To Table of Contents | ↑ To Chapter Start

11. Adequate Use of AI and the Danger of Abusing Its Capabilities

11. The Danger of Abusing AI Capabilities

Modern AI is already capable of writing very high-quality, substantive articles on any topic, even based on a minimal user request of 100–200 characters. Many people take advantage of this, passing off AI's creations as their own and boasting to others about the depth of their own wisdom. At the same time, they often don't even attempt to write a competent short prompt for the AI to create the article they need.

It's worth delving into philosophy here and stating that the tools created by civilization should enhance and develop human creative abilities, making them more skilled and intelligent, not replace genuine labor, making humans lazier and dumber. Don't use an electric scooter where you can walk or ride a mechanical bicycle; don't order microwaveable semi-finished meals if you have the time and energy to cook healthy homemade food yourself. The same goes for AI: don't use auto-generation if you don't need to make a publication urgently, under extreme conditions, and you have time to write a detailed draft.

Write by hand a maximally detailed and structured, sectioned and subsectioned, detailed full draft. Give that to the AI for processing, specifying the type of processing you need — the desired style, permissible degree of deviation from the original draft, etc. Ask the AI to find and indicate logical, historical, scientific, statistical, ethical, and other types of errors — and correct them. Improve the text by adding statistics, historical facts, quotes confirming the ideas you present in the article. AI can find all this quickly and provide precise original formulations.

Create several versions of the processed text, repeat the same query until you get the optimal processing of the draft. If you don't get it — refine the query. Save all versions where at least part of the text is successfully processed, and compile the final text from them. Let AI become not a replacement for thinking, as the calculator once became for schoolchildren in math lessons, but what the squire was to the medieval knight. After all, AI is originally positioned as an assistant in human intellectual labor, not its surrogate replacement.

Let the final article, the clean copy, be born in deep, hot, inspired labor, where AI becomes for you what a rifle is for a sniper — it will make your informational shot more accurate, profound, and concise. The future belongs to AI. That is an obvious fact. But for correct work with AI, what's needed is not a lazy fool, but an intelligent, energetic, creatively thinking operator.

AI, however much it may surpass the average person in knowledge, does not create anything truly new and original; it only uses the vast databases accumulated over the entire historical period of humanity's existence — by people. Without a creative, original, out-of-the-box thinking individual, AI becomes merely an object of abuse and a factor of degradation. And also an argument for obscurantists, who are opponents of civilization: "You see what your science has done? Schoolchildren don't think for themselves, they do their homework through AI. But in ancient times, people solved critically complex survival tasks in their minds..."

Don't give obscurantists such arguments. Show that AI is the honed steel tip of an arrow, thanks to which the arrow shot by an archer pierces the target even better, not a genie fulfilling all your wishes just because you rubbed a lamp.

Progress has two sides — enormous development and the deepest degradation of humanity. And what happens to us depends only on ourselves.

↑ To Table of Contents | ↑ To Chapter Start

11. Using AI for Linux Programming

General Principles of Interaction

For performing tasks in a Linux environment, I did not have knowledge of the Bash language or specific Linux commands. The main approach was as follows:

Error Handling

My own log analysis skills were minimal, and I could not efficiently process large volumes of error messages that occurred during complex system configurations. Even with higher expertise, such analysis would require significant time.

AI analyzed the logs quickly, identified one or more possible causes of the error, and suggested potential solutions.

Step-by-Step Error Resolution

Often, resolving a first-order error revealed a second-order error, which in turn could be caused by a third-order error, and so on.

This sequential error analysis and resolution scheme enabled a multi-level, “tree-like” problem-solving process with AI.

Effectiveness and Reliability

Despite occasional failures in log analysis and sometimes incorrect suggestions, in 85–90% of cases, AI worked correctly, and the results were satisfactory.

Nevertheless, it is essential to remain vigilant and attentive, as errors on the part of AI cannot be completely ruled out. AI can make mistakes as well; however, practical experience shows that it does so no more often than a human — and possibly even less frequently.

Role of the Human Operator

In this setup, the human acts as an intermediary between AI and the Linux terminal:

Thus, the human becomes a creatively thinking operator, facilitating interactive communication between AI and the system. This significantly increases Bash programming efficiency and accelerates complex system configurations, even for users without deep Linux knowledge. The primary required skills are logical and creative thinking.

↑ To Table of Contents | ↑ To Chapter Start

11.3 Life Hacks for Using AI

One topic — one dialogue

Do not mix different topics within a single dialogue unless absolutely necessary. Discuss one topic and one question in one chat. If you need to switch to another topic or ask a different question, create a separate chat.

AI works noticeably better when a single, clearly defined question and one logically coherent topic are handled within one dialogue. Illogical and unstructured mixing of different topics confuses the AI and leads to an increased number of errors.

Ask questions correctly

Formulate your question or task as logically precise and syntactically correct as possible, minimizing and correcting typos whenever you can. Make the formulation as detailed as possible: the more clear context you provide, the higher the quality of the answer.

Additionally, you can ask the AI:
“I have given you a task. Ask the questions whose answers you need in order to perform the task more accurately.”

When the task or question is formulated and the AI has received all the data necessary for an answer, it is useful to ask a clarifying request:
“Provide a report on how you understood the task.”

The AI will provide a report that allows you to see whether everything was understood correctly or whether clarifications and adjustments are needed. If additional corrections are required, make them and request the report again, taking the changes into account.

Basic memory settings

Many AI systems adapt to the user by storing various data in memory slots within the personal account during conversations. Often, this information is not always useful, or its usefulness is local and temporary. As a result, the memory allocated to the AI becomes overloaded, and it stops retaining information that is truly important.

What can be done?
Store in the AI’s memory only the information that is global in nature, directly related to the essence of your work, and genuinely helps the AI better understand your requests.

Examples:

Slot 1: Research topics
Cybersecurity, countering social engineering, countering psychological manipulation.

(As a result, any dialogue with the AI will be conducted with these priority topics in mind, and the AI will directly or indirectly provide information related to them.)

Slot 2: Working environment
Debian 12, MATE desktop environment, kernel #123456, etc.

(In any dialogue related to programming, PCs, computer science, or cybernetics, the AI will take into account the specifics of your operating system.)

Slot 3: Installed software
LibreWolf, KeePassXC, CherryTree, nftables, SELinux, Suricata, etc.

(The AI will be aware of the user’s software configuration and provide recommendations with this setup in mind.)

Slot 4: Critical feedback
If a logical, historical, cultural, ethical, scientific-technical, or any other type of error is found in the user’s texts, tasks, or questions, do not show loyalty; instead, clearly point out the error and propose ways to correct it.

(The AI will monitor errors in the correspondence, point them out, and suggest corrections, thereby actively contributing to the development of adequate self-criticism.)

And so on — depending on your tasks.

Downloading long AI dialogues

If you need to save a long dialogue with the AI, use the built-in dialogue export service or, at the very least, save the entire web page as a whole. It is not recommended to manually select and copy large volumes of text into text editors.

Files obtained via dialogue export can be opened in a text editor, copied, and edited without losing the formatting and structure of the text.

Date and Time Insertion

Unfortunately, many AI services do not have a built-in function for automatically adding the date and time either to user messages or to responses generated by the AI.

At the same time, this feature can be useful in a wide range of activities and, in some cases, critically important.

For example, in my work in the security field, I use AI to analyze situations and develop appropriate response strategies for various incidents. Under such conditions, it is essential to record the time of sending and receiving messages with minute-level accuracy.

With a high degree of probability, a similar need arises in other professional fields as well. Scientists—such as physicists and biologists—require precise time fixation when discussing specific stages of experiments. An agronomist may need to record the moment a disease is detected on plant leaves, an environmental specialist may need the time of water or soil sampling, and a programmer may need to log the time when specific changes are made to a system.

This problem can be solved very easily. Below, in the “Additions” section, a simple user script is provided that inserts the current date and time into any text field when a user-defined keyboard shortcut is pressed.

The script automatically inserts the date and time, clears the clipboard, and then terminates itself correctly. It is sufficient to configure a keyboard shortcut once to launch the script. For example, I use the Ctrl + Alt + Y combination, but you can choose any other convenient shortcut. The main thing is to make sure that it does not conflict with system shortcuts or key combinations already used by other installed applications.

The script has been tested on Debian 12. I have been using it since June 2025, and no malfunctions have been detected during this time.

The script code is provided in the “Additions” section at the Appendix 1 chapter end of the article.

↑ To Table of Contents | ↑ To Chapter Start

12. Safe Behavior When Working with Mobile Devices

12.1. Minimal Device Hardening

Even if your desktop computer is protected like a military bunker, a smartphone or tablet can easily become that very "back door" through which important information leaks or an erroneous action that can harm you is committed.

The result is often a tragicomic situation: a person painstakingly set up PC security with paranoid thoroughness, but forgot about the mobile device — and it was from there that all valuable information leaked. A picture straight from the series: on the facade of the house — a steel door with a code lock, but on the back — a piece of plywood on a hook.

Therefore, it's worth saying a few words about minimal hardening (security strengthening) of mobile devices. Usually, a lot is written about PCs, but smartphones and tablets often remain "off-screen" — although they are almost always online, almost always with us, and almost always contain the maximum amount of personal information.


The main vulnerability of mobile devices is the absence or weak configuration of network filters.

Ideally, the device should be able to control the network activity of applications. If you use Android, pay attention to solutions that allow limiting network access for apps (for example, via a local VPN filter or built-in system mechanisms).

Ordinary users can limit themselves to rootless firewalls like RethinkDNS or NetGuard. These solutions allow controlling which apps have internet access and do not require complex system modification. Simple installation and configuration — and you already significantly reduce data leakage risks, especially if you limit internet access for apps that work with the camera, microphone (for example, the native "Camera" app or a call recorder), and other services related to storing private data that do not need network access to perform their primary functions.

For more experienced users, there is the option to purchase a smartphone with root access support and install iptables, nftables, or a similar network filter. Even an inexpensive smartphone, properly configured this way, can be safer than expensive models with a closed OS. Rooting allows fine-tuning access rules, filtering outgoing and incoming traffic, and blocking any suspicious connections.

Deeper device modification is also possible — removing the stock OS and installing a custom operating system, for example, one without Google services and with increased security settings "out of the box."

However, keep in mind: rooting voids the manufacturer's warranty, and some apps may refuse to work on a modified device.

People who seriously work with sensitive information should consider purchasing a specialized secure communicator. For example, a Linux-based pocket PC with open root access and the ability for fine-tuning of all network and system components. Such devices provide a high level of control and privacy, which an ordinary "out-of-the-box" smartphone cannot offer.

There is also a simple life hack for those limited in funds but working with sensitive information: for important conversations, you can use a regular button phone that only supports GSM calls and SMS. Without the internet, it is physically impossible for an attacker to remotely connect to your device. Yes, it's minimalist, but sometimes simple solutions are the most reliable.

Conclusion: the higher the control over network activity and the fewer unnecessary functions, the lower the risk of information leakage. A mobile device is essentially your mobile computer, and the approach to its protection should be no less strict than for a work PC.

Configure firewall rules based on the principle: only what truly needs it goes to the internet.
For example, a smartphone camera does not need the internet — it should just take pictures, not ping the network every five minutes.


The second common problem is mindlessly granting permissions to applications.

Android (and iOS too) allow fine control of permissions: access to camera, microphone, geolocation, contacts, etc.
But most often, people install an app and automatically click: "Allow — Allow — Allow."

Work on the principle of minimum necessary rights: give the app only what it truly cannot function without. Audit already installed programs — you will be surprised how many of them unnecessarily access the microphone, camera, or files.

Be especially attentive to camera and microphone access. If your system version allows — configure them so that messengers and other apps get access only upon request. This way, you eliminate the risk of constant "background eavesdropping."

And another rule: do not download APK files from dubious sites. Use official repositories and verified sources. Exotic builds and "clever mod-versions" very often come with surprises.

↑ To Table of Contents | ↑ To Chapter Start

12.2. Now — About Hygiene of Behavior When Working with a Mobile Device.

Everything here is the same as with a PC: keep a minimum of apps and accounts on the device. Separate messengers and work services by profiles: work — separately, family — separately, personal — separately.

If the device supports multiple user profiles — use this function to create a separate protected environment for working with sensitive data.

Store notes and passwords only in encrypted storage.
Use password managers protected by a PIN code or master phrase.

PIN code — not a formality.
Choose six-digit or eight-digit PIN codes.
Do not use birth dates — not yours, not relatives', not the year of a historical event. Four-digit codes have long been cracked by simple brute force or observation of entry.

Biometrics (face recognition, fingerprint) — a convenient addition, but not a replacement for a code. Use it with caution: you can be forced to apply your finger to the device or simply grabbed and the smartphone brought to your face. But with an eight-digit PIN code, everything will be much more difficult. Moreover, face recognition may not work in poor lighting, and a fingerprint sensor may not work when dirty.

For important conversations and file sharing, use encryption (e.g., PGP).
Social networks — the worst place to discuss important things.
And in general: a social network account is a powerful attack vector.
Think, do you really need it?


Be especially careful when publishing personal photos and information.

What you consider a cute photo is a real treasure trove for a social engineering specialist: clothing style, background, architecture, trees, interior details — all this can be used for analysis and location tying.

Instagram "flexing" often costs people too dearly. If you are not a blogger or media person — it is wiser to minimize the publication of personal data and not synchronize unnecessary things with the smartphone.

For viewing media platforms, if you need to comment on content, it is safer to use separate "dirty profiles" and services without telemetry.
And if you don't need to — do not log in at all. View content without authorization.


Monitor your contact circle.

Do not add random people as friends. If a person's profile raises the slightest doubt — block them. Do not subscribe to random and suspicious groups. This is not paranoia — this is digital hygiene.


A separate topic — banking applications.

Linking banking services to a smartphone is not only convenient but also a serious risk.
If you use mobile banking for trading or operations — do not keep the app constantly logged in.
Log in — perform the operation — log out.

Internet scammers increasingly attack mobile devices precisely because they are always connected to the network and always "at hand."


And one more small thing many forget — a stylus.

A stylus is an inexpensive and effective way to reduce the risk of accidental taps and typos. Modern styluses do not scratch the screen, and if you are concerned — use one with a soft tip. Moreover, with a stylus, it is easier to accurately tap the desired part of the text for editing, saving time and nerves when typing and editing text on touch devices.


And remember:
tablet and smartphone — these are the same computers, just portable. All security measures applicable to a PC must be applied to them — sometimes even stricter.

On a keyboard, it's hard to accidentally press "the wrong place."
But on a touch screen, one awkward tap can lead to sad consequences — from accidental data sending to installing malware or transferring money to the wrong place.

So work consciously — and may your smartphone and tablet remain helpers, not sources of problems.

↑ To Table of Contents | ↑ To Chapter Start

12.3. And Finally, a Few Life Hacks:

A. Do Not Ignore the "On-Screen Owner Information" Feature

During the initial setup of a new smartphone, the system often suggests enabling the function to display the owner's contact information on the locked screen. Most users skip this step — and in vain.

Such a line can be extremely useful both in everyday life and in extreme situations. For example:

"This smartphone belongs to: First Name Last Name.
Blood type: III Rh+.
Allergies: none / penicillin.
Emergency contact: +123456789."

This modest signature solves several tasks at once:

It is only important to remember: do not include home address, workplace, or other sensitive personal information in this line — only the minimum that will help in an emergency but won't be a gift for a malicious actor.


B. If Necessary, Use "Anti-Theft" Protection Services

They allow remote device management if the smartphone is lost or stolen. Typically, such systems include several functions simultaneously:

This is not absolute protection — with a full reset, some functions stop working, and without a network, tracking is temporarily impossible. But in real life, such services significantly increase the chances of recovering the device and often help catch the thief off guard.

Important: set up "anti-theft" in advance :)


C. Use an App for Recording Phone Calls

Install and correctly configure an app for recording phone calls. If possible, do the same on the smartphones of elderly parents and minor children.

Currently, the level of telephone fraud is extremely high. Scammers use a wide range of aggressive and often unpredictable psychological manipulations that can have a serious emotional impact on a person and push them to rash actions.

If the conversation was not recorded, you generally cannot prove anything later. Contacting the police without objective evidence, such as an audio recording of the conversation, often proves useless.

A call recording app also serves as effective protection against telephone harassment and abusive communication, which remain common phenomena since the advent of telephone communication.

Modern smartphone microphones, as well as software (virtual) audio channels used by call recording apps, have high sensitivity and can provide material suitable for voice examination. In the absence of voice distortion, such a recording can be used to identify the perpetrator with a high degree of accuracy.

If the interlocutor uses a clearly morphed or artificially altered voice, a reasonable reaction would be to immediately end the conversation.

Before using such apps, familiarize yourself with the current legislation of your country.

The same principle applies to other means of recording events that can expose a perpetrator in unlawful behavior — video cameras around a private house or at the apartment entrance, carrying a voice recorder, using a panoramic dashcam in a car. However, this is already a separate and broader topic for discussion.


D. Do Not Discard a Device with Minor Screen Damage

Do not discard or sell a smartphone with minor screen damage. Even if the screen is slightly cracked and small crack webs are visible, but text and images remain readable — such a smartphone can still be very useful.

Possible use cases:

Many smartphones are discarded or sold second-hand only because of a cracked screen, even though all other functionality works fine. Such devices can serve for several more years, providing real utility.


E. Use a Case and Tripod

The most common cause of partial or complete damage to mobile devices is a cracked screen.

Most often, the screen cracks long before battery wear, microprocessor aging, or other malfunctions related to long-term device use become noticeable.

Especially sad are cases where the screen cracks on a new, just-purchased smartphone, for which 90% of the loan has not yet been paid off.

As a result, the device becomes partially or completely inoperable, which under normal use could have served for many more years.

Meanwhile, the risk of such a breakdown can be significantly reduced by extremely simple and inexpensive means.


E.1. Use a Case with a Textured Surface

It is advisable to order a case online that is created exactly for your smartphone model. At the very least — choose an option with a snug fit that provides access to all necessary buttons and ports.

Thanks to the textured surface, the smartphone in the case does not slip in your hands, and the risk of it falling out is significantly reduced.

Many cases also serve as a stand: their design allows you to unfold the case in a special way and reliably fix the smartphone in a horizontal (landscape) position. This is convenient, for example, for watching movies and videos.

This solution additionally reduces the risk of the device falling: people often fix the smartphone for watching video in unreliable ways, causing it to fall and break from the slightest bump.

Moreover, when dropped, a smartphone inside a closed case is damaged with a much lower probability than a device without protection.

It is also recommended to choose cases in bright colors — red, crimson, orange. Bright color makes it easier to spot a smartphone left on a chair, sofa, or bed, and reduces the risk of accidentally sitting or lying on it.

Keep the case constantly closed. Open it only when necessary for direct work with the smartphone. After finishing work — close the case again.

This additionally protects the device from water, dust, and dirt ingress, and reduces the risk of screen damage from falling or from foreign objects hitting it.

In general, when working with any valuable device, it is wise to keep it cased, unless the operating rules explicitly require constant use without a case. Don't worry: GSM, 3G, 4G, and 5G signals freely pass through ordinary cases and do not affect connection quality.


E.2. For More Complex Viewing and Shooting Positions, Use a Tripod

Based on the constructions people build to fix a smartphone for video shooting, one could make a full-length satirical film in the tragicomedy genre.

Often, such methods lead either to crooked shooting — since such fixation does not allow precise setting of the angle, height, and camera position — or to the fall of this entire "Tower of Sauron" and the smashing of the smartphone.

Meanwhile, the problem is solved extremely simply: it is enough to pick up an inexpensive tripod suitable for your smartphone model, for example on AliExpress.

A tripod is a stable structure, allows fine adjustment of shooting height and angle, and after use folds up compactly, like an umbrella.

If you purchased a smartphone or tablet — buy cases for them, and if video shooting is necessary — a tripod.

This will significantly reduce the risk of screen damage, extend the device's lifespan, and noticeably simplify daily use, making video viewing and shooting as convenient as possible.

F. A Separate Life Hack for Those Who Read a Lot

If you read a lot — use an offline e-book with an E-Ink (electronic ink) based screen.

This provides several serious advantages at once: