he knew more than me (thankfully)


September 2025

Ask the Experts


Graphene OS Expert Shares Tips

One of the perks of running All Things Secured is the opportunity to connect with experts who can help fill in the gaps of areas that I may not fully understand. This was much needed this month as I tried to wrap my brain around Graphene OS, so I reached out to Josh from the Side of Burritos channel.

​Graphene OS Expert shares tips & NEW security features​

Go Deeper: There's a lot more to Graphene OS than I've been able to understand in the short time I've been using it. Instead of pretending like I know everything (I don't), I'd rather point you toward some better videos worth watching.


Looking at a book called Logo Modernism

Graphene OS Tour

If you've been on the fence, watch one of Josh's video tours of the OS and its settings.

​Watch the Video →​

A type specimen of Google Fonts

Graphene App Stores

Watch as Josh walks through the different app store options for Graphene OS.

​Watch full video →​


Caught in Controversy


Hi [CORRECTED_NAME GOES HERE], I find it interesting how certain topics or products/services cause so much controversy in the privacy and security space. I didn't know it when I first started, but it seems that Graphene OS has its own share of opinionated users...

...and as a newbie, I got caught in the middle of them.

I'm not an expert on Graphene OS, nor have I tried to pretend that I am. In fact, I think that part of the value of me trying Graphene OS is approaching it with fresh eyes to see how hard it would be for the average person to start using it without any background or context.

Some people weren't too happy about my misunderstandings about the mobile OS, and they were quick to let me know how stupid I am.

There's not much I can do about that, but I do think there are a few things we can all take away from this:

  • Be Curious: Who cares if you understand every feature of a piece of software? Try it, be curious, and be willing to learn as you go along.
  • Ask an Expert: Part of learning is either doing your own research or finding somebody who knows more than you...and asking them. That's what I did with Josh and I'm glad I did.
  • Find Your own Balance: Even if you did understand all of the features, that doesn't mean you should use all of them. Find the balance that works for you, even if it's not the "most secure" or "most private" option. Don't be shamed by those who are uber-secure.

That's what I've been thinking about through this process. What do you think?


This Week in Privacy News

​Galaxy Users...take note!​

If you use a Samsung Galaxy phone, listen up. Samsung has suddenly warned that attacks on Galaxy smartphones are underway. The company has revised its September security update and all eligible phones will now receive the fix.

--> Forbes.com/sites/zakdoffman/2025/09/15/samsung-issues-emergency-update-for-most-galaxy-users/

​​
​
​the most important feature on iPhone 17 is...​

The new iPhone 17 has been announced, and amid all the flashy new features comes β€œthe most significant upgrade to memory safety in the history of consumer operating systems.” Explicitly targeting the spyware industry that produces exploits for tools like Pegasus to hack on targeted devices, a series of changes in Apple’s chips, OS, and development tools are part of what it calls Memory Integrity Enforcement (MIE).

--> Security.apple.com/blog/memory-integrity-enforcement/
​

​ban on social media for kids?​

The Stop Addictive Feeds Exploitation (SAFE) for Kids Act, passed last year, prohibits social media companies from showing feeds personalized by algorithms to users under 18 unless they have a parent's consent. Instead, feeds on apps like TikTok and Instagram would be limited to posts from accounts young users follow. But...is that really going to help?

--> ABCNews.go.com/Technology/wireStory/new-yorks-ban-addictive-social-media-feeds-kids-125604142


Other Experts?

I'm already starting to think about who I should invite to join me on our All Things Secured live streams in 2026.

Do you know of anybody that works in the privacy/security space that would make a good guest? Shoot me a reply to let me know!

✌️

Josh


3824 Cedar Springs Rd #801-8170, Dallas, TX 75219
​Unsubscribe Β· Preferences​

Upgrade your Online Privacy & Security

Join thousands of individuals and small businesses who understand the value of protecting their important accounts and online privacy. πŸ“· Popular YouTube host πŸ”‘ Simple security πŸ”’Privacy advocate βœ… Get the free "Security Priorities Checklist" here πŸ‘‡ πŸ‘‡

Read more from Upgrade your Online Privacy & Security
AI privacy 101

February 2026 AI Privacy 101 *sponsored by DeleteMe AI Privacy: My 4 Tools & 8 Rules This week, I'm sharing the results of my testing of multiple private AI options that represent different approaches to privacy: middleman, locally hosted, private models and more. If you want more privacy in your use of AI, watch this: AI Privacy Explained: 4 Tools and 8 Rules Go Deeper: As with most technology that I've reviewed, privacy tends to boil down to how you use it instead of the specific tools that...

stop using authenticator apps

January 2026 Counter-Intuitive Tips *sponsored by Yubico Uncommon Cybersecurity Advice What if strong privacy and security is based more on how simple it is (and therefore how likely you are to keep using it) than how effective it might be? If you know somebody who finds cybersecurity a bit overwhelming, you'll want to share this with them: Don't use an Authenticator App (+ other uncommon tips) Go Deeper: Lately I've been spending a lot of time trying to figure out systems and tools that...

contact key verification

January 2026 Verified Contacts? *sponsored by DeleteMe Are You SURE it's Them? It's become harder and harder to distinguish between real videos and fake ones. Hackers are now impersonating voices, images and videos to scam people. This makes it even more important than ever to start verifying the contacts we're communicating with. How to Verify Contacts on iPhone (Checkmark Tutorial) Go Deeper: In addition to Contact Key Verification, there are other "advanced" security features offered that...