Blog
-

Guide 2: Your SIM Card Is a Tracking Device
In our previous guide, we covered how airplane mode can protect you by creating gaps in location tracking. But here’s what it doesn’t solve: the moment you reconnect, your SIM card resumes broadcasting your location to telecommunications networks worldwide, and that data is far less secure than most people realize. For most people, using any
-

Guide 1: The Strategic Use of Airplane Mode
Physical Security, Digital Privacy, and Practical Implementation In an era where your smartphone can betray your location to anyone willing to pay for it, airplane mode represents one of the simplest yet most effective tools for protecting yourself against both physical threats and digital intrusions. While most people think of airplane mode as something to
-
The Best Resources To Take Your Physical Security & Privacy Knowledge to the Next Level
If you’ve been following Glok on X, Instagram, Facebook or Nostr, then you’ve been picking up some valuable tips on how to handle emergency situations, particularly $5 wrench attacks aimed at extracting your crypto. If you’ve attended one of our Counter-Kidnapping Trainings, then you’ve gained even MORE knowledge on this subject from our expert team
-

Learn From Others’ Mistakes: How STATS.GLOK.ME Helps You Stay Safe in Crypto
Most crypto security discussions focus on the usual suspects like phishing attempts, malware infections, and social engineering scams. But there’s another security dimension that doesn’t get nearly enough attention, and we believe it’s worth taking seriously. Physical attacks against cryptocurrency holders happen more often than you might think, and at GLOK Research, we’ve built something
-

Announcing GLOK: The Next Chapter in Bitcoiners’ Arms Race
The Quest for a Secure Bitcoiner Begins in 2013 In 2013, bitcoin users primarily relied on desktop wallets such as Bitcoin Core, MultiBit, or Electrum, which stored private keys in a wallet.dat file on their computer’s hard drive. Viruses and malware were widespread, specifically targeting these wallet.dat files to steal bitcoin. It was the beginning