Blog

  • Guide 2: Your SIM Card Is a Tracking Device

    Guide 2: Your SIM Card Is a Tracking Device

    In our previous guide, we covered how airplane mode can protect you by creating gaps in location tracking. But here’s what it doesn’t solve: the moment you reconnect, your SIM card resumes broadcasting your location to telecommunications networks worldwide, and that data is far less secure than most people realize. For most people, using any

    Read more…

  • Guide 1: The Strategic Use of Airplane Mode

    Guide 1: The Strategic Use of Airplane Mode

    Physical Security, Digital Privacy, and Practical Implementation In an era where your smartphone can betray your location to anyone willing to pay for it, airplane mode represents one of the simplest yet most effective tools for protecting yourself against both physical threats and digital intrusions. While most people think of airplane mode as something to

    Read more…

  • The Best Resources To Take Your Physical Security & Privacy Knowledge to the Next Level

    If you’ve been following Glok on X, Instagram, Facebook or Nostr, then you’ve been picking up some valuable tips on how to handle emergency situations, particularly $5 wrench attacks aimed at extracting your crypto. If you’ve attended one of our Counter-Kidnapping Trainings, then you’ve gained even MORE knowledge on this subject from our expert team

    Read more…

  • Learn From Others’ Mistakes: How STATS.GLOK.ME Helps You Stay Safe in Crypto

    Learn From Others’ Mistakes: How STATS.GLOK.ME Helps You Stay Safe in Crypto

    Most crypto security discussions focus on the usual suspects like phishing attempts, malware infections, and social engineering scams. But there’s another security dimension that doesn’t get nearly enough attention, and we believe it’s worth taking seriously. Physical attacks against cryptocurrency holders happen more often than you might think, and at GLOK Research, we’ve built something

    Read more…

  • Announcing GLOK: The Next Chapter in Bitcoiners’ Arms Race

    Announcing GLOK: The Next Chapter in Bitcoiners’ Arms Race

    The Quest for a Secure Bitcoiner Begins in 2013 In 2013, bitcoin users primarily relied on desktop wallets such as Bitcoin Core, MultiBit, or Electrum, which stored private keys in a wallet.dat file on their computer’s hard drive. Viruses and malware were widespread, specifically targeting these wallet.dat files to steal bitcoin. It was the beginning

    Read more…