Privacy, Cookies and Security

just binary
Velcum to my vebshite! ah ah ah!

Links below to turn off cookies in Microsoft’s Edge, Mozilla’s Firefox, and Google’s Chrome web browsers (these are the most popular, feature rich, easy to use and most secure browsers when kept up-to-date and properly configured:

Control Cookies in Edge

Delete and Manage Cookies in Edge

Control Cookies in Firefox

Clear Cookies and Site Data in Firefox

Control Cookies in Chrome

Clear, enable, and manage cookies in Chrome

Using a VPN may help in masking your personal info as well.


When visitors leave comments on this site it collects the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: After approval of your comment, your profile picture is visible to the public in the context of your comment.


If you leave a comment on this site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

Your Data

Your data is never shared or sold for profit (that I know of). This website is protected with an SSL as well as other features (see What is an SSL Certificate? on

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website (like for example).

How long we retain your comment data

If you leave a comment, the comment and its metadata are retained indefinitely. This allows recognition and approval of any follow-up comments automatically instead of holding them in a moderation queue.

What rights you have over your comment data

If you have left comments, you can request to receive an exported file of the personal data held about you, including any data you have provided. You can also request to erase any personal data we hold about you. This does not include any data kept for administrative, legal, or security purposes.

Security…that’s important right?

Rest assured that I take the security of this website and any links going to other websites very seriously. Systems are in place to help ensure any links to outgoing websites are checked and verified for integrity. Bear in mind that this website is still in it’s infancy and therefore does not really represent much of a target for so called “hackers”. However, this site is still maintained as much as possible to help reduce the possibility of any kind of breach.

Don’t have malware detection?

Generally speaking it’s a good idea to have at least some kind of malware detection (aka anti-virus programs provided from well established companies like Norton or McAfee). Windows 10+ comes with it’s own security program so if your on a limited budget it could be all you really need. Personally I use multiple real-time scanning applications that monitor not just the connections coming in but also the ones going out. I spent a fair bit of time researching this so if you’d like to know which ones I’m using just send me an email or use my Contact Form. Regardless of how you decide to protect your PC there’s really no substitute for common sense. Try to avoid downloading anything that’s not necessary and remove games/programs that you no longer use or update if possible. E-mails from unknown sources in particular should be ignored especially when they contain links (SPAM anyone?) or attachments of things that could very well be malicious. This is true for PC’s and mobile devices (especially those that have outlived their support).

Take me to your leeeder

Ultimately if someone really wants to get on your device and they have the financial or knowledgeable means to do so…they will. It’s really just the simple nature of the internet and digital devices. As much as we’d all love to think that the powers that be have our best interests at heart it’s much more reasonable to at least consider how we’ve reached this present age of tech driven life. The pursuit of pseudo-happiness in place of the virtue of happiness. Is it all bad? of course not. But to ignore the speed at which things seem to be going within every aspect of the current human condition is a failure that cannot be overstated. With that said, it is also relevant to recognize that there are in fact many people who haven’t given in to the very source of the problem that plagues the majority of society and indeed even the church itself.

Much more can be said about this but I will have to leave it for now. If you managed to read this far I applaud your efforts. If you think I missed something or you have something else to offer to this page…I’m pretty sure you know how to get a hold of me by now.

mazal tov!