Please take a look at Articles on self-defense/conflict/violence for introductions to the references found in the bibliography page.

Please take a look at my bibliography if you do not see a proper reference to a post.

Please take a look at my Notable Quotes

Hey, Attention on Deck!

Hey, NOTHING here is PERSONAL, get over it - Teach Me and I will Learn!


When you begin to feel like you are a tough guy, a warrior, a master of the martial arts or that you have lived a tough life, just take a moment and get some perspective with the following:


I've stopped knives that were coming to disembowel me

I've clawed for my gun while bullets ripped past me

I've dodged as someone tried to put an ax in my skull

I've fought screaming steel and left rubber on the road to avoid death

I've clawed broken glass out of my body after their opening attack failed

I've spit blood and body parts and broke strangle holds before gouging eyes

I've charged into fires, fought through blizzards and run from tornados

I've survived being hunted by gangs, killers and contract killers

The streets were my home, I hunted in the night and was hunted in turn


Please don't brag to me that you're a survivor because someone hit you. And don't tell me how 'tough' you are because of your training. As much as I've been through I know people who have survived much, much worse. - Marc MacYoung

WARNING, CAVEAT AND NOTE

The postings on this blog are my interpretation of readings, studies and experiences therefore errors and omissions are mine and mine alone. The content surrounding the extracts of books, see bibliography on this blog site, are also mine and mine alone therefore errors and omissions are also mine and mine alone and therefore why I highly recommended one read, study, research and fact find the material for clarity. My effort here is self-clarity toward a fuller understanding of the subject matter. See the bibliography for information on the books. Please make note that this article/post is my personal analysis of the subject and the information used was chosen or picked by me. It is not an analysis piece because it lacks complete and comprehensive research, it was not adequately and completely investigated and it is not balanced, i.e., it is my personal view without the views of others including subject experts, etc. Look at this as “Infotainment rather then expert research.” This is an opinion/editorial article/post meant to persuade the reader to think, decide and accept or reject my premise. It is an attempt to cause change or reinforce attitudes, beliefs and values as they apply to martial arts and/or self-defense. It is merely a commentary on the subject in the particular article presented.


Note: I will endevor to provide a bibliography and italicize any direct quotes from the materials I use for this blog. If there are mistakes, errors, and/or omissions, I take full responsibility for them as they are mine and mine alone. If you find any mistakes, errors, and/or omissions please comment and let me know along with the correct information and/or sources.



“What you are reading right now is a blog. It’s written and posted by me, because I want to. I get no financial remuneration for writing it. I don’t have to meet anyone’s criteria in order to post it. Not only I don’t have an employer or publisher, but I’m not even constrained by having to please an audience. If people won’t like it, they won’t read it, but I won’t lose anything by it. Provided I don’t break any laws (libel, incitement to violence, etc.), I can post whatever I want. This means that I can write openly and honestly, however controversial my opinions may be. It also means that I could write total bullshit; there is no quality control. I could be biased. I could be insane. I could be trolling. … not all sources are equivalent, and all sources have their pros and cons. These needs to be taken into account when evaluating information, and all information should be evaluated. - God’s Bastard, Sourcing Sources (this applies to this and other blogs by me as well; if you follow the idea's, advice or information you are on your own, don't come crying to me, it is all on you do do the work to make sure it works for you!)



“You should prepare yourself to dedicate at least five or six years to your training and practice to understand the philosophy and physiokinetics of martial arts and karate so that you can understand the true spirit of everything and dedicate your mind, body and spirit to the discipline of the art.” - cejames (note: you are on your own, make sure you get expert hands-on guidance in all things martial and self-defense)



“All I say is by way of discourse, and nothing by way of advice. I should not speak so boldly if it were my due to be believed.” - Montaigne


I am not a leading authority on any one discipline that I write about and teach, it is my hope and wish that with all the subjects I have studied it provides me an advantage point that I offer in as clear and cohesive writings as possible in introducing the matters in my materials. I hope to serve as one who inspires direction in the practitioner so they can go on to discover greater teachers and professionals that will build on this fundamental foundation. Find the authorities and synthesize a wholehearted and holistic concept, perception and belief that will not drive your practices but rather inspire them to evolve, grow and prosper. My efforts are born of those who are more experienced and knowledgable than I. I hope you find that path! See the bibliography I provide for an initial list of experts, professionals and masters of the subjects.

OT: iPhone Basic Security

by CEJames & Akira Ichinose


As a Marine (currently on inactive status) we were big on security. As a retired Physical Security Specialist (GS-11) at the NWSC facility I was responsible for security. As a COMSEC manager at a high security military facility I was responsible for safeguarding and managing high security materials. Then there were "other duties as assigned" that dealt with security of both information and other materials. If I didn't learn and understand one thing, it was this: "The weakest link in all of it was the human factor because all security depends solely on each and every individual involved especially since it is a person who creates such security as well as enforces security requirements (as was seen in recent news stories involving certain individuals responsible for using an insecured device called signal)."


I have implemented many of what follows and some I refuse simply due to that human factor so I recommend you implement what you feel secure with to help safeguard your phone, data, and security implementation.


Here is a comprehensive overview of basic iPhone security precautions, focusing on privacy, protection from theft, malware, and surveillance. This guide is based on official Apple documentation and security best practices from cybersecurity experts.


๐Ÿ” 1. Use a Strong Passcode

Avoid 4-digit PINs — Use a 6-digit numeric or better yet, an alphanumeric passcode.

Disable “Simple Passcode” in Settings > Face ID & Passcode > Change Passcode > Passcode Options.

Why: Prevents brute-force attacks and unauthorized access.


๐Ÿ“– Reference: Apple Support – Passcode settings


๐Ÿงฌ 2. Enable Face ID or Touch ID

Ensures biometric authentication for unlocking your device, purchases, and password autofill.

Settings > Face ID & Passcode or Touch ID & Passcode.


๐Ÿ“– Reference: Apple Platform Security – Biometrics


๐Ÿ•ต️ 3. Turn on Find My iPhone

Allows you to locate, lock, or erase your phone remotely if lost or stolen.

Settings > [your name] > Find My > Find My iPhone.


๐Ÿ“– Reference: Apple Support – Find My iPhone


☁️ 4. Use Two-Factor Authentication (2FA) for Apple ID

Requires both your password and a second device or phone number to sign in.

Prevents account takeovers even if your password is compromised.


๐Ÿ“– Reference: Apple Support – Two-factor authentication


๐Ÿ“ฒ 5. Keep iOS Updated

Always install the latest iOS version for security patches and bug fixes.

Settings > General > Software Update > Automatic Updates ON.


๐Ÿ“– Reference: Apple Security Updates


๐Ÿšซ 6. Limit Lock Screen Access

Disable access to Control Center, Siri, Wallet, and other features from the Lock Screen.

Settings > Face ID & Passcode > Allow Access When Locked.


๐Ÿ“– Reference: Apple Support – iPhone Lock Screen Access


๐Ÿ”Œ 7. Use App Privacy Settings

Limit apps’ access to your location, contacts, photos, microphone, camera, etc.

Settings > Privacy & Security.


๐Ÿ“– Reference: Apple Support – Privacy settings


๐Ÿ•ณ️ 8. Disable Ad Tracking and Limit Sharing

Turn off Personalized Ads and limit apps’ tracking abilities.

Settings > Privacy & Security > Tracking > Turn off “Allow Apps to Request to Track”.


๐Ÿ“– Reference: Apple Support – App Tracking Transparency


๐ŸŒ 9. Use a VPN on Public Wi-Fi

Avoid unsecured public networks or use a reputable VPN to encrypt your internet traffic.

Prevents packet sniffing and man-in-the-middle attacks.


๐Ÿ“– Reference: National Cybersecurity Alliance – Mobile Security Tips


๐Ÿงผ 10. Avoid Jailbreaking

Jailbreaking disables iOS sandboxing and security checks, leaving your phone vulnerable to malware and surveillance.

Stick to the official App Store.


๐Ÿ“– Reference: Apple Security Guide – Jailbreaking Risks


๐Ÿง  11. Monitor App Permissions Regularly

Review app permissions under:

Settings > Privacy & Security > [Category]

Check what apps can access Bluetooth, Camera, Microphone, Location, etc.


๐Ÿ” 12. Enable Automatic App Updates

Keeps apps patched against known exploits.

Settings > App Store > App Updates > ON.


๐Ÿ“ฌ 13. Be Wary of Phishing and Scam Texts

Don’t tap suspicious links in messages or emails.

Use Apple’s built-in SMS filtering:

Settings > Messages > Unknown & Spam.


๐Ÿ“– Reference: Apple Support – Recognize and avoid phishing


๐Ÿ”“ 14. Lock iPhone with USB Accessories

Prevents data extraction tools like GrayKey from bypassing your lock screen.

Settings > Face ID & Passcode > “USB Accessories” OFF.


๐Ÿ“– Reference: Apple Platform Security – USB Restricted Mode


๐Ÿ”— 15. Use a Password Manager (iCloud Keychain or 3rd party)

Strong, unique passwords stored securely.

Settings > Passwords > AutoFill Passwords > iCloud Keychain.


๐Ÿ“– Reference: Apple Support – iCloud Keychain


๐Ÿงฑ Optional: Advanced Protection Program

For journalists, activists, or high-risk users, Apple offers an Advanced Data Protection feature.

End-to-end encrypts even iCloud backups and data.


๐Ÿ“– Reference: Apple – Advanced Data Protection


No comments: