Cybersecurity for Human Beings

This webpage is also at the easy-to-remember link:

If you would like to see the core arguments on why we need to demythologise cybersecurity then this is the presentation that I am touring on the topic. Otherwise, enjoy:

Method 1: Dynamic Translation of Webpages

Enter a URL below and click on go!


  1. Webpages are modified, so may not render as expected
  2. All documents are cached statically for several minutes
  3. Rate-limiting is enforced so sometimes it won’t work
  4. Link-rewriting is restricted to documents on the same webserver
  5. CSS-formatting, images, backgrounds may be missing

Method 2: Direct Input

Paste your input directly here, and then hit submit; this version of decyber also supports a Show Changes feature.

show changes?

Method 3: Google Chrome Extension

Use a decybering Google Chrome extension hardcoded into your browser for those times when you are off the net. Download it for free from the Google Store.

Method 4: Bookmarklet

Currently being revised.

Drag this bookmarklet into your bookmarks bar:

…and then highlight some text on a webpage and click it!


Please add comments and suggestions below.

10 Replies to “Decyber”


    Contrary to much of the fear-mongering that has been spreading through the nation’s capital on cybersecurity matters lately, the director of national intelligence bucked that trend on Tuesday when he told a senate committee that there was little chance of a major cyberattack against critical infrastructure in the next two years.

    DNI James Clapper was a singular voice of reason when he told the Senate Select Committee on Intelligence that lack of skills on the part of most attackers and the ability to override attacks on critical infrastructure with manual controls would make such attacks unfeasible in the near future. He also said that nation states that might have the skills to pull off such an attack lack the motive at this point.

    “We judge that there is a remote chance of a major cyber attack against U.S. critical infrastructure systems during the next two years that would result in long-term, wide-scale disruption of services, such as a regional power outage,” Clapper said in his statement to the committee. “The level of technical expertise and operational sophistication required for such an attack — including the ability to create physical damage or overcome mitigation factors like manual overrides — will be out of reach for most actors during this time frame. Advanced cyber actors — such as Russia and China — are unlikely to launch such a devastating attack against the United States outside of a military conflict or crisis that they believe threatens their vital interests.”

Leave a Reply

Your email address will not be published. Required fields are marked *