Filter Posts
3 things activists can do to strengthen their privacy and security
For whatever cause you’re fighting, it is more important than ever now to make sure you’re doing so privately and securely.
Interview: Meet the person protecting human rights activists amid mass surveillance
Front Line Defenders’s Mohammed Al-Maskati has spent most of his life fighting for human rights in Bahrain and the...
You should be compartmentalizing your browsers. Here’s how it works.
We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish...
Your devices are rating you. Behave accordingly.
In a world judged by social media, a low score makes everyday life difficult. You can’t rent a car, book a hotel, or pay for flights.
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to...
Anonymized demographic data can still be used to identify you
If you’re one of the few people who read terms of service, you may find buried in various companies’...
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not....
11 massive government data breaches
We hear about private companies getting hacked or exposing customer data, but government records are equally at risk of a breach.
Study confirms less than 20% always read terms of service
If you frequently click ‘I agree’ with regards to companies’ terms of service (ToS) without actually reading them, you’re...
Siri and Alexa train their AI with your voice. Here’s how...
If you’ve ever said “Hey” to Alexa, or an “OK” to Google, chances are your voice has been recorded...