-
Why you can't judge a VPN by its server count
When it comes to choosing a VPN company, there are many things you'll want to take into account, such as do they provide good speeds? Do they have apps for all my devices? And are they well known and ...
-
As we rush toward convenience, say so long to privacy
We’re all guilty of the same thing. In our rush to download and install apps, we carelessly breeze through all the necessary permissions without even a second glance. Facebook wants to record audio?...
-
3 things activists can do to strengthen their privacy and security
This article was originally published on September 6, 2019. Plummeting press freedoms, stifled internet access, attempts to subvert encryption, and plenty of other indicators point to a budding realit...
-
Interview: Meet the person protecting human rights activists amid mass surveillance
Front Line Defenders’s Mohammed Al-Maskati has spent most of his life fighting for human rights in Bahrain and the Middle East. But in recent years, human rights activists have increasingly faced th...
-
You should be compartmentalizing your browsers. Here’s how it works.
We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish to target us for their financial and political gain. Incognito mod...
-
Your devices are rating you. Behave accordingly.
This post was originally published on August 15, 2019. Chances are you’ve seen “Nosedive,” the infamous Black Mirror episode depicting a world in which ordinary people rate each other on the bas...
-
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to decrypt all content and communications in a man-in-the-middle attac...
-
Anonymized demographic data can still be used to identify you
If you’re one of the few people who read terms of service, you may find buried in various companies’ privacy policies a clause saying that they may collect and sell your data to third parties. The...
-
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues coins, and nobody who can take them back. Nobody knows how...
-
11 massive government data breaches
We’re constantly hearing about data breaches lately—and it’s no wonder, given that billions of personal records are exposed every year. While the majority of cybersecurity headlines center ar...
Featured
