Internet privacy

A crowd hold their phones aloft.

The most secure messaging apps in 2019

6 min read
From WhatsApp to Snapchat, messaging apps provide a free and easy service to communicate with friends, family, and co-workers. Without...
A representation of the lines a computer makes across a face when trying to search for identifying features.

Infographic: The rise of facial recognition in airports

1 min read
In a recent post, we spotlighted the growing use of face scans as a form of identification in airports,...
The icon often used to portray an image gallery, but with the icon often used to portray a lock in the position where notifications usually pop up (the bottom right).

How to make your photos more private on social media

3 min read
“A picture is worth a thousand words,” so the old adage goes. Today, with virtually all photos taken digitally and in higher quality, they...
Facilities and services of a smart city

What are smart cities?

4 min read
The words “smart city” are practically a foolproof conversation starter these days. Around the world, cities are implementing IoT devices, sensors, and other components...
An illustration of a road warning sign that says "Convenience".

As we rush toward convenience, say so long to privacy

5 min read
We’re all guilty of the same thing. In our rush to download and install apps, we carelessly breeze through all the necessary permissions without even...
Red fist with cascadings numbers.

3 things activists can do to strengthen their privacy and security

1 min read
Plummeting press freedoms, stifled internet access, attempts to subvert encryption, and plenty of other indicators point to a budding reality: Government institutions are getting...
Browser with boxes containing different types of browsing activity.

You should be compartmentalizing your browsers. Here’s how it works.

2 min read
We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish to target us for their...
An illustration of a CA certificate.

What is a CA certificate, and how does it work?

3 min read
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to decrypt all content and communications...
Profile of a man whose face has identifiable information about him.

Anonymized demographic data can still be used to identify you

4 min read
If you’re one of the few people who read terms of service, you may find buried in various companies’ privacy policies a clause saying...
An illustration of a shredder shredding a terms of service document.

Study confirms less than 20% always read terms of service

2 min read
If you frequently click ‘I agree’ with regards to companies’ terms of service (ToS) without actually reading them, you’re not alone. A new study...
Red circular record button.

Siri and Alexa train their AI with your voice. Here’s how to delete that...

5 min read
If you’ve ever said “Hey” to Alexa, or an “OK” to Google, chances are your voice has been recorded and transcribed to improve their...
The Kazakhstan flag, except with a padlock where the sun should be.

How to stop the Kazakhstan government from intercepting your internet traffic

2 min read
Update: The Kazakh government has halted its CA plans for now. If you previously installed the certificate, make sure it has been thoroughly removed...

Latest Posts

Featured Posts

Live Chat