Vie privée, approfondissements

What is AirTag stalking?
en
  • Vie privée, approfondissements
In an era of “smart devices” that often double as spy devices, AirTags are tracking tools that are open about their function and can be vital in helping locate lost items (as anyone who has lost their car keys can attest to). However, as a recent cla
how to flush dns blog
en
  • Vie privée, approfondissements
A DNS cache is a record of all the websites you’ve visited over a set amount of time. Simply put, your DNS cache is a list of websites you visited in the past that’s stored on your device. Your computer uses it to speed up visits to those same websit
Open source apps like Zoom
en
  • Vie privée, approfondissements
We already shared our top picks when it comes to private YouTube alternatives and private WhatsApp alternatives. Now, we take a detailed look at the best free Zoom alternatives that respect your privacy. Zoom is a video-conferencing platform that be
What does private DNS mean?
en
  • Vie privée, approfondissements
DNS translates human-friendly domain names to computer-friendly IP addresses. Private DNS encrypts DNS queries made by your device to a DNS server. When used with a third-party DNS service that respects your privacy, private DNS can improve your onli
We look at privacy-friendly apps like YouTube and websites like YouTube
en
  • Vie privée, approfondissements
In this article, we look at the best YouTube alternatives out there. We look at both alternative YouTube frontends that allow you to watch YouTube videos without Google tracking you, and true alternative streaming sites that offer content with no con
en
  • Vie privée, approfondissements
An evil twin attack is a cyberattack that occurs when an attacker  sets up a malicious WiFi network that mimics a legitimate one, often in public places like coffee shops, airports, or hotels.  This rogue WiFi network is the “evil twin” of a legitim
en
  • Vie privée, approfondissements
ChaCha20 is a performant and lightweight, yet highly secure, 256-bit stream cipher used to encrypt and decrypt data. It’s often used to secure data transmitted online, such as emails, messages, web traffic, and files being uploaded to the cloud.  Yo
en
  • Vie privée, approfondissements
Freenet is a decentralized, encrypted, open-source dark web designed to let you communicate with others, upload and download content, and access online information anonymously.  Learn more about the different dark webs * What’s in a name?  * What
en
  • Vie privée, approfondissements
Last month, Google launched a new feature for Chrome called IP Protection that makes it easier for the company to spy on you. No surprise, since this is Google’s business model. But what’s concerning is that Google is marketing this as a privacy feat
en
  • Vie privée, approfondissements
WiFi is the technology that lets you wirelessly connect your computer or mobile device to the internet. As with any connection on a network, there are ways for hackers to intercept the signal to steal data or manipulate the transmission. WPA3 is the
en
  • Vie privée, approfondissements
Perfect forward secrecy (PFS) is a cryptographic feature of internet communication protocols that ensures even if a session is compromised, past and future sessions remain secure. It achieves this by using a new and unique private encryption key for