Approfondimenti sulla privacy

Illustration of Google VPN data collection
en
  • Approfondimenti sulla privacy
If there has ever been a year that demonstrates how central the internet is to society, it is 2020. We have relied on the internet this year for work, entertainment, and to keep us close to family. But the freedom and privacy of the internet are unde
en
  • Approfondimenti sulla privacy
On May 14, the Senate reauthorized the USA Freedom Act, which extends the expansive domestic surveillance powers contained in the Patriot Act.  The original Freedom Act had expired in March. Now that it has been reauthorized, it grants the FBI (and
en
  • Approfondimenti sulla privacy
> UPDATE August 2023: Additional vulnerabilities have been discovered in Apple’s > VPN framework. > > UPDATE Oct. 13, 2022: Reports indicate that Apple has not fixed the problem in > iOS 16. UPDATE Aug. 18, 2022: Recent testing has shown that while
An illustration of the Amazon Ring network monitoring a neighborhood.
en
  • Approfondimenti sulla privacy
Internet companies already follow your every move online: Now they are partnering with law enforcement to bring that same level of surveillance to the physical world. Amazon Ring, the creator of a popular camera-equipped doorbell, has entered into se
Fitness and health apps collect sensitve data that they often expose or share with third parties.
en
  • Approfondimenti sulla privacy
This post was updated on November 1, 2019. Fitness and health apps are designed to help you record and quantify how much you exercise, what prescription drugs you take, even what birth control methods you use. While these apps can help improve your
Individuals can download their favorite movies and music in Switzerland.
en
  • Approfondimenti sulla privacy
Switzerland has taken a liberal approach to copyright law, generally allowing citizens to use copyrighted material for personal use (some exceptions may apply). This has made peer-to-peer (P2P) file-sharing sites popular in Switzerland. It has also
ProtonVPN VPN Protocol OpenVPN WireGuard IKEv2 PPTP L2TP
en
  • Approfondimenti sulla privacy
This article has been updated to include the WireGuard and Stealth VPN protocols. WE EXPLAIN WHAT A VPN PROTOCOL IS AND WHAT IT DOES. WE ALSO COMPARE THE STRENGTHS AND WEAKNESSES OF THE MOST COMMON PROTOCOLS, INCLUDING OPENVPN, WIREGUARD, IKEV2, PP
safe VPN HMAC authentication sha-384
en
  • Approfondimenti sulla privacy
We explain what “HMAC SHA-384” means and how it contributes to a safe VPN. Unless users understand what these technical terms mean, they cannot make an informed decision. Edit: this article was updated to more accurately reflect the security SHA-384
ProtonVPN Article 13
en
  • Approfondimenti sulla privacy
THE EUROPEAN PARLIAMENT PASSED A NEW COPYRIGHT DIRECTIVE CONTAINING THE CONTROVERSIAL ARTICLE 13, THE SO-CALLED “MEME BAN.” PROTON VPN IS COMMITTED TO HELPING MITIGATE THE NEGATIVE EFFECTS OF THIS LAW ON INTERNET FREEDOM. On Tuesday, the Directive o
en
  • Approfondimenti sulla privacy
TOR IS A FREE, GLOBAL NETWORK THAT LETS YOU BROWSE THE INTERNET AND THE DARK WEB ANONYMOUSLY. THERE ARE, HOWEVER, A FEW THINGS YOU NEED TO KEEP IN MIND TO USE TOR SECURELY. As online surveillance becomes more and more prevalent, tools that can help
Internet of things, smart devices, smart speakers, smart home devices
en
  • Approfondimenti sulla privacy
SCIENCE FICTION HAS OFFICIALLY ARRIVED. SMART SPEAKERS AND THEIR DIGITAL ASSISTANTS ARE HERE, CONSTANTLY LISTENING TO YOU, WAITING TO RESPOND TO YOUR REQUESTS. YET THEY ARE LESS LIKE HELPFUL BOTS AND MORE LIKE DILIGENT STENOGRAPHERS, COMPILING COMPRE