Privacy deep dives

  • Privacy deep dives
A zero-day is a software vulnerability or security flaw in a computer system that its developers or vendors are unaware of. The term zero-day (also known as 0-day) refers to the fact that, since the developer or vendor is unaware of the vulnerability
  • Privacy deep dives
IKEv2 is a VPN protocol used to secure VPN connections. Part of the IPSec protocol suite, it is sometimes (and strictly speaking, more correctly) referred to as IKEv2/IPSec. A VPN protocol is a set of instructions or rules that determine how the con
  • Privacy deep dives
“Amazon and third parties (including advertising and tracking services) collect smart speaker interaction data. We find that Amazon processes voice data to infer user interests and uses it to serve targeted ads on-platform (Echo devices) as well as o
  • Privacy deep dives
WireGuard® is a new VPN protocol used to secure the connection between your device and a VPN server.  Learn more about how VPNs work WireGuard uses state-of-the-art cryptography to keep your connection secure and is extremely lightweight. This make
  • Privacy deep dives
A VPN protocol is the set of instructions that your VPN app uses to set up, secure, and govern your connection to a VPN server. OpenVPN is a VPN protocol that has no known weaknesses and is effective at bypassing certain online censorship methods. Op
  • Privacy deep dives
An internet service provider (ISP) is the company that connects you to the internet, resolves domain names, routes internet traffic, and is responsible for helping to maintain the network infrastructure that makes the internet possible.  The term in
  • Privacy deep dives
China is infamous for its internet censorship program, widely known as the Great Firewall of China (GFW).   In this article, we look at what the GFW is and how it prevents citizens of mainland China from accessing the free and open internet. * Wha
  • Privacy deep dives
Deep packet inspection (DPI) is a method of examining data packets that pass through a network so that the traffic type can be identified. This information can then be used to block unwanted traffic.  The technique is commonly used in firewalls, int
  • Privacy deep dives
Your iPhone is a powerful computer that is likely a (if not the) primary way you access the internet. As such, it is vital to ensure your iPhone is secure, and that your privacy is protected. Fortunately, there are some easy steps you can take to “ha
  • Privacy deep dives
VPNs are useful for many things, and when used properly, can protect you from being tracked in several ways: * Websites can’t track you using your real IP address * Your internet service provider (ISP) can’t track what you do on the internet * Yo
  • Privacy deep dives
The dark web has an entirely justifiable reputation for being a place where bad things happen. However, the fact that it’s almost impossible to censor the dark web also makes it invaluable for accessing legitimate content that might otherwise be cens