Privacy deep dives

Internet of things, smart devices, smart speakers, smart home devices
  • Privacy deep dives
Smart speakers and their digital assistants are here, constantly listening to you, waiting to respond to your requests. Yet they are less like helpful bots and more like diligent stenographers, compiling comprehensive reports of every interaction so
  • Privacy deep dives
The challenge of achieving a free and private Internet is not merely a question of infrastructure and tools, but of public attitude. That is why educating more people about cybersecurity and data privacy is so important.
  • Privacy deep dives
We wanted to learn more about our users’ privacy concerns, so we posed a series of questions that asked which types of personal data you felt were most sensitive and over 2,000 of you responded. Today, we look at how certain leaks could put more data
  • Privacy deep dives
Here are the top six countries where online freedom is compromised, and some ways you can reliably bypass censorship and safeguard your privacy.
  • Privacy deep dives
The US is a great place for many tech companies. Unfortunately, it is a poor location for any company that wishes to seriously protect privacy.
  • Privacy deep dives
A list of the Five Eyes countries of the UKUSA and other intelligence-sharing agreements, including the Nine Eyes and Fourteen Eyes.
  • Privacy deep dives
The Australian government proposed new legislation that would allow authorities to undermine end-to-end encryption and grant them “alternative-collection powers.”
  • Privacy deep dives
An easy to understand explanation of net neutrality and what it means for your online freedom.
  • Privacy deep dives
Are VPNs blocked or banned in your country? Here’s the updated list of countries that are trying to make VPNs illegal.
wifi vulnerability vpn krack
  • Privacy deep dives
Security researchers have discovered a vulnerability in the WPA2 protocol which allows for virtually any WiFi network to be hacked, exposing sensitive data.
  • Privacy deep dives
In this article, we analyze the VPN threat model. This covers the threats a VPN is designed to guard against, and also the threats a VPN cannot counter.