Privacy deep dives

  • Privacy deep dives
Countries across the globe are rolling back freedom of speech and freedom of the press, including on the Internet. While the Internet was once a symbol of the freedom of the press, a place where free speech and information were impossible to restrict
  • Privacy deep dives
When people think of tech companies, they typically think of Silicon Valley. This is where some of the biggest tech companies got their start and its where most of them have their headquarters. This is no accident. The available talent in the US, the
  • Privacy deep dives
The Snowden revelations revealed that the NSA is carrying out electronic surveillance on a global scale and unveiled the shadowy networks of intelligence agencies that act as accomplices. When people think of mass surveillance, they rightly think of
  • Privacy deep dives
On Monday, the Australian government introduced the Assistance and Access Bill 2018. This bill would give law enforcement authorities new tools to pressure telecommunication and tech companies into complying with government requests to grant access t
An illustration of Tor over VPN.
  • Privacy deep dives
Tor is a powerful privacy tool, but you may not want to use Tor all by itself. Learn why you may want to connect to Tor over a VPN. When you connect to the Internet, especially if you’re using public WiFi, there’s a good chance people are watching y
  • Privacy deep dives
Net neutrality in the United States is officially out. The FCC’s repeal of a 2015 law enshrining Internet neutrality took effect on Monday. The Internet was always meant to be a free and open place. You could say anything you want, read and watch an
  • Privacy deep dives
VPNs keep your online activity private and unrestricted. Some countries with repressive governments have outlawed VPNs in an attempt to maintain control. Using a VPN helps you to evade all but the most sophisticated efforts to regulate the internet
wifi vulnerability vpn krack
  • Privacy deep dives
SECURITY RESEARCHERS HAVE DISCOVERED A VULNERABILITY IN THE WPA2 PROTOCOL WHICH ALLOWS FOR VIRTUALLY ANY WIFI NETWORK TO BE HACKED, POTENTIALLY LEAKING SENSITIVE DATA. When you connect to a password protected WiFi network, you probably think that yo
  • Privacy deep dives
IN THIS ARTICLE, WE ANALYZE THE VPN THREAT MODEL. THIS COVERS THE THREATS A VPN IS DESIGNED TO GUARD AGAINST, AND ALSO THE THREATS A VPN CANNOT COUNTER. We believe that the only thing worse than no security, is a false sense of security. For this re