The challenge of achieving a free and private Internet is not merely a question
of infrastructure and tools, but of public attitude. That is why educating more
people about cybersecurity and data privacy is so important.
We wanted to learn more about our users’ privacy concerns, so we posed a series
of questions that asked which types of personal data you felt were most
sensitive and over 2,000 of you responded. Today, we look at how certain leaks
could put more data
The Australian government proposed new legislation that would allow authorities
to undermine end-to-end encryption and grant them “alternative-collection
powers.”
Security researchers have discovered a vulnerability in the WPA2 protocol which
allows for virtually any WiFi network to be hacked, exposing sensitive data.
In this article, we analyze the VPN threat model. This covers the threats a VPN
is designed to guard against, and also the threats a VPN cannot counter.