Latest articles

en
- Privacy deep dives
Ewin attacks used to be a menace on public WiFi networks, but the widespread
adoption of HTTPS has drastically reduced the risk.

en
- Privacy deep dives
ChaCha20 is a performant and secure stream cipher. Combined with the Poly1305
message authentication code, it secures data for the WireGuard protocol.

en
- Privacy deep dives
Freenet is a decentralized, encrypted, open-source dark web notable for the
ability to create closed and almost undetectable “darknets”.

en
- Privacy basics
A keylogger is either a piece of software or a hardware device that records
input from your device’s keyboard.

en
- Privacy deep dives
Google’s new feature for its Chrome browser claims to help mask your identity,
but the company’s business model is incompatible with privacy.

en
- Privacy basics
We discuss how to change the external and local IP addresses of your Windows
device.

en
- Privacy deep dives
WPA3 is the latest security standard for keeping your WiFi connections secure,
and a great improvement over its aging predecessor (WPA2).

en
- Proton VPN news
The new Proton VPN Linux app is rebuilt from the ground up to be efficient,
elegant, and modular in design.

en
- Privacy deep dives
Perfect forward secrecy ensures that even if an internet session is compromised,
past and future sessions remain secure.

en
- Privacy deep dives
A zero-day is a previously unknown software vulnerability. A zero-day exploit is
a cyberattack that takes advantage of a zero-day.

en
- Privacy deep dives
IKEv2 is a VPN protocol used to secure a VPN connection. Part of the IPsec
protocol suite, it is sometimes referred to as IKEv2/IPsec.