Privacy guides
USB peripherals (commonly known as “flash drives”), memory cards, and external
hard drives all make backing up and sharing your data simple. And they are
becoming more critical as modern-day schooling, work, and life are increasingly
awash in data. B
- Privacy guides
From Hong Kong to Minneapolis, protesters around the world are standing up for
their human rights. The right to peaceful assembly and protest are bedrocks of
democracy, and we support everyone’s ability to exercise these rights. We
created Proton Mai
- Privacy guides
Learn all about TLS/SSL certificates, the digital files that help to
authenticate and secure data transfers across the internet.
Whenever you send or receive information on the internet, it passes through a
network of multiple computers to reach th
- Privacy guides
This article takes you through all the factors to consider when moving to a new
email provider and leaving privacy-invasive companies such as Gmail, Outlook,
and Yahoo Mail.
Switching your email provider may feel as difficult as moving to a new hous
Nearly all public health experts say we will have to employ testing and tracing
on a massive scale to combat the spread of COVID-19. This has led a number of
countries and tech companies to develop coronavirus contact tracing apps for
smartphones. Th
- Privacy guides
Many companies that handle personal information reassure their users by saying
that all the data is “anonymized.” If you don’t know any better, that sounds
reassuring.
However, the method most companies use to anonymize data and the size of modern
d
- Privacy guides
As the world is grappling with a sharp rise in the number of COVID-19 cases,
fraudsters are trying to capitalize on the state of panic and even the goodwill
of others.
More than 1,400 coronavirus-related domains were registered over the past three
m
- Privacy guides
During this American presidential election campaign season, politicians have
scored points calling out tech companies for abusing the personal data of their
users. Yet many political campaigns are engaged in very similar practices.
Political campai
- Privacy guides
Cryptojacking made headlines back in 2017 when hackers hit a series of high
profile websites (including several operated by the UK and Australian
governments).
Whenever somebody visited an infected site, the hackers were able to hijack the
visitor’s
- Privacy guides
The Internet of Things has come a long way since the turn of the century when it
was a buzzword used by futurists and entrepreneurs. Although not yet as
ubiquitous as some predicted a decade ago, Internet-connected devices have crept
into many aspect
- Privacy guides
Biometric authentication is a growing part of the tech landscape — it’s in our
schools, offices, airports, government buildings, and more recently, in our
smartphones. Apple’s introduction of Touch ID in 2013 has paved the way for
fingerprint-, face-