Privacy Basics

Whenever you send or receive information on the Internet, it passes through a network of multiple computers to reach the destination. Historically, any of these computers could read your data, because it was not encrypted. Much of this data is quite
This article takes you through all the factors to consider when moving to a new email provider and leaving privacy-invasive companies such as Gmail, Outlook, and Yahoo Mail. Switching your email provider may feel as difficult as moving to a new hous
Many companies that handle personal information reassure their users by saying that all the data is “anonymized.” If you don’t know any better, that sounds reassuring. However, the method most companies use to anonymize data and the size of modern d
As the world is grappling with a sharp rise in the number of COVID-19 cases, fraudsters are trying to capitalize on the state of panic and even the goodwill of others. More than 1,400 coronavirus-related domains were registered over the past three m
Working from home is one of the many massive societal changes that COVID-19 has forced upon the world. Millions of people are now handling sensitive work data outside their office for the first time. It can be hard enough to keep data secure in the o
  • Privacy Basics
  • Privacy Deep Dives
The Internet of Things has come a long way since the turn of the century when it was a buzzword used by futurists and entrepreneurs. Although not yet as ubiquitous as some predicted a decade ago, Internet-connected devices have crept into many aspect
Biometric authentication is a growing part of the tech landscape — it’s in our schools, offices, airports, government buildings, and more recently, in our smartphones. Apple’s introduction of Touch ID in 2013 has paved the way for fingerprint-, face-
The smartphone is one of the most invasive devices ever invented. It’s easy to forget that, of course, because we are so familiar with them, and they are so useful. But while you might value your smartphone for the convenience it gives you, tech comp
This post has been completely refreshed on November 28, 2022 Your web browser is your window into the online world. On desktop PCs and laptops, it’s your primary means of accessing the world wide web and other internet services.  Thanks to the popu
UPDATE Aug. 3, 2020: Cybersecurity experts discovered a new vulnerability that allows access to the private encryption keys stored in old versions of Apple’s Secure Enclave chips. The Secure Enclave chip is a security feature that protects the privat
Earlier this year, security researchers discovered a fire sale taking place on the dark web: 2.2 billion usernames and passwords that had been stolen in data breaches and compiled into a multi-volume database dubbed as Collection #1-5. With so many