Is your car spying on you?
Unlike many other devices, cars are not prefixed with the word smart. Even if they’re connected to the internet—and have the ability to collect...
Want to trade crypto? Here are the top 5 exchanges to try your hand
To buy Bitcoin or other cryptocurrencies, you have multiple options. You can go to a Bitcoin ATM, accept them as payments for your goods...
Interview: Meet the person protecting human rights activists amid mass surveillance
Front Line Defenders’s Mohammed Al-Maskati has spent most of his life fighting for human rights in Bahrain and the Middle East. But in recent...
Cryptojacking: What is it and how do I guard against it?
The term “cryptocurrency,” a combination of “cryptography” and “currency,” alludes to the fact that cryptocurrencies are a form of digital money that uses cryptographic...
How technology affects education
Technology in education systems comes with a couple of significant obstacles, but as with previous technologies, also presents some opportunities that we would be...
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues...
Staying private online could save you big bucks
By far the biggest offenders when it comes to mining your data are not governments or police, but rather advertising agencies. They will buy...
7 privacy and security takeaways in Mary Meeker’s Internet Trends Report
The biggest slide deck about the internet is back! Mary Meeker’s Internet Trends Report has highlighted important online observations since 1995, and this year’s...
Why do I need a VPN?
A VPN is a clever bit of software that masks the IP address of any device you install it on.
In simple terms: When you...
How to set up your own home server
This guide requires you to use the command line interface, or CLI, and an SSH client. SSH (Secure Shell) is a popular tool to...