Filter Posts
3 things activists can do to strengthen their privacy and security
Plummeting press freedoms, stifled internet access, attempts to subvert encryption, and plenty of other indicators point to a budding...
Interview: Meet the person protecting human rights activists amid mass surveillance
Front Line Defenders’s Mohammed Al-Maskati has spent most of his life fighting for human rights in Bahrain and the...
Cryptojacking: What is it and how do I guard against it?
The term “cryptocurrency,” a combination of “cryptography” and “currency,” alludes to the fact that cryptocurrencies are a form of...
How technology affects education
Technology in education systems comes with a couple of significant obstacles, but as with previous technologies, also presents some...
6 of the biggest crypto heists of all time
When you store your money in a traditional bank, you do so because you have few other options. Of...
You should be compartmentalizing your browsers. Here’s how it works.
We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish...
Your devices are rating you. Behave accordingly.
In a world judged by social media, a low score makes everyday life difficult. You can’t rent a car, book a hotel, or pay for flights.
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to...
Anonymized demographic data can still be used to identify you
If you’re one of the few people who read terms of service, you may find buried in various companies’...
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not....