Filter Posts
Upgrading Bitcoin, Part 2: A challenging process
It takes time for an idea to turn into code, and that code to be deployed on the Bitcoin network. Here is how this process works.
Turn your old Android phone into a security camera
Don’t throw out your old Android phone! We’ll show you how to turn it into a DIY security camera instead.
14 cybersecurity resolutions to stay private in 2021
With the new year almost upon us, it’s time to sit down and draw up a few New Year’s...
Ranked: Top operating systems for security and privacy
We take a look at some of the most popular operating systems, including Windows 10, iOS, macOS, and Android, and rank them based on privacy and security.
5 things to do in isolation, whatever your holiday mood
Spend your socially distanced holidays the way you want, whether it’s with others or in your own company.
Why is Facebook fighting Apple’s App Store ‘privacy labels’?
Apple has started requiring apps in its App Store to provide privacy labels, which tell users what types of data the app collects and sends to third parties.
Top 12 surveillance-themed movies and shows
Our picks for some of the most entertaining movies and shows about privacy and surveillance.
Upgrading Bitcoin, Part 1: The pitfalls of hard forks and soft...
The Bitcoin network relies on strong consensus rules. These can be upgraded through forks, but it isn’t always easy.
New AI tech bodes ill for identity theft, scams, and propaganda
Artificial intelligence like GPT-3 is advancing deepfakes by imitating real faces, voices, and words. This could spell trouble for the future of humanity.
Why more apps should integrate Tor
It allows for end-to-end encrypted peer-to-peer connections on the dark web.