-
Tor outage: How a major attack felled the onion network
On 10 January 2021, the Tor Network experienced what appears to be a DDoS attack on its core infrastructure, causing users to be unable to use the Tor Browser, with most Version 3 onion sites becoming...
-
Upgrading Bitcoin, Part 2: A challenging process
Previously we discussed why upgrading Bitcoin is so difficult. Bitcoin is a network that’s reliant on full consensus of all participants, so it is notoriously difficult and often highly controversia...
-
Upgrading Bitcoin, Part 1: The pitfalls of hard forks and soft forks
The Bitcoin protocol is known for developing slowly, favoring predictability and compatibility over the prevalent Silicon Valley ethos of “move fast and break things.” Indeed, the Bitcoin network ...
-
Why more apps should integrate Tor
Tor is most known for its anonymous browser. The Tor browser is built on Firefox and customized to defend against the most common forms of tracking as well as malicious code on the sites you visit. Al...
-
Download Android apps anonymously via the Aurora Store
Editor’s note: This is part of our series on alternatives to Big Tech. Read our posts on installing LineageOS on your phone and downloading apps for it from F-Droid. We previously detailed our exper...
-
Lightning Network: A better way to pay with Bitcoin
The Lightning Network has been highly anticipated by Bitcoin enthusiasts for years. As a separate network it promises to make Bitcoin payments faster and cheaper while not compromising the security of...
-
Installing apps on LineageOS for greater privacy
Editor’s note: This is part of our series on alternatives to Big Tech. Read our previous post on installing LineageOS, and learn about getting Android apps from the Aurora Store. Previously we insta...
-
How to turn off browsing history
Your browsing history is a record of all the sites you have visited. This history can also include which email addresses you’ve used to log in to your accounts and what information you’ve filled i...
-
What is metadata and what does it mean?
In the context of privacy, we often talk about metadata as a weak link. While data can be easy to hide and encrypt, metadata is often far more difficult to conceal. Metadata is data about data. For ex...
-
Quick biography: Chelsea Manning
Chelsea Manning’s disclosure of hundreds of thousands of confidential military and U.S. state documents resulted in a 35-year prison sentence. Yet without her whistleblowing, the world might never h...