-
What is cybertorture? How our minds are vulnerable to online experiences
What will change if we are forced to move our social circle to virtual lands, browse the web anonymously, and stay permanently at home? Will there still be any crime? Will nations still exist, and wil...
-
8 anti-spam techniques your email uses to prevent spam
It’s difficult to define exactly what constitutes email spam. What might be a useful newsletter to one person could be unwanted advertising to another, and a welcome business opportunity will be ill...
-
Global Internet and Social Media Censorship Report, 2020
NOTE: This post was originally published on January 24, 2020 Around the world, internet censorship remains a popular tool of authoritarian governments to prevent information from spreading, to stop pe...
-
Facebook’s cryptocurrency has governments scrambling
There are over 2,000 cryptocurrencies, tokens, and blockchain instruments commonly traded on more than 250 platforms around the world. Some of these currencies are created by pseudonymous individuals ...
-
Is your car spying on you?
Unlike many other devices, cars are not prefixed with the word smart. Even if they’re connected to the internet—and have the ability to collect and sell your data to third parties. And yet, thatâ€...
-
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to decrypt all content and communications in a man-in-the-middle attac...
-
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues coins, and nobody who can take them back. Nobody knows how...
-
How to stop the Kazakhstan government from intercepting your internet traffic
Update: The Kazakh government has halted its CA plans for now. If you previously installed the certificate, make sure it has been thoroughly removed from your system, and let us know if you encounter ...
-
9 things you can do with a home server
Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted into a server without any physical modifications, and even a modest d...
-
Staying private online could save you big bucks
By far the biggest offenders when it comes to mining your data are not governments or police, but rather advertising agencies. They will buy up your credit card history from your bank, embed trackers ...