What is HTTPS and why does it matter?
- April 2, 2014
You might have seen some of our recommendations about the need to connect to websites via HTTPS whenever possible. Maybe you saw that instead of “http://facebook.com,” your browser said you were on “https://facebook.com.” Why would I be insisting that you type in that extra letter? Why would Facebook put that extra letter there without you even knowing?
Read MoreHow to secure cloud storage from providers, hackers, and surveillance
- April 1, 2014
We all know the critique that has followed cloud storage around since it was first conceived: is our stuff safe when it’s stored on the web? The truth of the matter is fairly mixed. Generally speaking, your cloud-based files are not just up for grabs. On the other hand, all prominent cloud storage providers have been hacked or have turned over user data to authorities.In an era where many people have multiple devices from which they want to access their personal files and internet speed is fast enough for easy file transfers, it makes perfect sense to store some or all of your files in the cloud.
Read MoreVideo: How to set up Firefox to protect your privacy and security
- March 30, 2014
Our latest video tutorial is all about how to configure a browser that many of you already are familiar with and use in a way that makes you safer online.
Read MoreMicrosoft gives up right to read your emails with new policy
- March 28, 2014
We reported not even week ago that Microsoft read a user’s email and messenger chats as they investigated a former employee who leaked company secrets. This caused quite a stir, since Microsoft and its main competitors, like Google and Yahoo, spelled out clearly in their privacy policies that they could do this. Starting immediately, Microsoft will keep your emails private unless there is a search warrant for a particular account.
Read MoreBest web browsers for privacy and anonymity
- March 27, 2014
Your web browser can open you up to all kinds of security risks, even as you change your browsing habits for the better. While some of the mainstream browsers can be configured to protect your privacy, some people either want something stronger or something simpler. With that in mind, we have your best web browsers for privacy and anonymity online.
Read MoreIntroducing the Getting Things Tech Privacy Toolkit
- March 24, 2014
Today, it is no secret that the World Wide Web has become a dangerous place for one’s privacy. Between government surveillance, corporate data gathering, and increasingly sophisticated hackers, there are just too many threats for the average person to contend with. We are going to do something about that.
Read MorePractically every email provider can and will read your emails
- March 22, 2014
The tech blogosphere went haywire Friday as news broke that Microsoft read a French blogger’s emailsĀ and instant messages to root out an internal leaker. This is, in fact, perfectly legal. Why? Every user consents to this when they agree to the terms of use. The right to read its users emails is a right claimed by far more than just Microsoft, too.
Read MoreHow to secure your passwords with LastPass
- March 22, 2014
A lot of our privacy and security content makes an important assumption. That assumption is that nobody can get into your account without breaking through some sort of protective measures, meaning you are only vulnerable due to either your activities or security holes on the web. The truth is, though, bad passwords are much more often your personal security’s weakest link.
Read MoreGmail will now encrypt your emails to protect you from NSA
- March 20, 2014
According to the Official Gmail Blog, Google is taking new measures to protect your email data from snooping. They said that adding new security measures were “a top priority after last summer’s revelations,” referring to the widely reported NSA surveillance, which included intercepting emails sent via Gmail.
Read MoreVideo: How to fake your location on Android
- March 19, 2014
Anyone interested in privacy has probably felt a little uncomfortable about carrying a GPS-enabled device in their pocket all day. You can learn how to fake your location on Android to throw the scent off your trail, be it precautionary, a way to get around blackouts and censorship, or something else entirely.
Read MoreSearch
Recent Posts
- Make Prism.js show line numbers by default (without CSS classes)
- Hemingway App 3.0 update review: A gimmick becomes a real app
- Hugo vs. WordPress page load speed comparison: Hugo leaves WordPress in its dust
- Hemingway App 2.0 update: A worthwhile update comes with unfortunate price hike
- How to view academic journal articles off campus using your library's proxy
categories
Support This Site
Bitcoin Donations:18DP9TGdPN5usTKMRMfPk6Q2mSr4mAz8NJ
Litecoin Donations:
LPKQbDPykwjXr5NbXfVVQH9TqM5C497A16