-
Meet Federico Tenga: The guy who teaches North Koreans about Bitcoin
Despite being the most hermetic country on Earth, North Korea is certainly no stranger to cyberspace—in both its uses and abuses. Despite a tiny local internet user base and just a few dozen local w...
-
Five myths that the NSA wants you to believe about FISA 702
UPDATE: January 19, 2018 On January 18, the Senate officially voted to reauthorize FISA Section 702 in a 65-34 vote. The President will almost certainly sign the bill, and the program that has enabled...
-
USA Liberty Act passes House Judiciary Committee despite privacy concerns
A terrifying new law that could change the scope of mass surveillance just passed another hurdle. On November 8th, the U.S. House Judiciary Committee introduced the USA Liberty Act with overwhelming 2...
-
An interview with Mark Burdon on the sensor society phenomenon
Our devices, as convenient as they may be, are getting creepily good at collecting data. Phones, cars, and even carpets are packed full of sensors that can detect and record day-to-day activities with...
-
3 cryptocurrencies that care about your privacy
Bitcoin is not perfectly anonymous. While it's true that you don’t have to connect your real name or phone number to a Bitcoin transaction, there are multiple ways to de-anonymize your account. Ever...
-
7 times the internet was gloriously ridiculous
The internet is a very silly place indeed, and only a fool would wander through its murky shores unprotected. To celebrate my not-quite-100th blog post, I thought it might be fun to showcase some of t...
-
6 features we actually want on our iPhones
This article was originally published on October 27, 2017. New phones are exciting. They bring new features, make existing features more powerful and get us excited about spending half a month’s wag...
-
An interview with Bruce Schneier on the Internet of Things, global surveillance, and cybersecurity
Bruce Schneier is a world-renowned cryptographer and security technologist whom the Economist has dubbed an “internet-security guru.” Schneier has authored a dozen books since 1993, with his next ...
-
What is the WPA2 Wi-Fi Encryption Vulnerability and how does it affect you?
WPA2 is a popular standard used to set up Wi-Fi networks and is most commonly used to authenticate users with a password but can also handle more sophisticated authentication schemes using usernames, ...
-
Technical Overview: Preventing DNS Leaks When Switching Network Interfaces
To effectively offer a user privacy and security, a VPN application must ensure that a user’s DNS requests remain private for the entire duration of the connection to the VPN. Applications usually d...
Featured
