What is HTTPS and why does it matter?

  • April 2, 2014

You might have seen some of our recommendations about the need to connect to websites via HTTPS whenever possible. Maybe you saw that instead of “http://facebook.com,” your browser said you were on “https://facebook.com.” Why would I be insisting that you type in that extra letter? Why would Facebook put that extra letter there without you even knowing?

Read More

How to secure cloud storage from providers, hackers, and surveillance

  • April 1, 2014

We all know the critique that has followed cloud storage around since it was first conceived: is our stuff safe when it’s stored on the web? The truth of the matter is fairly mixed. Generally speaking, your cloud-based files are not just up for grabs. On the other hand, all prominent cloud storage providers have been hacked or have turned over user data to authorities.In an era where many people have multiple devices from which they want to access their personal files and internet speed is fast enough for easy file transfers, it makes perfect sense to store some or all of your files in the cloud.

Read More

Video: How to set up Firefox to protect your privacy and security

  • March 30, 2014

Our latest video tutorial is all about how to configure a browser that many of you already are familiar with and use in a way that makes you safer online.

Read More

Microsoft gives up right to read your emails with new policy

  • March 28, 2014

We reported not even week ago that Microsoft read a user’s email and messenger chats as they investigated a former employee who leaked company secrets. This caused quite a stir, since Microsoft and its main competitors, like Google and Yahoo, spelled out clearly in their privacy policies that they could do this. Starting immediately, Microsoft will keep your emails private unless there is a search warrant for a particular account.

Read More

Best web browsers for privacy and anonymity

  • March 27, 2014

Your web browser can open you up to all kinds of security risks, even as you change your browsing habits for the better. While some of the mainstream browsers can be configured to protect your privacy, some people either want something stronger or something simpler. With that in mind, we have your best web browsers for privacy and anonymity online.

Read More

Introducing the Getting Things Tech Privacy Toolkit

  • March 24, 2014

Today, it is no secret that the World Wide Web has become a dangerous place for one’s privacy. Between government surveillance, corporate data gathering, and increasingly sophisticated hackers, there are just too many threats for the average person to contend with. We are going to do something about that.

Read More

Practically every email provider can and will read your emails

  • March 22, 2014

The tech blogosphere went haywire Friday as news broke that Microsoft read a French blogger’s emailsĀ and instant messages to root out an internal leaker. This is, in fact, perfectly legal. Why? Every user consents to this when they agree to the terms of use. The right to read its users emails is a right claimed by far more than just Microsoft, too.

Read More

How to secure your passwords with LastPass

  • March 22, 2014

A lot of our privacy and security content makes an important assumption. That assumption is that nobody can get into your account without breaking through some sort of protective measures, meaning you are only vulnerable due to either your activities or security holes on the web. The truth is, though, bad passwords are much more often your personal security’s weakest link.

Read More

Gmail will now encrypt your emails to protect you from NSA

  • March 20, 2014

According to the Official Gmail Blog, Google is taking new measures to protect your email data from snooping. They said that adding new security measures were “a top priority after last summer’s revelations,” referring to the widely reported NSA surveillance, which included intercepting emails sent via Gmail.

Read More

Video: How to fake your location on Android

  • March 19, 2014

Anyone interested in privacy has probably felt a little uncomfortable about carrying a GPS-enabled device in their pocket all day. You can learn how to fake your location on Android to throw the scent off your trail, be it precautionary, a way to get around blackouts and censorship, or something else entirely.

Read More
Search
Support This Site
Bitcoin Donations:

Litecoin Donations: