-
Want to trade crypto? Here are the top 5 exchanges to try your hand
To buy Bitcoin or other cryptocurrencies, you have multiple options. You can go to a Bitcoin ATM, accept them as payments for your goods and services, buy them peer-to-peer or from a brokerage. The mo...
-
Why you can't judge a VPN by its server count
When it comes to choosing a VPN company, there are many things you'll want to take into account, such as do they provide good speeds? Do they have apps for all my devices? And are they well known and ...
-
As we rush toward convenience, say so long to privacy
We’re all guilty of the same thing. In our rush to download and install apps, we carelessly breeze through all the necessary permissions without even a second glance. Facebook wants to record audio?...
-
3 things activists can do to strengthen their privacy and security
This article was originally published on September 6, 2019. Plummeting press freedoms, stifled internet access, attempts to subvert encryption, and plenty of other indicators point to a budding realit...
-
Interview: Meet the person protecting human rights activists amid mass surveillance
Front Line Defenders’s Mohammed Al-Maskati has spent most of his life fighting for human rights in Bahrain and the Middle East. But in recent years, human rights activists have increasingly faced th...
-
You should be compartmentalizing your browsers. Here’s how it works.
We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish to target us for their financial and political gain. Incognito mod...
-
Your devices are rating you. Behave accordingly.
This post was originally published on August 15, 2019. Chances are you’ve seen “Nosedive,” the infamous Black Mirror episode depicting a world in which ordinary people rate each other on the bas...
-
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to decrypt all content and communications in a man-in-the-middle attac...
-
Anonymized demographic data can still be used to identify you
If you’re one of the few people who read terms of service, you may find buried in various companies’ privacy policies a clause saying that they may collect and sell your data to third parties. The...
-
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues coins, and nobody who can take them back. Nobody knows how...
Featured
