Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Email Security

A Russian Military Hacking Group May Be Reading Your Email Messages

The U.S. National Security Agency says the same Russian military hacking group that interfered in the 2016 presidential election and unleashed a devastating malware attack the following year has been exploiting a major email server program since last August or earlier. The NSA did not say who the Russian military hackers have targeted. But senior U.S. intelligence officials have warned in recent months that Kremlin agents are engaged in activities […]

Continue Reading →

Keep Your Email Address Safe From Hackers and Trackers

The Firefox web browser is adding a feature that will make an email alias with 1 click, and keep your address to yourself. It will hide your real email address from advertisers and spam operators when filling in online forms. The service entered testing last month and is currently in a closed beta, with a public beta currently scheduled for later this year. Private Relay will be available as a […]

Continue Reading →

Senate Bill Sparks Open War Over Encryption

Another stupid piece of legislation has been introduced into the U.S. Senate that proposes to cripple all encryption methods used by the American public. The misnamed EARN IT Act — which is sponsored by Judiciary Committee Chairman Lindsey Graham (R-S.C.) and ranking Democrat Dianne Feinstein (Calif.) plus eight other sponsors and co-sponsors — doesn’t actually target encryption directly. Instead, it claims to fight child pornography. The legislators sponsoring this bill […]

Continue Reading →

Russians Hack FBI Communications System

The FBI and other law enforcement agencies want to have “backdoors” installed in all encrypted files and messages online. That is so the law enforcement agencies can spy on everyone and (hopefully) identify criminals. Of course, if this happens, everyone will depend upon the FBI and other law enforcement agencies to keep the information they find secret and safe from hackers, foreign governments, and other evil-doers world wide. That seems […]

Continue Reading →

Why Should You Trust ProtonMail?

An article in the Proton Mail Blog tells why this email product is highly secure and does a great job of protecting your privacy. To be sure, it is written by Proton Mail employees so it obviously is self-serving and is somewhat of a commercial for Proton Mail. Even so, it has some good information. As you read Why Should You Trust Protonmail?, you might want to mentally compare it […]

Continue Reading →

Huawei Eyes ProtonMail as It Searches for Gmail Alternative

ProtonMail is one of the best known, perhaps THE best known, provider of encrypted (private) email messages. ProtonMail is based in Switzerland where not only can the company offer encrypted services, but local laws prohibit the release of personal information or the contents of email messages sent or received by any person or corporation. (Eat your heart out CIA, FBI, the Canadian Security Intelligence Service, Australian Secret Intelligence Services, the […]

Continue Reading →

US AG Barr Demands Tech Firms Break Encryption

Some politicians simply don’t understand the legitimate needs for encryption. If they are not careful, they may get what they wish for. The latest silliness involves US Attorney General Bill Barr who told attendees of a cybersecurity conference in New York that the government should be able to spy on everyone’s secrets. You can read more at: https://zd.net/2GvDE5C. What is encryption and why is it important? Encryption, is the process […]

Continue Reading →

Pioneer Edition FreedomBox Home Server

Why would you want to run a server in your own home? There are many reasons but perhaps the most important one is that it insures a lot more privacy for you and your on-line activities. Let’s ask the opposite question: Why would you want to store your data in some company’s servers where it can be hacked by credit card thieves, identity thieves, employees of the hosting company, and […]

Continue Reading →