Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Online Privacy & Security

What Is Tor? Your Guide to Using the Private Browser

If you have an interest in maintaining your online privacy, you will want to read an article by Rae Hodge in the C|Net web site at https://www.cnet.com/how-to/what-is-tor-your-guide-to-using-the-private-browser/. Tor is the U.S. government’s gift to people everywhere who do not wish to be spied upon. Yes, Tor was invented by a mathematician and two computer scientists working for the U.S. government at the Naval Research Lab looking for ways to securely […]

Continue Reading →

Zoom Releases Updated Version of App With Latest Encryption, Security Features

The Zoom videoconferencing program at https://zoom.us/ has proven very popular during the CoronaVirus pandemic with all the various isolation policies in place. while popular, the Zoom app has also been criticized for not being fully encrypted, not totally private, and for lacking several other features. Now Zoom has released an enhanced and encrypted version of the application in order to ensure protection and privacy of personal information, and is asking […]

Continue Reading →

Brave Now Enables Encrypted Video Calls

Brave Browser has announced video calls can soon be made on the testing version of its browser. The service, Brave Together, offers end-to-end encryption with its calls—unlike a number of other video conferencing platforms, such as Zoom. Unlimited participants can join the calls, though features are still in development. Please notice this new feature is still in beta test, available only on the nightly (test) builds. It will become a […]

Continue Reading →

A Russian Military Hacking Group May Be Reading Your Email Messages

The U.S. National Security Agency says the same Russian military hacking group that interfered in the 2016 presidential election and unleashed a devastating malware attack the following year has been exploiting a major email server program since last August or earlier. The NSA did not say who the Russian military hackers have targeted. But senior U.S. intelligence officials have warned in recent months that Kremlin agents are engaged in activities […]

Continue Reading →

What Is Tor? A Beginner’s Guide to Using the Private Browser

If you care about online privacy, you need to be familiar with the Tor Browser. It was originally invented by the U.S. government for the purpose of keeping online communications hidden from foreign spies. The government no longer maintains it but the software is public domain and various civilian programmers have taken over the task of maintaining the Tor Browser and adding new functionality to it as needed. You can […]

Continue Reading →

Crooks Are Using Realistic-Looking Webpage Templates to Trick You Into Handing Over Personal Data

Cyber criminals are still attempting to exploit the coronavirus pandemic for their own gain and they’re being helped by website templates that allow them to mimic government agencies and companies. Researchers at cybersecurity company Proofpoint have identified over 300 phishing campaigns designed to steal personal information and bank details from victims – and many are using sites that are indistinguishable from the real thing, complete with authentic imagery and user […]

Continue Reading →

California Needlessly Reduces Privacy During COVID-19 Pandemic

On March 17, 2020, the federal government relaxed a number of telehealth-related regulatory requirements due to COVID-19. On April 3, 2020, California Governor Gavin Newsom issued Executive Order N-43-20 (the Order), which relaxes various telehealth reporting requirements, penalties, and enforcements otherwise imposed under state laws, including those associated with unauthorized access and disclosure of personal information through telehealth mediums.

Continue Reading →

Senate and House Democrats Introduce COVID-19 Privacy Bill Targeting Contact Tracing Apps

As privacy concerns grow about the data collected through contact tracing apps to monitor the spread of the coronavirus, a group of Democratic lawmakers is introducing a bill Thursday that aims to ensure that the data collected is protected from over-surveillance and abuse, according to a copy of the legislation seen by Morning Consult. The Public Health Emergency Privacy Act — which is being introduced by Sens. Richard Blumenthal (Conn.) and […]

Continue Reading →

Thunderbolt Bug Lets Hackers Steal Your Data in ‘Five Minutes’

A new set of flaws discovered in the Intel Thunderbolt port has put millions of machines at risk of local hacking. This new research by Eindhoven University‘s Björn Ruytenberg suggests that if a hacker gains access to a machine for just five minutes, they could bypass login methods to gain full data access. Thunderbolt ports are present in machines with Windows, Linux, and macOS. So, that covers a lot of […]

Continue Reading →