Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Online Privacy & Security

5 Reasons to Use Online Bill Payment

An interesting article by Alison Cooper on the HowStuffWorks web site points out that paying bills online is much safer than sending a check through the post office: “Online bill payment is also safer than the snail-mail method: Your personal information is much more vulnerable to theft if it’s on paper and physically moving through the postal system.” Also, ” You can also use your credit card to pay all […]

Continue Reading →

Apple, Google and WhatsApp Condemn GCHQ Proposal To Eavesdrop on Encrypted Messages

In an open letter to GCHQ (Government Communications Headquarters), 47 signatories including Apple, Google and WhatsApp have jointly urged the U.K. cybersecurity agency to abandon its plans for a so-called “ghost protocol.” It comes after intelligence officials at GCHQ proposed a way in which they believed law enforcement could access end-to-end encrypted communications without undermining the privacy, security or confidence of other users. Details of the initiative were first published […]

Continue Reading →

CrossFit, the Popular Fitness and Lifestyle Program with a Cult-Like Following, Broke Up with Facebook and Instagram on Friday, Citing Security and Privacy Concerns

CrossFit, Inc., which boasts 15,000 affiliates and millions of followers, said it was investigating alleged security problems and opposed what it called Facebook’s overwhelming influence on”the marketplace of public thought,” the fitness company said in a statement. “All activity on CrossFit, Inc.’s Facebook and Instagram accounts was suspended as of May 22, 2019, as CrossFit investigates the circumstances pertaining to Facebook’s deletion of the Banting7DayMealPlan and other well-known public complaints […]

Continue Reading →

Instagram Data Breach! 49 Million Users’ Sensitive Data Exposed Online

Here is still ANOTHER data leak in a product supplied by Facebook. This time it’s the Facebook-owned photo-sharing application Instagram. An unprotected AWS (Amazon Web Services) server containing personal information of millions of Instagram influencers, celebrities, and brand accounts have been found online, the TechCrunch reported. According to the security researcher Anurag Sen, who discovered the leak and notified TechCrunch, the database had over 49 million records exposed online, allowing […]

Continue Reading →

Whatsapp is Introducing Ads and May Remove End-to-End Encryption

WhatsApp has had a checkered past. WhatsApp Messenger is a freeware, cross-platform messaging and Voice over IP (VoIP) service. It was created by WhatsApp Inc. of Mountain View, California. During the time the app was supported by WhatsApp, Inc. the app never displayed advertising. In a June 2012 blog post, WhatsApp referred to advertising, among other things, as “the disruption of aesthetics, the insults to your intelligence and the interruption […]

Continue Reading →

Ultra-private Tor Browser is Now Available on Android

The Tor Web Browser and its matching Tor “onion networking” is generally considered to be the most secure and highly private web browser available today. (Tor is an abbreviation for “The Onion Router”). Invented by the U.S. government and available free of charge to everyone worldwide, Tor enables anonymous anonymous communication. Now a Tor web browser is available for Android computers.

Continue Reading →

Reclaim Your Privacy with These Privacy-Focused Alternatives to Google’s Services

If you’d prefer not to have a corporation and all its buddies breathing down your neck, consider these privacy-focused alternatives to Google’s services. Alternatives for Google Chrome, Google Search, Google Docs, Google Drive, Google Calendar, Google Photos, Google Translate, YouTube, Google Maps, and Gmail may be found in an article by Alexander Fox in the MakeTechEasier web site at: https://www.maketecheasier.com/google-services-alternatives-2/.

Continue Reading →