Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Security

Syncthing

Do you use two or more computers? Perhaps you have a desktop system and a laptop computer. Perhaps you use one computer at the office and a different one at home. Then again, perhaps you have two homes; a summer cottage or perhaps one home in the sunbelt and another “up north.” Do you keep separate computers in each location? Perhaps you and a relative who is also working on […]

Continue Reading →

CryptPad: a Privacy-Focused Collaborative Online Office Suite with Chat

If you or your family or your team at work need privacy and security, you might want to check out CryptPad. CryptPad is a privacy protecting alternative to Google Docs, Microsoft Office Online, and other online office suites. And while protecting privacy, it still allows for real-time collaboration between creative partners. Yes, you can (optionally) share your documents with others. The suite includes rich text (like a word processor), presentation, […]

Continue Reading →

GoldenSpy: Chinese Bank Requires a Foreign Firm to Install App With Covert Backdoor

Here is another reason to never use Windows: A large, multinational technology company got a nasty surprise recently as it was expanding its operations to China. A local bank required the company to install another program that contained an advanced backdoor. The cautionary tale, detailed in a report published Thursday, said the software package, called Intelligent Tax and produced by Beijing-based Aisino Corporation, worked as advertised. Behind the scenes, it […]

Continue Reading →

Today is National Data Privacy Day

Data Privacy Day (known in Europe as Data Protection Day is an international event that occurs every year on 28th January. The purpose of Data Privacy Day is to raise awareness about data privacy, the importance of individual privacy rights, and the need to protect personally identifiable information from improper use and disclosure. It is currently observed in the United States, Canada, Israel and 47 European countries. Sadly, National Data […]

Continue Reading →

Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States

“The privacy of the voting booth?” There’s not much privacy there. The nation’s top voting machine maker has admitted in a letter to a federal lawmaker that the company installed remote-access software on election-management systems it sold over a period of six years, raising questions about the security of those systems and the integrity of elections that were conducted with them. In a letter sent to Sen. Ron Wyden (D-OR) […]

Continue Reading →

How Chromebooks became the Go-To Laptops for Security Experts

Thanks to the early focus on preventing cyberattacks, Chromebooks are a hit with the security community. Security experts commonly recommend Chromebooks, whether it’s for the relative who somehow always ends up with spyware toolbars or the researcher heading to a hackers’ meetup. And it’s not about complicated encryption or security tricks — Chromebooks have gained popularity through a combination of affordability and simple but effective security. You can read more […]

Continue Reading →

Nokia Security Report for 2017

Are you concerned about malware (malevolent software), such as viruses, keyloggers, and trojan horse programs? If so, you might want to read a new report from Nokia. The Nokia Threat Intelligence Report examines malware infections found in mobile and fixed networks worldwide. It provides analysis of data gathered from more than 100 million devices by the Nokia NetGuard Endpoint Security solution. The new report details key security incidents and trends […]

Continue Reading →

TSA to Require “Enhanced Screening” at Airports

The Transportation Security Administration announced new security procedures at all airports in the United States today. Travelers must remove electronics larger than a mobile phone from their carry-on bags and “place them in a bin with nothing on top or below, similar to how laptops have been screened for years.” This means that tablet computers, handheld game consoles, Kindles and other ebook readers, and anything else larger than a cell […]

Continue Reading →