Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Software

Lenovo Devices Cannot Be Trusted for Secure Work

Enterprise customers are not said to be affected, but millions of consumers and bring-your-own-device users are likely using compromised machines according to an article by Zack Whittaker in ZDNet at http://goo.gl/0UoRJ4. Lenovo-branded devices sold between September 2014 and January 2015 through consumer online and retail stores, like Best Buy and Amazon.com, are likely affected by the Superfish adware, which hijacks secure internet traffic. The news bothers me because the only […]

Continue Reading →

Encrypter for Macintosh Protects Your Private Files

Encrypter provides fast and convenient encryption-based protection for your private files, ensuring your private data security. AES-256 Encryption Technology Encrypter provides reliable security protection for your business information, videos, e-books, private photos and important files. Typically, you only have to enter the login password to access these data conveniently. Without the password, no other people can access the data or transmit or duplicate the same to other storage devices.

Continue Reading →

I2P: A Network More Secret than Tor

A new network has quietly been built in recent months that adds better security than even Tor. It gained some publicity this weekend when a replacement for the infamous Silk Road web site was announced. “Silk Road Reloaded” launched on Sunday, and is only accessible by downloading the special I2P software, or by configuring your computer in a certain way to connect to I2P web pages, called ‘eepsites’, and which […]

Continue Reading →

How Android Apps Can Spy On You

Many Android applications collect a huge amount of user data for various purposes, without always specifically explaining why. Vocativ checked 25 of the most popular Android apps in the Google Play store, counting the number of permissions they require and looking at the kind of data they can collect once the users agrees to them, often without even reading them. In fact, Vocativ claims that some Android apps may be […]

Continue Reading →

The Amnesiac Incognito Live System (Tails)

Possibly the most secure of all available operating systems available today is Tails, an abbreviation for The Amnesiac Incognito Live System. If you are concerned about privacy of your email messages and also the ability to visit web sites without being tracked, you should become familiar with Tails. Luckily, that is easy to do. It boots on almost any Windows computer from a USB drive, DVD drive, or a SecureDigital […]

Continue Reading →

Privacy Protector 1.8 for Macintosh Securely Gets Rid of Files and Data that may Invade Your Privacy

Privacy Protector is a powerful and effective way to securely get rid of files and data that may invade your privacy and act as potential threats to your Mac. You can use this app to remove a host of sensitive information that can be used to track your activities. Specifically, it clears your cache files, cookies, browsing history, and more, all at the click of a button. Privacy Protector uses […]

Continue Reading →

iSentry Instantly Converts your Macintosh into an Internet-connected Motion-Sensing Security System

This one works. I replaced an old MacBook Air about a year ago and purchased a new version of the same thing only with a bigger hard drive, a faster processor, and a better display. The old laptop sat on the shelf for a while until I started pricing out a new security camera to keep en eye on the house when I am away. Wait a minute, I already had […]

Continue Reading →

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

An interesting article in Wired describes how the NSA, researchers in Israel, and possibly others steal data from computers not connected to the Internet. The method allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer by using radio signals generated and transmitted by the computer and received by a mobile phone. You can read the article about “AirHopper” at http://www.wired.com/2014/11/airhopper-hack.

Continue Reading →