Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Uncategorized

How to give Microsoft License Rights Without Limitation to Copy, Distribute, Transmit, Publicly Display, Reproduce, Edit and Reformat Your Photo, Forever

If you use Facebook, Twitter, or basically any part of the internet at all, sometime in the last 24 hours you’ve seen Microsoft’s newest tool, the age-guesser. Everyone’s sharing it, using it, and laughing over (or feeling insulted by) the results. But the tool’s rapid spread also accidentally highlights one of the biggest challenges of the digital age: the fine print. Buried in the fine print of the Azure terms […]

Continue Reading →

Use a Secure (and FREE) Computer for Banking and all other Finances

Have you ever wondered how secure your computer is? Well – believe it or not, hackers may be watching your computer and recording your every click! Any electronic device with on-line access can be vulnerable. Most hackers steal information from your computer’s usage history. That is, a hacker can log into your computer today and find passwords and other personal information you entered days or even weeks ago. Another problems […]

Continue Reading →

Tutanota, A Secure, Open Source, Encrypted Email Service

German based encrypted email startup, Tutanota, recently ended its beta test status and is now available to everyone. Almost 100,000 users signed up to send and receive secure email. Tutanota was founded in 2011 with the idea of making secure email easier to use than the other encrypted email products: ProtonMail, StartMail and Hushmail. The emphasis is on usability, a clean interface,and attachment encryption. Tutanota automatically encrypts all your data on your […]

Continue Reading →

Encryption on iPhones, Facebook Apparently ‘Petrified’ the NSA

Stronger encryption in Apple’s iPhones and on websites like Facebook has “petrified” the U.S. government because it has made it harder to spy on communications, Glenn Greenwald, the writer who first reported on Edward Snowden’s stolen files, told CNBC. One quote in the article caught my eye: “If you’re a Facebook executive or an Apple executive, you’re extremely worried that the next generation of users are going to be vulnerable […]

Continue Reading →

Silent Circle Announces New “Blackphone 2” Privacy-Oriented Phone and Tablet

I have written before about a “blackphone” with Silent Circle software installed. See http://goo.gl/4mXV9M to read my earlier article. Now the same company has announced two new devices, along with a suite of software and services intended to lock down both private and work communications. These devices should block any spies from accessing your private data and communications.

Continue Reading →