Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Feds Can Read Every Email You Opened Last Year Without a Warrant

It’s no longer a surprise that the government is reading your emails. What you might not know is that it can readily read most of your email without a warrant. Any email or social networking message you’ve opened that’s more than six months old can also be accessed by every law enforcement official in government — without needing to get a warrant. That’s because a key provision in a law […]

Continue Reading →

The Most Secure and Private Cell Phone Operating System

An Italian company called Hacking Team is known for the creation of surveillance solutions for government agencies and others. Hacking Team is a pretty sleazy company, selling surveillance software to all sorts of authoritarian governments around the world. Reporters Without Borders calls it one of the enemies of the Internet. The company recently got hacked itself and many of the company’s secrets are now visible to everyone on the Internet. […]

Continue Reading →

A Quote from a Recent UK Government Report on Privacy

“Privacy is an essential prerequisite to the exercise of individual freedom, and its erosion weakens the constitutional foundations on which democracy and good governance have traditionally been based in this country.” From a 132-page report, A Democratic Licence To Operate, which Nick Clegg commissioned last year in the wake of revelations by the US whistleblower Edward Snowden. The full report is available at

Continue Reading →

The Public Benefit of Hackers Stealing and Publicizing Corporate and Government Data

The term “hackers” used to be a complementary term, meaning someone who was computer literate and able to use computers to their full extent. That changed a few years ago and the word “hacker” now generally refers to an evil person, often a criminal, who steals data for the purposes of making money, usually by illegal means. Security and cryptology expert Bruce Schneier writes in his Crypto-Gram blog that all […]

Continue Reading →