Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Ooma Now Blocks More Than One Million Obnoxious Telemarketing Calls per Month

I have been using Ooma as my telephone provider for a couple of years and love the service. (I disconnected my old-fashioned telephone service years ago.) There are many features about Ooma that I love, in addition to the low cost. Ooma provides better service and higher-quality audio than the old telephone company’s service ever did. However, perhaps the best service of all is the ability to block obnoxious callers. […]

Continue Reading →

Hushmail: a Privacy-Oriented Email Service with Built-In Encryption and no Third-Party Advertising

When you send an email without using encryption it can potentially be monitored, logged, analyzed and stored by your employer, your Internet service provider and other parties. In fact, Gmail and some other email services even have “software robots” that read your email messages in order to display targeted advertising. In some countries, including the United States of America, government sponsored projects have been set up to collect massive amounts […]

Continue Reading →

Circle: Possibly the Best Bitcoin Service?

Circle Internet Financial has unveiled a new Bitcoin service that includes a digital wallet for securely storing Bitcoins. The company also offers Android and Apple iOS apps to manage the wallet as well as a web-based interface. Circle is a FREE service aimed at general consumers to allow them to seamlessly import traditional currency from a linked bank account or credit card and convert the funds to Bitcoins stored in […]

Continue Reading →

NSA Can Decode Most VPNs

Documents published this week by the German news magazine Der Speigel at http://goo.gl/xIvm1c reveal that the National Security Agency’s Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today. However, there is some good news: […]

Continue Reading →

How Android Apps Can Spy On You

Many Android applications collect a huge amount of user data for various purposes, without always specifically explaining why. Vocativ checked 25 of the most popular Android apps in the Google Play store, counting the number of permissions they require and looking at the kind of data they can collect once the users agrees to them, often without even reading them. In fact, Vocativ claims that some Android apps may be […]

Continue Reading →

Silent Circle Provides Encrypted Voice Calls from your Cell Phone

When a Silent Circle subscriber makes a phone call, sends a text or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end from their iOS, Android or Windows PC device and is transmitted via Silent Circle’s crystal-clear, secure network. Silent Circle provides an encrypted communications service with easy-to-use tools available to all who appreciate a little control over who has access to their conversations. The […]

Continue Reading →