Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Hong Kong Protestors Using Mesh Messaging App China Can’t Block

How do you communicate when your government censors the internet? With a peer-to-peer mesh broadcasting network that doesn’t use the internet. Perhaps there is a message here for everyone else, protestors and non-protestors alike: when your government is spying on you and even blocking your online cellular and internet access, use an alternate method of communicating. Thanks to San Fransisco startup Bridgefy’s Bluetooth-based messaging app, the Hong Kong protesters can […]

Continue Reading →

Idka: the Best Social Network that You Probably Never Heard Of

I don’t know why this competitor to Facebook and other web sites doesn’t get more publicity. Maybe it is because the company doesn’t have a multi-million dollar advertising budget? According to Wikipedia at “Idka AB is a collaborative social networking platform headquartered in Sweden. Idka allows you to connect, share, store and share documents and files, while keeping your data completely safe. Idka is advertising-free, and fully encrypted. The […]

Continue Reading →

Telegram Change Protects Hong Kong Protesters from China but 200 Million Other Users are Affected (and That’s a Good Thing)

Telegram is a FREE multi-platform messaging service founded by Russian entrepreneur Pavel Durov. It rolled out for Android in Alpha on October 20, 2013, and now has an estimated 200 million monthly users on Android, iPhones/iPad, Windows, Macintosh, and Linux. It has a reputation as a privacy enhanced text messaging app to communicate with other Telegram users, create group (text) conversations, send files, and more. Many users believe Telegram is […]

Continue Reading →

Will My Cellphone Work During and After a Hurricane?

This is a bit of a follow-up to yesterday’s off-topic article, Reminder: Zello for Cell Phones is not an Actual Walkie-Talkie, and Still Needs Internet Connectivity to Work. I have some experience in emergency communications. I have been a ham radio operator since I was 14 years old and have been involved in a couple of real emergency communications operations as well as in dozens of preparedness drills. This article […]

Continue Reading →

IBM team is Building Encryption Methods that will be Safe from Quantum Computing

With computing power increasing faster than ever before, it’s possible to crack previously secure encryption, and with the advent of quantum computing, that possibility gets ever closer. (See for the details.) However, a collaborative effort among computer scientists and academics to safeguard data is winning attention. The goal is to create encryption methodologies that cannot be broken by quantum computing. Details may be found in an article by Nancy […]

Continue Reading →

Facebook’s Café Offers Free Coffee in Exchange for Your Privacy

What is believed to be the world’s worst privacy-stealing web site in the world recently offered a free “privacy check-up.” The stated purpose was to find any privacy problems resident on your cell phone. There is but one problem: you had to give up your privacy to Facebook in order to receive the check up. Details may be found in an article by Mike Murphy in the Quartz web site […]

Continue Reading →