The Safest Ways to Buy a VPN Anonymously

The Safest Ways to Buy a VPN Anonymously

While Bitcoin is still the most popular anonymous payment method, some VPN providers are now accepting other altcoins, like Ripple, as well. Not all providers accept this type of payment, so be sure you double check before you purchase your card.

2018: The Year Privacy Took Center Stage

2018: The Year Privacy Took Center Stage

There is no doubt that new privacy laws in Europe dominated tech and security magazine headlines – especially in the first half of the year. Many people around the world predicted that privacy would be the top story along with more hacking and data breaches.

In the New Fight for Online Privacy and Security, Australia Falls: What Happens Next?

In the New Fight for Online Privacy and Security, Australia Falls: What Happens Next?

Both countries now claim the right to secretly compel tech companies and individual technologists, including network administrators, sysadmins, and open source developers – to re-engineer software and hardware under their control, so that it can be used to spy on their users.

GCHQ boosts powers to launch mass data hacking

GCHQ boosts powers to launch mass data hacking

“The bulk equipment interference power permits the UK intelligence services to hack at scale by allowing a single warrant to cover entire classes of property, persons or conduct,” explained Scarlet Kim, legal officer at Privacy International, which has taken the government to court over GCHQ’s hacking activities abroad.

Email Security: What Is It, And How Do You Improve It?

Email Security: What Is It, And How Do You Improve It?

Using only a password to access your email account is not considered MFA, it is defined as single factor authentication (SFA) but using your password and a one-time code sent to your device is considered MFA.

Big tech has your kid’s data — and you probably gave it to them

Big tech has your kid’s data — and you probably gave it to them

The report calls on parents and schools to examine the type of gadgets children play with, like smart speakers, wifi-powered toys, and gaming apps, all of which are collecting data on kids.

Target is really, really into surveillance

Target calls its private fusion centers "investigations centers" — the company has people in these centers working 24/7 to monitor surveillance operations at its hundreds of stores nationwide using high tech tools, even satellite imagery.

Your Digital Footprint Looks A Lot Like You

Your Digital Footprint Looks A Lot Like You

We collect information to provide better services to all our users — from figuring out basic stuff like which language you speak, to more complex things like which ads you’ll find most useful

Australia Passes Anti-Encryption Bill—Here's Everything You Need To Know

Australia Passes Anti-Encryption Bill—Here's Everything You Need To Know

A notice to request tech companies for providing "voluntary assistance" to law enforcement, which includes "removing electronic protection, providing technical information, installing software, putting information in a particular format and facilitating access to devices or services." Technical Assistance Notice (TAN) : This notice requires, rather than request, tech companies to give assistance they are already capable of providing that is reasonable, proportionate, practical and technically feasible, giving Australian agencies the flexibility to seek decryption of encrypted communications in circumstances where companies have existing means to do it (like at points where messages are not end-to-end encrypted).

TSA’s Roadmap for Airport Surveillance Moves in a Dangerous Direction

TSA’s Roadmap for Airport Surveillance Moves in a Dangerous Direction

The ink wasn’t even dry on that bill when the Transportation Security Administration (TSA) published their Biometrics Roadmap for Aviation Security and the Passenger Experience, detailing TSA’s plans to work with Customs and Border Protection (CBP) to roll out increased biometric collection and screening for all passengers, including Americans traveling domestically.

Looking Down Under for a Back Door

Looking Down Under for a Back Door

The Australian government is working to enact legislation to make it easier for law enforcement and intelligence agencies to access electronic communications information, including data protected by encryption, by forcing companies to weaken the security of their products.

New Australian anti-encryption bill ripe for abuse

New Australian anti-encryption bill ripe for abuse

The new anti-encryption bill allows Australia to go to companies such as Facebook and Apple and use “technical notices” to demand that software compromises be made so that law enforcement can access the encrypted messages.

Senator slams Google's censored search engine work in China

Senator slams Google's censored search engine work in China

Google's creation of a censored search engine for China, known as "Project Dragonfly," is proof China has made "successful efforts to recruit Western companies to their information control efforts," said Senator Mark Warner (D-VA) in Washington D.C. Friday.

Librem 5 – Purism

Purism PureOS Apple iOS Google Android User Controls Device Yes No No Trackers Disabled by Default Yes No No Privacy Protection By Default Yes No No Does Not Track You Yes No No Layered Security Protection Yes No No User Controlled Source Code Yes No No Runs GNU+Linux Yes No No Separates CPU from Cellular Baseband Yes No No IP-Native Communication First Yes No No Decentralized Communication by Default Yes No No

Australia has become the first western country to pass a bill forcing tech companies to hand over your encrypted data

Australia has become the first western country to pass a bill forcing tech companies to hand over your encrypted data

There has been extensive debate about the new law and its reach beyond Australia’s shores in what is seen as the latest salvo between global governments and tech firms over national security and privacy.

How to Disable Tracking Features in Windows 10 for Beginners

How to Disable Tracking Features in Windows 10 for Beginners

Cortana is a digital assistant by Microsoft that will set reminders, perform internet searches, and do many useful things for you. Turn off the advertising feature from Windows 10 to stay secure. Visit Settings and go to Network and Internet.

How Does a Firewall Work?

How Does a Firewall Work?

A firewall is software or hardware that uses predetermined rules to monitor incoming and outgoing network traffic. Traditional firewalls, known as packet filters, examine data for information such as its source and destination IP address.

A complete guide to Internet privacy

A complete guide to Internet privacy

When you use online services, like email or web browsing, your data travels across the network and gets stored on servers that belong to those companies. Almost all online services and Internet-connected devices have privacy settings you can update to restrict the amount of information collected and/or posted publicly online.

Uncle Sam Wants to Snoop on Your Monero Transactions

Uncle Sam Wants to Snoop on Your Monero Transactions

According to the document, blockchain monitoring frameworks geared toward Zcash and Monero are of special interest to the DHS because its existing Bitcoin-focused analytics capabilities “cover only a limited scope within the realm of cryptocurrencies.” The expansion into the privacy cryptocurrency area is intended to keep pace with newer blockchain implementations and demonstrate that the DHS possesses sufficient extensibility to deal with the threat posed by illegal hidden transactions.

A Roadmap for Exceptional Access Research

This article is organized into four parts: (1) reviewing the benefits and risks of an EA encryption system from a policy viewpoint; (2) providing a skeletal definition of the security guarantees that EA encryption should provide in order to mitigate the policy risks; (3) listing several possible capabilities that an EA system might provide in an attempt to identify a minimum viable product together with law enforcement; and (4) constructing policy to revive research into EA’s technology challenges, an area that has been mostly dormant for two decades.

Why Using HTTPS is so Important for Your Website

Why Using HTTPS is so Important for Your Website

Domain Validation (DV), Organization Validation (OV) and Extended validation (EV) are types of Secure Socket Layer (SSL) Certificates that must be obtained to enable HTTPS on your website. HTTPS will prevent ISPs from gathering information and injecting advertisements into your website.

How to Set a Strong Passcode on Your Mobile Device

How to Set a Strong Passcode on Your Mobile Device

Next, convert the phrase into a secure code using letters (both upper and lowercase), special characters, and numbers: Connect these two words with a random action and, as with the memorable sentence technique, convert it into a secure code.

Australia to pass sweeping anti-encryption laws

Australia to pass sweeping anti-encryption laws

The main political parties in Australia have made a deal to pass controversial and sweeping laws granting authorities the legal powers to access encrypted communications. Despite protests from privacy campaigners and companies including Facebook and Google, the Liberal-National coalition government and the opposition Labor Party have struck a deal to pass the law.

Australia rushes its ‘dangerous’ anti-encryption bill into parliament, despite massive opposition

Australia rushes its ‘dangerous’ anti-encryption bill into parliament, despite massive opposition

The bill, in short, grants Australian police greater powers to issue “technical notices” — a nice way of forcing companies — even websites — operating in Australia to help the government hack, implant malware, undermine encryption or insert backdoors at the behest of the government.

Homeland Security Will Let Computers Predict Who Might Be a Terrorist on Your Plane — Just Don’t Ask How It Works

Homeland Security Will Let Computers Predict Who Might Be a Terrorist on Your Plane — Just Don’t Ask How It Works

According to the technical overview, DHS’s predictive software contract would “complement the GTAS rule engine and watch list matching features with predictive models to enhance identification of high risk passengers.” In other words, the government has decided that it’s time for the world to move beyond simply putting names on a list of bad people and then checking passengers against that list.

Consumer groups, NGOs and industry call jointly for the Council of the EU to advance ePrivacy reform

Consumer groups, NGOs and industry call jointly for the Council of the EU to advance ePrivacy reform

The letter was sent prior to yesterday's (4 December) meeting in the TTE Council, with signatories sharing concerns over the slow progress of the negotiations in the Council of the EU despite the repeated scandals that demonstrate the clear and urgent need to strengthen privacy and security of electronic communications in the online environment.

CSIS director warns business leaders of ‘state-sponsored espionage in Canada’

CSIS director warns business leaders of ‘state-sponsored espionage in Canada’

While Vigneault said terrorism remained the “number one national security-related danger to public safety in this country,” he called espionage and foreign interference “the greatest threat to our prosperity and national interest.”

Privacy Organizations to California Lawmakers: Defend and Strengthen the California Consumer Privacy Act

Privacy Organizations to California Lawmakers: Defend and Strengthen the California Consumer Privacy Act

California’s data privacy law, enacted in June, is a critical step forward to protect the privacy and security of technology users’ data. The letter also calls for improvements to strengthen the CCPA and cement California’s role as a privacy leader.

Marriott’s breach response is so bad, security experts are filling in the gaps — at their own expense

Marriott’s breach response is so bad, security experts are filling in the gaps — at their own expense

In fact, there’s no easy way to check that the domain is real, except a buried note on Marriott’s data breach notification site that confirms the domain as legitimate. “Hopefully this is one less site used to confuse victims.” Had Marriott just sent the email from its own domain, it wouldn’t be an issue.

Schneier on Security

To remain anonymous and secure on the Internet, invest in a Virtual Private Network account, but remember, the bad guys are very smart, so by the time this column runs, they may have figured out a way to hack into a VPN.

More