Canada’s golden opportunity to restore trust online

Canada’s golden opportunity to restore trust online

Working with technologists, policy experts, and industry partners, we’ve crafted a set of principles that we believe will help ensure the internet remains open, trusted, and people-centred.

Encrypted DNS could help close the biggest privacy gap on the Internet. Why are some groups fighting against it?

Encrypted DNS could help close the biggest privacy gap on the Internet. Why are some groups fighting against it?

Alongside technologies like TLS 1.3 and encrypted SNI, DoH has the potential to provide tremendous privacy protections.But to avoid having this technology deployment produce such a powerful centralizing effect, EFF is calling for widespread deployment of DNS over HTTPS support by Internet service providers themselves.

Mozilla plans to roll out DNS over HTTPS to US users in late September 2019

Mozilla plans to roll out DNS over HTTPS to US users in late September 2019

Starting in late September 2019, DNS over HTTPS (DoH) is going to be rolled out to Firefox users in the United States.Starting in late September 2019, DNS over HTTPS (DoH) is going to be rolled out to Firefox users in the United States.

As protesters march on, Private Internet Access VPN has been blocked in Hong Kong

As protesters march on, Private Internet Access VPN has been blocked in Hong Kong

It’s now clear that the government’s plan to limit the protests from a technological perspective are starting with the VPNs. It is now official: The Great Firewall of China has expanded to block in Hong Kong.

The Evolution of the Internet, Identity, Privacy and Tracking – How Cookies and Tracking Exploded, and Why We Need New Standards for Consumer Privacy

The Evolution of the Internet, Identity, Privacy and Tracking – How Cookies and Tracking Exploded, and Why We Need New Standards for Consumer Privacy

For years now, hardly a month goes by that we don’t hear negative sentiment regarding HTTP cookies, though they remain the only technical mechanism available within standard internet protocols to support the personalized web experience we expect as consumers, including our privacy preferences.

Google Has My Dead Grandpa’s Data And He Never Used The Internet

Google Has My Dead Grandpa’s Data And He Never Used The Internet

Was it collecting addresses I put into services across the web even though I didn’t tell Google to store this information?Other questions I have: What other information does Google have about me/my family/others that I don’t know about.

Hong Kong Protestors Using Mesh Messaging App China Can't Block: Usage Up 3685%

Hong Kong Protestors Using Mesh Messaging App China Can't Block: Usage Up 3685%

That's exactly what Hong Kong pro-democracy protesters are doing now, thanks to San Fransisco startup Bridgefy's Bluetooth-based messaging app.Rios: Bridgefy is a messaging app that works with or without Internet.

Web Tracking Is Killing The Planet

Web Tracking Is Killing The Planet

Every year, these companies pay millions of dollars for web development, and their sites are still so bloated, they have to pour even more money into the most expensive hosting platforms and content delivery networks to keep them running.

To end HK protests, the government plans to force ISPs to block apps used by protesters

To end HK protests, the government plans to force ISPs to block apps used by protesters

The Hong Kong government has drawn up plans to use executive orders to force internet service providers (ISPs) to restrict certain applications in Hong Kong as a way to disrupt the successful mass organization of those in the HK protests.

President Trump wants to use an executive order to make the FCC and FTC police social media censorship

President Trump wants to use an executive order to make the FCC and FTC police social media censorship

President Trump’s executive order seeks to accomplish its goal by formally limiting the protections afforded to companies under Section 230 of the Communications Decency Act and by putting the job of policing social media censorship on the Federal Trade Commission (FTC) and the Federal Communications Commission (FCC).

Urgent Statement of HKISPA on Selective Blocking of Internet Services

Urgent Statement of HKISPA on Selective Blocking of Internet Services

Such restrictions imposed by executive orders would completely ruin the uniqueness and value of Hong Kong as a telecommunications hub, a pillar of success as an international financial centre.

Arizona’s constitutional right to privacy extends to internet privacy, rules judge – other states left in the cold

Arizona’s constitutional right to privacy extends to internet privacy, rules judge – other states left in the cold

Notably, the court emphasizes that the Fourth Amendment of the federally binding US Constitution does not protect internet users from having their information handed over to law enforcement without a warrant because users willingly give that information to the third party (the ISP in this case).

Google and Mozilla move to stop Kazakhstan 'snooping'

Google and Mozilla move to stop Kazakhstan 'snooping'

It comes after reports internet services providers in the country have required people to install a government-issued certificate on all devices and in every browser.

Google, Mozilla, Apple Block Kazakhstan's Root CA Certificate to Prevent Spying

Google, Mozilla, Apple Block Kazakhstan's Root CA Certificate to Prevent Spying

"When a user in Kazakhstan installs the root certificate provided by their ISP, they are choosing to trust a CA that doesn't have to follow any rules and can issue a certificate for any website to anyone," Mozilla explained in a blog post published today.

Hundreds of Thousands of People Are Using Passwords That Have Already Been Hacked, Google Says

Hundreds of Thousands of People Are Using Passwords That Have Already Been Hacked, Google Says

A new Google study this week confirmed the obvious: internet users need to stop using the same password for multiple websites unless they’re keen on having their data hijacked, their identity stolen, or worse.

Leaked Draft of Trump Executive Order to 'Censor the Internet' Denounced as Dangerous, Unconstitutional Edict

Leaked Draft of Trump Executive Order to 'Censor the Internet' Denounced as Dangerous, Unconstitutional Edict

"These leaks about a potential Executive Order from the White House are troubling on many levels, from the order's potential to violate the First Amendment, to its apparent disregard for the independence of agencies like the FCC and the FTC, to its intent to unilaterally limit Section 230 which promotes moderated online communities free of hate speech and misinformation," said Chris Lewis, president and CEO of Public Knowledge.

U.S. appeals court voids Google 'cookie' privacy settlement that paid users nothing

U.S. appeals court voids Google 'cookie' privacy settlement that paid users nothing

(Reuters) - A federal appeals court on Tuesday struck down Google’s class-action settlement meant to resolve claims it invaded the privacy of millions of computer users by installing “cookies” in their browsers, but paying those users nothing for their troubles.

Private Internet Access users can now resolve internet names with the Handshake Naming System (HNS)

Private Internet Access users can now resolve internet names with the Handshake Naming System (HNS)

Starting since version 1.30 , the Mac, Linux, and Windows Private Internet Access (PIA) desktop clients have come with the ability to change the selected Name Server from PIA’s Domain Name System (DNS) servers to using one of PIA’s Handshake Name System (HNS) servers.

What a No-Carrier Phone Could Look Like

What a No-Carrier Phone Could Look Like

You could flip the Cellular Modem Hardware Kill Switch (HKS) on your Librem 5 and still call or text from your primary phone number while at that coffee-shop WiFi. This would offer you the ability to have a no-carrier phone–in either form–that now you only have when on WiFi–which means no triangulation-location tracking from cellular towers.

Facebook's Ex-Security Chief Details His 'Observatory' for Internet Abuse

Facebook's Ex-Security Chief Details His 'Observatory' for Internet Abuse

It aspires to be a central outlet for the study of all manner of internet abuse, assembling for visiting researchers the necessary machine learning tools, big data analysts, and perhaps most importantly, access to major tech platforms' user data—a key to the project that may hinge on which tech firms cooperate, and to what degree.

Social Media

Social Media

Instead of an employee threaten the integrity of your group’s online security, it is in your best interests to implement an Internet filtering solution from TitanHQ.

The world’s most valuable resource is no longer oil, but data

The world’s most valuable resource is no longer oil, but data

Now similar concerns are being raised by the giants that deal in data, the oil of the digital era. Far from gouging consumers, many of their services are free (users pay, in effect, by handing over yet more data).

New research confirms Kazakhstan is spying on connections to Facebook, Twitter, VK, Instagram, Youtube, Google, and more

New research confirms Kazakhstan is spying on connections to Facebook, Twitter, VK, Instagram, Youtube, Google, and more

The full list of 37 sites identified by Censored Planet thus far are: On July 19th, a Kazakh government official tried to clarify that the installation of the fake certificate was not technically mandatory.

“Anonymous” Data Won’t Protect Your Identity

“Anonymous” Data Won’t Protect Your Identity

In the past several years, Montjoye and other researchers have published studies that reidentified individuals from sets such as anonymized shopping data or health records.

Why you need to use a VPN to stop Google and Facebook from tracking your porn habits

Why you need to use a VPN to stop Google and Facebook from tracking your porn habits

A team of researchers from Microsoft, the University of Pennsylvania, and Carnegie Mellon have revealed a study showing that Google and Facebook are keeping tabs on your porn viewing habits with trackers and using incognito mode or private browsing does not stop it.

Russian lawmakers want to restrict email access by telephone verification, and force providers to block banned information

Russian lawmakers want to restrict email access by telephone verification, and force providers to block banned information

Led by senators Andrey Klishas and Alexander Bashkin, the lawmakers have also proposed requiring email services to block messages containing information banned in Russia within 24 hours of being notified by the state authorities.“The adoption of this legislation will significantly reduce the number of false terrorist messages distributed through email services, create the legal conditions for bringing criminals to justice, and reduce the economic damage from such communications,” claims the draft law’s explanatory note.

Private Internet Access adds BEAM to its list of anonymous payment methods

Private Internet Access adds BEAM to its list of anonymous payment methods

Private Internet Access now accepts anonymous payments through BEAM, providing our users with yet another way to protect their privacy and anonymity when signing up for our service. On the next page, simply add the email address you use for BEAM and verify it, then click “Pay Now”.

Digital Security Guides

Digital Security Guides

Reporters Without Borders provides information about digital security concepts for journalists. Social networks, email services, clouds: Journalists rely on many different services for their jobs – which may handle a lot of information that Journalists have to protect at every cost.

Kazakhstan tries and fails to MITM all of its internet users with rogue certificate installation

Kazakhstan tries and fails to MITM all of its internet users with rogue certificate installation

Officials from the Ministry of Digital Development, Innovation and Aerospace stated that the new rule was “aimed at enhancing the protection of citizens, government bodies and private companies from hacker attacks, Internet fraudsters and other types of cyber threats,” but that clearly doesn’t seem to be the case.

Kazakhstan begins intercepting citizens’ web traffic to ‘protect them from cyber threats’

Kazakhstan begins intercepting citizens’ web traffic to ‘protect them from cyber threats’

The Kazakhstan government has started to intercept all HTTPS traffic from all devices within its borders effective July 17, reports ZDNet. Local internet service providers (ISPs) have been instructed by the government to force their citizens to install a state-authorized certificate on all devices, and all browsers.