A Few Simple Steps to Vastly Increase Your Privacy Online

A Few Simple Steps to Vastly Increase Your Privacy Online

We'll switch up your browser and search engine, add some plugins to block surveillance, and get a little technical with DNS servers.

Russia doubles down on censorship with new ‘fake news’ and ‘internet insults’ law

Russia doubles down on censorship with new ‘fake news’ and ‘internet insults’ law

The Russian government has passed a new censorship law that allows it to target individuals and websites for such nondescript crimes as spreading “fake news” and “disrespecting” state symbols of figures – including Vladimir Putin.

Thousands protest Russia’s plans to cut off Russians’ internet access to the outside world

Thousands protest Russia’s plans to cut off Russians’ internet access to the outside world

These protests were similar to those seen in summer 2017 after Russia revealed plans to add VPN websites to their website blacklist All in all, BBC reports that over 15,000 Russians marched on Moscow.

Exploding sneakers are only one reason for passing IoT cyber-security regulations

Exploding sneakers are only one reason for passing IoT cyber-security regulations

Sometimes shipped with factory-set, hardcoded passwords and often unable to be updated or patched, IoT devices can represent a weak point in a network’s security, leaving the rest of the network vulnerable to attack Hacker-created IoT botnets can direct enormous swarms of connected sensors like thermostats or sprinkler controllers to cause damaging and unpredictable spikes in infrastructure use, leading to things like power surges or reduced availability of critical infrastructure on a city or state-wide level.

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI If you are new to LOKI, the Australian project is self described on their landing page as a “privacy network which will allow users to transact and communicate privately over the internet, providing a suite of tools to help maintain the maximum amount of anonymity possible while browsing, transacting and communicating online”.

Dark web crackdown: Germans want to criminalize anyone providing a platform

Dark web crackdown: Germans want to criminalize anyone providing a platform

Germany's states have voted to introduce federal legislation that would criminalize the act of providing technical infrastructure for so-called dark-web marketplaces where illegal activities take place.

Germany considers amendment to law which makes it illegal to run a Tor node or website

Germany considers amendment to law which makes it illegal to run a Tor node or website

PIA believes this proposed amendment to the German Criminal Code is not just bad for Tor, which was named specifically, but also for online privacy as a whole – and we’re not the only ones.

UK online pornography age block triggers privacy fears

UK online pornography age block triggers privacy fears

The age block will require commercial pornography sites to show that they are taking sufficient steps to verify their users are over 18, such as by uploading a passport or driving licence or by visiting a newsagent to buy a pass only available to adults.

P2P mesh routing

It would be impossible to implement one these protocols in order to create and maintain such a net as Netsukuku is, where every each node is a router by itself, because the map of all the routes would require a space, on each pc connected to the net, of about 10GB.

US red lines for digital trade with the UK cause alarm

| Javier Ruiz US red lines for digital trade with the UK cause alarm The US government has published its negotiating objectives for a trade deal with the UK, which include some worrying proposals on digital trade, including a ban on the disclosure of source code and algorithms, and potential restrictions on data protection.

Web 3.0: The decentralised web promises to make the internet free again

Web 3.0: The decentralised web promises to make the internet free again

But it could also be a decentralised web that challenges the dominance of the tech giants by moving us away from relying so heavily on a few companies, technologies and a relatively small amount of internet infrastructure Peer-to-peer technology When we currently access the web, our computers use the HTTP protocol in the form of web addresses to find information stored at a fixed location, usually on a single server.

World Day Against Cyber Censorship 2019 — Who are the Biggest Enemies of the Internet?

World Day Against Cyber Censorship 2019 — Who are the Biggest Enemies of the Internet?

Current ‘Enemies of the Internet’: The governments of these countries usually block popular applications and technologies, filter specific websites and sometimes even manipulate the content that is allowed by sharing propaganda and fake news. Privacy and geo-blocked content bypass, are the two main purposes of the VPN, so it’s an essential tool when fighting cyber censorship.

Russia blocks encrypted email provider ProtonMail

Russia blocks encrypted email provider ProtonMail

Russia’s crackdown on the internet intensified in 2014 when it ratified a law ordering tech companies operating in the country to store Russian data within its borders.

A Deep Dive on the Recent Widespread DNS Hijacking Attacks — Krebs on Security

A Deep Dive on the Recent Widespread DNS Hijacking Attacks — Krebs on Security

Talos said the perpetrators of DNSpionage were able to steal email and other login credentials from a number of government and private sector entities in Lebanon and the United Arab Emirates by hijacking the DNS servers for these targets, so that all email and virtual private networking (VPN) traffic was redirected to an Internet address controlled by the attackers.

China database lists 'breedready' status of 1.8 million women

China database lists 'breedready' status of 1.8 million women

An open database in China contains the personal information of more than 1.8 million women, including their phone numbers, addresses, and something called “BreedReady” status, according to a researcher.

The UK’s AgeID porn filters are a recurring April Fool’s joke with a dark punchline

The UK’s AgeID porn filters are a recurring April Fool’s joke with a dark punchline

A statement from the DCMS to Sky News read: “The government, and the BBFC as the regulator, have taken the time to get this right and we will announce a commencement date shortly.” How is the UK going to issue a unique porn ID anyways?

International Women's Day

International Women's Day

On this International Women’s Day, we would like to share some ways in which Tor is useful for women in particular: There are many sister collectives and organizations in the Internet Freedom community who are doing amazing work supporting women in their local communities and teaching them all about Tor and other digital security tools.

'Save the Internet Act of 2019' Aims to Restore Net Neutrality

'Save the Internet Act of 2019' Aims to Restore Net Neutrality

Democrats in the House and Senate introduced companions bills aimed at reinstating the Obama-era net neutrality rules that prohibited broadband providers from blocking or throttling websites or offering preferred businesses higher-quality service for additional fees.

U.S. Democrats unveil legislation to reinstate net neutrality rules

U.S. Democrats unveil legislation to reinstate net neutrality rules

REUTERS/Yuri Gripas/File Photo The bill mirrors an effort last year to reverse the FCC’s December 2017 order repealing landmark rules approved in 2015 that barred internet providers from blocking or slowing content or offering paid “fast lanes.” “It is a fight that we can win,” said Senator Ed Markey, a bill sponsor, at a Capitol Hill news conference.

Pelosi says Democrats to introduce bill to bring back net neutrality this week

Pelosi says Democrats to introduce bill to bring back net neutrality this week

Speaker Nancy Pelosi Nancy Patricia D'Alesandro PelosiTrump accuses Dems of 'presidential harassment' as investigations ramp up House Democrats ramp up investigations of Trump Biden's experience is his greatest asset and biggest liability MORE (D-Calif.) announced Monday that Democrats will introduce a net neutrality bill to replace the open internet rules that were repealed in 2017.

How Will We Prevent AI-Based Forgery?

How Will We Prevent AI-Based Forgery?

We need to jumpstart digitally-signed emails, social-media posts, documents, images, videos, and even phone calls before it’s too late. We need to jumpstart “zero click” digitally-signed emails, social-media posts, documents, images, videos, and even phone calls before it’s too late.

Massive Database Leak Gives Us a Window into China’s Digital Surveillance State

Massive Database Leak Gives Us a Window into China’s Digital Surveillance State

Earlier this month, security researcher Victor Gevers found and disclosed an exposed database live-tracking the locations of about 2.6 million residents of Xinjiang, China, offering a window into what a digital surveillance state looks like in the 21st century.

Thailand passes controversial cybersecurity law that could enable government surveillance

Thailand passes controversial cybersecurity law that could enable government surveillance

Thailand’s government passed a controversial cybersecurity bill today that has been criticized for vagueness and the potential to enable sweeping access to internet user data.

Thailand passes internet security law decried as 'cyber martial law'

Thailand passes internet security law decried as 'cyber martial law'

BANGKOK (Reuters) - Thailand’s military-appointed parliament on Thursday passed a controversial cybersecurity law that gives sweeping powers to state cyber agencies, despite concerns from businesses and activists over judicial oversight and potential abuse of power.

How to Delete Google Search History

How to Delete Google Search History

Why is it not enough to know how to erase Google search history to delete all traces of your activity? This information about searches and queries is saved in the ‘ My activity ’ section on the Google website, where you have the possibility to check your google history and manage them.

How To Encrypt Your Internet Traffic

How To Encrypt Your Internet Traffic

You can protect your privacy on a micro-level by focusing on keeping websites from collecting your private information, but on a broader scale, you can encrypt all of your internet activity with one sweep by encrypting your router.

New Study Highlights IoT Security and Privacy Flaws in Popular Off the Shelf Devices

New Study Highlights IoT Security and Privacy Flaws in Popular Off the Shelf Devices

The report from Pepper IoT and Dark Cubed detailed a wide variety of security issues and privacy flaws in common Internet of Things (IoT) devices, including some cases where devices such as smart light bulbs were communicating personal data and information to third-party companies in China.

ICANN seeks full deployment of tougher security extensions

ICANN seeks full deployment of tougher security extensions

But according to an announcement on Friday from ICANN, the DNS infrastructure is being targeted by ‘malicious activity.’ In response to the attacks on DNS, ICANN are calling for full deployment of the ‘Domain Name System Security Extensions’ (DNSSEC).

University of Michigan Internet-Wide Scanning Research

The data collected through these connections consists only of information that is already publicly visible on the Internet. It helps computer scientists study the deployment and configuration of network protocols and security technologies.

At Harvard Law, Zittrain and Zuckerberg discuss encryption, ‘information fiduciaries’ and targeted advertisements

At Harvard Law, Zittrain and Zuckerberg discuss encryption, ‘information fiduciaries’ and targeted advertisements

Zittrain launched the conversation at HLS by raising the question of whether Facebook and other data-hungry internet companies should become “information fiduciaries.” Developed with Yale Law Professor Jack Balkin, the concept involves making such companies abide by a duty of loyalty to their users when handling sensitive data–including putting the user’s interests in front of profits–much the same way a lawyer or doctor must protect a client’s confidentiality.

More