/e/ pre-installed Grade A smartphones

/e/ pre-installed Grade A smartphones

And we’d love to hear which model you would buy if interested, so we can plan accordingly. You can register by clicking on the button located underneath your smartphone of choice, and leave your contact details so we can come back to you when these phones will be available.

Mozilla offers research grant for a way to embed Tor inside Firefox

Mozilla offers research grant for a way to embed Tor inside Firefox

A better Tor integration is one of the key points that Mozilla is willing to fund via its Research Grants 2019H1 program that the organization announced last month. For this, Mozilla is willing to provide research grants that will help discover a better way of integrating Tor into Firefox without the current performance losses.

Tor Browser 8.0.9 update resolves add-on signing issue

Tor Browser 8.0.9 update resolves add-on signing issue

Means, add-ons should show up as installed again after Tor Browser is updated to the new version or installed anew. Tor users who use the built-in extensions or others are encouraged to update to the new version to fix the issue.

The CIA Sets Up Shop on Tor, the Anonymous Internet

The CIA Sets Up Shop on Tor, the Anonymous Internet

The anonymity service has been open source since its public release in 2002, and it transitioned to being overseen by a nonprofit, dubbed the Tor Project, in 2006.It can seem confusing at first that the US government would fund the creation of a tool that has since been used by criminals and foreign governments to conduct secret operations.

Google now wants to crack down on cookies to convince you it cares about privacy

Google now wants to crack down on cookies to convince you it cares about privacy

We said above that this move has the “semblance” of a pro-privacy effort, because of course the importance of cookies has waned a bit in recent years, thanks in part to the impact of smartphones and mobile browsers on web activity.

Facebook 'labels' posts by hand, posing privacy questions

Facebook 'labels' posts by hand, posing privacy questions

The Wipro work is among about 200 content labeling projects that Facebook has at any time, employing thousands of people globally, company officials told Reuters.

Opinion | I Used to Work for Google. I Am a Conscientious Objector.

Opinion | I Used to Work for Google. I Am a Conscientious Objector.

In October 2005, five years before being awarded a Nobel Peace Prize, Liu Xiaobo published an open letter to Jerry Yang, the chairman of Yahoo at the time.

Sidewalk Labs’s ambitious smart city plans now face a legal battle

Sidewalk Labs’s ambitious smart city plans now face a legal battle

A civil liberties group in Canada is suing three tiers of government over potential privacy issues posed by Sidewalk Labs’s plan to develop a 12-acre smart city in Toronto , which will be approved or denied later this summer.

DEA Continues Mass Surveillance of Americans Phone Call Records

DEA Continues Mass Surveillance of Americans Phone Call Records

According to a report recently released by the Office of Inspector General of the United States Department of Justice, the United States Drug Enforcement Administration (DEA) is continuing to operate its mass surveillance program which collects billions of call detail records of Americans and foreigners every day.

DARPA is Working on an Anonymous Mobile Communication System

DARPA is Working on an Anonymous Mobile Communication System

The United States’ Defense Advanced Research Projects Agency (DARPA) is behind the many innovative and useful technologies such as Unix, GPS, Tor, etc. Read More: DARPA is Developing a Secure Open Source Voting System.

Public, Council Were in the Dark on Police Access to ‘Smart’ Streetlights

Public, Council Were in the Dark on Police Access to ‘Smart’ Streetlights

Lt. Jeffrey Jordon, who works with Police Chief David Nisleit on special projects, confirmed that outside law enforcement agencies have requested access to San Diego’s raw video footage too, but he declined to say which ones and for what purposes.

Handshake: a peculiar chat experiment

Handshake: a peculiar chat experiment

This is primarily a design for out-of-band communication in which communicating parties aim to mitigate potential compromises in asymmetric encryption methodology ranging from CA poisoning to reliance on trusted centralized service providers for communications technology, and it can even be used to explore patterns in post-quantum readiness.

GrapheneOS is an Android-based, security-hardened, open source operating system

GrapheneOS is an Android-based, security-hardened, open source operating system

It’s called GrapheneOS, and it comes from Daniel Micay, the former lead developer of another security-based Android fork called CopperheadOS. Since it’s an open source project, independent developers may be able to port the operating system to run on additional devices.

RCMP Has Yet to Complete Privacy Assessment on Social Media Surveillance Tech

RCMP Has Yet to Complete Privacy Assessment on Social Media Surveillance Tech

More than a year after the RCMP started using new technology to monitor Canadians’ social media use — and three years after it purchased the surveillance software — it still hasn’t completed the required privacy impact assessments.

Privacy-Preserved Data Sharing for Evidence-Based Policy Decisions: A Demonstration Project Using Human Services Administrative Records for Evidence-Building Activities

Privacy-Preserved Data Sharing for Evidence-Based Policy Decisions: A Demonstration Project Using Human Services Administrative Records for Evidence-Building Activities

Three key issues motivated the launch of a domestic secure computation demonstration project using real government-collected data: Using new privacy-preserving approaches addresses pressing needs in society.

Tor Accepts Dash Donations, Advancing Privacy Initiative

Tor Accepts Dash Donations, Advancing Privacy Initiative

The Tor Project is now accepting donations in Dash and eight other cryptocurrencies to fund the initiative of increasing individuals’ privacy for “protection against tracking, surveillance, and censorship”. These features help Dash better service consumers that wish to maintain their privacy, which makes it a great pairing for Tor donations.

Pentagon Says All of Google’s Work on Drones Is Exempt From the Freedom of Information Act

Pentagon Says All of Google’s Work on Drones Is Exempt From the Freedom of Information Act

According to a Pentagon memo signed last year, however, no one at Google needed worry: All 5,000 pages of documents about Google’s work on the drone effort, known as Project Maven, are barred from public disclosure, because they constitute “critical infrastructure security information.”.

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Two years ago, Google has silently handed the project E2EMail which was started to enable easy end-to-end encryption in Gmail via a browser extension to "the open source community". Three years earlier, Google had announced that they are building an end-to-end encrypted Chrome plugin to automatically encrypt emails between Gmail users.

Login With Facebook, Google or AT&T? Thanks, but No Thanks

Login With Facebook, Google or AT&T? Thanks, but No Thanks

There's more: Project Verify is better than the Facebook and Google SSOs because it's going to be checked against your mobile SIM card, phone number, user credentials, account tenure and phone account type (info only your wireless carrier has).

DARPA Is Building a $10 Million, Open Source, Secure Voting System

DARPA Is Building a $10 Million, Open Source, Secure Voting System

“Galois and DARPA have just stepped up and filled a vacuum of leadership at the federal level to address the well-documented vulnerabilities in US voting machines that constitute a national security crisis.” But even so, the secure designs are expected to change how new CPUs are architected going forward.

International Women's Day

International Women's Day

On this International Women’s Day, we would like to share some ways in which Tor is useful for women in particular: There are many sister collectives and organizations in the Internet Freedom community who are doing amazing work supporting women in their local communities and teaching them all about Tor and other digital security tools.

Facebook censorship fast becoming an enemy of free expression for conservatives

Facebook censorship fast becoming an enemy of free expression for conservatives

According to a former Facebook insider who was interviewed by Project Veritas, the social media giant has allegedly developed an entire set of tools that it frequently uses to suppress conservative voices and target outspoken right-leaning users.

Google employees suspect it is still working on secret Chinese 'Dragonfly' project

Google employees suspect it is still working on secret Chinese 'Dragonfly' project

At this biennial event, the participating companies exhibit their latest service robotic technologies and components 42/42 The robot developed by Seed Solutions sings and dances to music during the Japan Robot Week 2016 at Tokyo Big Sight Google told Dragonfly workers in December that it had ceased plans to launch the search engine and would move them onto different projects within the company.

Google Employees Uncover Ongoing Work on Censored China Search

Google Employees Uncover Ongoing Work on Censored China Search

Google employees have carried out their own investigation into the company’s plan to launch a censored search engine for China and say they are concerned that development of the project remains ongoing, The Intercept can reveal.

Instagram is listening to you

Instagram is listening to you

At some point I was talking with my cousin (in spanish) about a product I would like to buy: a micro projector connected in Bluetooth to share videos on a wall from my phone.

Tracking my phone's silent connections

Tracking my phone's silent connections

Looking at data flow The number of DNS queries is an easy start, but, next I wanted to learn more about the actual servers my phone is talking to.

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation.

The Home Office Is Building A Massive Database Of Migrants That Will Offer Instant Checks To Outside Organisations

The Home Office Is Building A Massive Database Of Migrants That Will Offer Instant Checks To Outside Organisations

But the dangers of database sharing without proper scrutiny, could lead to the same discriminatory mistakes that saw Windrush citizens wrongly labelled as illegal and threatened with deportation.” Since the Data Protection Act was passed in May, people dealing with the Home Office on immigration matters can be barred from accessing information about their case using data protection laws.

Forget Face ID: Smartphones Will Monitor How Workers Walk, Type And "Spend Their Free Time"

Forget Face ID: Smartphones Will Monitor How Workers Walk, Type And "Spend Their Free Time"

Forget Face ID: a collaboration between the Defense Department and a NY-based company called TWOSENSE.AI, has birthed an artificial intelligence algorithm that could be embedded in smartphones and will be able to identify the device owner by the way they talk, type, walk and even by how "they spend their free time".

Apple Is Removing 'Do Not Track' From Safari

Apple Is Removing 'Do Not Track' From Safari

Advertisement For that story, we asked all the browser-providing companies why they still had the option, given that it could mislead users into thinking it was actually protecting their privacy.

More