Privacy Heroes

Privacy Heroes

From search engines, browsers, and email providers to cloud storage, chat apps, and social media, you’re being exploited and exposed online. To make the Internet a safe place to conduct business, browse the web, and store sensitive data.

Ledger Nano S Limited Edition Review – CryptoLauren

Ledger Nano S Limited Edition Review – CryptoLauren

This company has created software devices specially designed for the safe storage of popular cryptocurrencies. Ledger provides the most robust devices for the secure storage of your cryptocurrency. They have developed a remarkably secure structure, placing themselves at the top of the digital wallet options.

Smile! Border Security Bots Are Reading Your Face - October 15, 2018

Smile! Border Security Bots Are Reading Your Face - October 15, 2018

Machine learning tools predicting human behavior have been found to be racially biased, and privacy advocates worry about government collection and storage of traveler data. But polls show Americans are just as worried about terrorism as they were after 9/11, so privacy and fairness may not survive the screening process.

Firefox 65: New Cookie Jar Policy to block tracking

Firefox 65: New Cookie Jar Policy to block tracking

Firefox users may have a couple of questions when it comes to the new "Cookie Jar Policy" and how it differs from using the built-in Tracking Protection feature or third-party extensions to block certain types of connections or content in the browser by default.

Data Custody Is A Massive Issue

Data Custody Is A Massive Issue

It refers to the process of having the legal right and authentic control over particular set(s) of data elements which are then authorized for storage and use by any particular custodian(s) of that data.

BurnBox Makes Hidden Files Look Like You've Deleted Them

BurnBox Makes Hidden Files Look Like You've Deleted Them

Designed to work on top of existing cloud storage services like Dropbox, BurnBox is a form of what the researchers call "self-revocable encryption," which allows users to temporarily revoke access to some content on their device.

What Exactly is Zero-Knowledge in The Cloud and How Does it Work?

What Exactly is Zero-Knowledge in The Cloud and How Does it Work?

Any of the Cloudwards.net selection of best zero-knowledge cloud services, for example, uses this tech in conjunction with all manner of encryption and other protocols to keep your data as safe as the bank.

Practical Privacy — NextCloud – Kelly Rush – Medium

Practical Privacy — NextCloud – Kelly Rush – Medium

If you’re looking for some alternative, open source, self-hosted options for cloud storage besides NextCloud, there are a few mainstream choices available: If you need that much cloud storage, and you find the price of hosting on a VPS to be prohibitive, you’ll likely be stuck using one of the non-private solutions.

Pokémon Go is scanning phones for evidence of root and locking players out

Pokémon Go is scanning phones for evidence of root and locking players out

But with v0.115.2 of the game, it looks like Pokémon Go is scanning the device’s storage for any files that might be involved in the rooting process (via Android Police) and locking players out.