SatoshiLabs  -  7 years of innovating security.

SatoshiLabs - 7 years of innovating security.

To that end, this is an open call for NGOs and nonprofit organizations that see a future in Bitcoin and other cryptocurrencies, as a means to strengthen their donations and give the oppressed a better way to support worthy causes.

YouTube self-defence

YouTube self-defence

The most reliable way to block ads right now is to use Firefox with the uBlock Origin plugin (which is also available for Android and other platforms).One of the ways YouTube controls what you watch is by automatically playing a new video just after the one you were watching finished.

Make Amazon Pay

Make Amazon Pay

The growth of CEO Jeff Bezos’s astronomical wealth — up $100 billion since March, now surpassing that of any other human in history — is directly proportional to Amazon’s human and environmental costs: his corporation mistreats its workers, wrecks the climate, and undermines the public institutions underpinning our democracies along the way.

Introducing Cover Your Tracks!

Introducing Cover Your Tracks!

Panopticlick was about letting users know that browser fingerprinting was possible; Cover Your Tracks is about giving users the tools to fight back against the trackers, and improve the web ecosystem to provide privacy for everyone.

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Whether you are living and working in a high-threat environment or period of civil unrest, worry about being vulnerable to hacking of your financial data or online profiles, or are simply an advocate for personal privacy and liberty, it’s important to understand the methods by which you are tracked, and by whom, and for what purpose.

Once Again, Facebook Is Using Privacy As A Sword To Kill Independent Innovation

Once Again, Facebook Is Using Privacy As A Sword To Kill Independent Innovation

Friendly is a web browser with plugins geared towards Facebook, Instagram, and other social media sites.

MacOS Big Sur(veillance) bypasses Firewall/VPN to tell Apple what programs you run on your computer

MacOS Big Sur(veillance) bypasses Firewall/VPN to tell Apple what programs you run on your computer

Namely, the Apple App store and 50 other Apple apps are allowed to bypass user based internet routing rules which means Apple could know your real IP address even when you try to get behind a VPN on MacOS Big Sur. Additionally, this type of exemption can be exploited by malware.

Informational privacy: a precondition for democratic participation?

Informational privacy: a precondition for democratic participation?

Democratic theory accords five functions to the public sphere in general and citizen’s participation in particular: the aggregation of political opinions or individual interests; the public deliberation about values and policies; the translation of these public discourses for political institutions; the control of state actors and political officials; and finally a basic social integration of citizens in the sense of a feeling of being connected to a political community through a common democratic project.

Readup Has the World's Best Privacy Policy

Readup Has the World's Best Privacy Policy

With this blog post, I have two objectives: (1) To encourage you to actually read our new Privacy Policy and Terms of Use and (2) To make the case that the best privacy policy is the most humane privacy policy, and that no organization has a more humane privacy policy than Readup.

Larry Summers

Larry Summers

It would be inappropriate for the SEC to mandate disclosure of tax-return documents, but it would be entirely reasonable for the SEC to require that a reconciliation of book and taxable income be included in regular financial reporting.

Why You Need Multi-Factor Authentication (MFA)

Why You Need Multi-Factor Authentication (MFA)

This is a piece of information or a device that is given to you to confirm your identity at the time of accessing your account like a one-time password or a push notification from an app.

Quest 2 has allegedly been jailbroken, bypassing Facebook login requirement

Quest 2 has allegedly been jailbroken, bypassing Facebook login requirement

While root access is generally thought of as a way to flash ROMs or modify the operating system in the Android smartphone world, root access on a Quest 2 means folks would be able to bypass the requirement to log into a Facebook account before being able to use their Oculus Quest 2.

Why Getting Paid for Your Data Is a Bad Deal

Why Getting Paid for Your Data Is a Bad Deal

Supporters of data dividends correctly recognize one thing: when it comes to privacy in the United States, the companies that collect information currently hold far more power than the individual consumers continually tapped for that information.

TheNewOil : blog piece on 'The War on Telegram" as states ban service

TheNewOil : blog piece on 'The War on Telegram" as states ban service

War has come for the popular encrypted messaging app Telegram, not for the first time and likely not the last.There’s a lot more that goes into making an app hard to centralize, but I think that’s one of the most critical.

This AI automagically creates fake faces for privacy-safe photo sharing

This AI automagically creates fake faces for privacy-safe photo sharing

John Koetsier: So, a couple questions that come up — and we’re going to get into the questions around I want to share pictures of myself, maybe my family, or something like that, and I want to do that in a privacy safe way.

Combating abuse in Matrix - without backdoors.

Combating abuse in Matrix - without backdoors.

Admins running servers in particular jurisdictions then have the option to enforce whatever rules they need on their servers (e.g. they might want to subscribe to reputation feeds from a trusted source such as the IWF, identifying child sexual abuse content, and use it to block it from their server).This isn’t just about combating abuse - but the same system can also be used to empower users to filter out spam, propaganda, unwanted NSFW content, etc on their own terms.

Data privacy is a collective concern says Ania Calderon from the Open Data Charter

Data privacy is a collective concern says Ania Calderon from the Open Data Charter

Once that clear purpose is defined, it’s helpful to think about how information can be governed in a way that balances both the benefits and the risks.

Becoming Virtually Untraceable #16_9.20_pr1v4cy_1s_no7_d34d.pst

Becoming Virtually Untraceable #16_9.20_pr1v4cy_1s_no7_d34d.pst

Some of these affronts to personal freedom like the First Amendment right to say whatever you want are being stripped away from Americans by the exploiting apps for their privacy exposures.

Urbit for Normies

Urbit for Normies

Inside will be a super clean interface with all the functionality you might want from your computer, in one place and with one login (think document creation, email, social media access, accounting) — but it will run on your virtual Urbit computer, so it will be safe from corporate prying and data leaks, available on any device, and all inside one simple interface.

US official alleges big tech has started giving Hong Kong user data to China under new national security law

US official alleges big tech has started giving Hong Kong user data to China under new national security law

Back when the new national security law passed, some companies vowed to no longer respond to data requests from Hong Kong authorities.However, like Google and Facebook, Microsoft declined to comment to The Guardian on the state official’s allegations.

Tor In 2020, What Changed?

Tor In 2020, What Changed?

The press is still one of the most threatening things for Tor. It's often portrayed to only be used by criminals and the like, even though most people use it for regular browsing in the hope of not being tracked.

Why privacy must be at the core of every tech product

Why privacy must be at the core of every tech product

The EU has been more willing to take on this fight with big companies and it’s a really good thing because we need the competition, but we also need to have regulations on the data that is collected on people.

'I monitor my staff with software that takes screenshots'

'I monitor my staff with software that takes screenshots'

Image copyright Shibu Philip Image caption Shibu Philip's firm has used the software Hubstaff for the last year and a half Shibu Philip admits he knows what it's like to "maybe waste a bit of time at work".Shibu is the founder of Transcend - a small London-based firm that buys beauty products wholesale and re-sells them online.

When coffee makers are demanding a ransom, you know IoT is screwed

When coffee makers are demanding a ransom, you know IoT is screwed

Once the device connects to a home network, this ad hoc SSID required to configure the coffee maker and initiate any updates is no longer available.

Starting Sunday, TikTok and WeChat banned in US: American users will need a VPN

Starting Sunday, TikTok and WeChat banned in US: American users will need a VPN

The news comes from a U.S. Department of Commerce press release which is titled: “Commerce Department Prohibits WeChat and TikTok Transactions to Protect the National Security of the United States.” Where many people use VPNs in China to bypass Chinese censorship of American apps and services, the reverse is now going to become a thing.

Five iOS 14 and iPadOS 14 security and privacy features you need to know about

Five iOS 14 and iPadOS 14 security and privacy features you need to know about

Also, if you access Control Center, there's a notice at the top showing you recent apps that have accessed the camera or microphone.Apps requesting local network access.Another thing that you'll see after installing iOS 14/iPadOS 14 is apps requesting local network access.

Daring Fireball: Dickhead of the Week: Instagram CEO Adam Mosseri

Daring Fireball: Dickhead of the Week: Instagram CEO Adam Mosseri

This is Facebook’s political/PR strategy on this issue: (1) to ask everyone to ignore the plain truth that Apple’s changes to IDFA tracking are for exactly the reason Apple states: to give users control over their own privacy; and (2) to claim that Apple’s actions aren’t hurting Facebook but instead are hurting “small businesses”.

UN human rights experts condemn China’s new national security law for Hong Kong

UN human rights experts condemn China’s new national security law for Hong Kong

ShareTweet Human rights experts from the United Nations have published a 14-page letter which was sent to China in which they lay out their concerns that China is violating international human rights agreements with their new law.

Online Privacy Should Be Modeled on Real-World Privacy

Online Privacy Should Be Modeled on Real-World Privacy

But what makes it funny — the premise is a series of people loudly sharing in the real world the sort of information that gets unknowingly tracked online — is actually the perfect analogy to help explain how the tracking industry — what ought to be considered the privacy theft industry — has grown into existence.

Digital Services Act: what we learned about tackling the power of digital platforms

Digital Services Act: what we learned about tackling the power of digital platforms

From February 2019, EDRi met with academics, civil society organisations and representatives of the European Commission and the Parliament to better understand what type of reform was envisaged for the e-Commerce Directive.