If you’re in the US, now’s a great time to contact your Senators. You can either call the Congressional switchboard at (202) 224-3121 or use the Senate directory to look up your legislators’ contact info....
By the way, the earlier posted article restoreprivacy.com/protonmail-discloses-user-data… had an update starting at the paragraph with title Update: Statement from Proton and additional commentary
Pulling this off requires high privileges in the network, so if this is done by intruder you’re probably having a Really Bad Day anyway, but might be good to know if you’re connecting to untrusted networks (public wifi etc). For now, if you need to be sure, either tether to Android - since the Android stack doesn’t...
Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target’s traffic off of the protection...
Like it or not, email is a critical part of our digital lives. It’s how we sign up for accounts, get notifications, and communicate with a wide range of entities online. Critics of email rightfully point out that email suffers from a significant number of flaws that make it less than ideal, but that doesn’t change the...
Yo peeps, I’m currently looking into TCF Vendors, Ad partners and their whole corporate greed hellhole of tracking. I am writing a paper on this, and would like for everything to be factually correct. However, I am struggling to understand one particular part of this “transparency framework” and hope someone can help me...
According to software engineer and blogger, Paul Biggar, however, one key detail on the methods employed by the Lavender system that is often overlooked is the involvement of the messaging platform, WhatsApp. A major determining factor of the system’s identification is simply if an individual is in a WhatsApp group containing...