How will internet anonymity and privacy be attacked? Ask Apple!
Read more
Surveillance and exploitation is now the norm across the internet. As we use digital services, we are constantly monitored. It’s time to put a stop to it.
Read moreThe internet was designed to avoid multiple points of failure. Now it has just four.
Read moreWho knew? Microphones respond to light waves as well as sound waves. This allows hackers to attack voice-assistant technologies such as Siri, Alexa and Google Assistant, sometimes from a considerable distance.
Read moreWho knew? Turning off Location History on Google doesn’t actually turn off location history. That, at least, is the basis[…]
Read more“The biggest surveillance-based enterprise in the history of mankind.” In a hugely popular post titled The Ultimate Retaliation: Pranking my[…]
Read moreThe first three questions in the Am I In An Abusive Relationship questionnaire take on a whole new meaning if[…]
Read more