Privacy
What does data protection by design actually mean?
In October, the European Data Protection Board (EDPB) adopted a final version of the Guidelines on Data Protection by Design...
Read more about What does data protection by design actually mean?
The rise of workplace surveillance
Many have reluctantly accepted that the guilty pleasure of endlessly scrolling down their social media app of choice will come...
Read more about The rise of workplace surveillance
Ghostwriter campaign: how my name was stolen for an information operation
An online copy of me lied to the world that NATO troops are being withdrawn from my home country. My...
Read more about Ghostwriter campaign: how my name was stolen for an information operation
The biggest flaw of SIM-based 2FA
Have you just started using SIM-based two-factor authentication to protect your accounts? Well, multiple experts agree that it’s not safe,...
Read more about The biggest flaw of SIM-based 2FA
The way you use Tor depends on where you live
When it was established in 2002, The Onion Router (Tor), an open-source platform designed to bypass internet traffic through different...
Read more about The way you use Tor depends on where you live
Face for sale: Leaks and lawsuits blight Russia facial recognition
When Anna Kuznetsova saw an ad offering access to Moscow's face recognition cameras, all she had to do was pay...
Read more about Face for sale: Leaks and lawsuits blight Russia facial recognition
Brittany Kaiser: our data is traded around the world without our explicit consent
We produce data, and we should get paid for it. After all, data is a commodity more valuable than oil...
Read more about Brittany Kaiser: our data is traded around the world without our explicit consent
What is the EU’s landmark ruling on privacy and what does it mean for you?
The EU’s highest court says your privacy must be respected – at almost all costs.The fine line between harnessing the...
Read more about What is the EU’s landmark ruling on privacy and what does it mean for you?
How to make your Facebook profile private
We share so much information on Facebook—including information on our birthday, interests and closest friends. Though it might not bother...
Read more about How to make your Facebook profile private
COVID-19 tracing: technology is not the savior. Or is it?
Some governments used the health crisis to cement their power and limit human rights both online and offline, argue human...
Read more about COVID-19 tracing: technology is not the savior. Or is it?
The use of biometrics is accelerating and outpacing legislation
We may not always be in control of our biometric data but it’s ours, so we should think about what...
Read more about The use of biometrics is accelerating and outpacing legislation
Fingerprint vs Face ID: Which is safer?
To keep your data safe, how should you unlock your device?Our personal data has never been more precious. Keeping it...
Read more about Fingerprint vs Face ID: Which is safer?
What is Tor and how does it work?
Tor (formerly an acronym for “The Onion Router”) is often touted as a way to browse the web anonymously. From...
Read more about What is Tor and how does it work?
Should all data be freely traded?
Open data has been an ambition of the European Union for several years now. A report from the European Data...
Read more about Should all data be freely traded?
Here’s why you shouldn’t install spyware on your kids
Kids will be kids – and they’ll get around it anyway. It’s a parent’s biggest fear. The world wide web...
Read more about Here’s why you shouldn’t install spyware on your kids
Zuckerberg under the spotlight over privacy - will anything change this time?
The latest challenge to Facebook's privacy practices was revealed last week, with news of a lawsuit alleging that its Instagram...
Read more about Zuckerberg under the spotlight over privacy - will anything change this time?
Deepfakes, digital forensics and the battle against AI crime
When wandering the dark streets after a night out, most people reading this will rely on their streetwise instincts to...
Read more about Deepfakes, digital forensics and the battle against AI crime
Facial recognition cameras in schools erode privacy and normalize surveillance
Facial recognition (FR) cameras are increasingly used in schools around the world to prevent violence and crimes. Instead, it exacerbates...
Read more about Facial recognition cameras in schools erode privacy and normalize surveillance
What is Doxxing: how to protect yourself
Doxxing is a cyber attack that is aimed at discovering the real identity of a person and publishing their private...
Read more about What is Doxxing: how to protect yourself
Digital signature: all you need to know
A digital signature is a method to verify the authenticity of digital messages or documents using a mathematical algorithm. It's...
Read more about Digital signature: all you need to know