-
5 times art was used to avoid censorship
Whether it’s on religious, moral, or political grounds, censorship has been around in various forms throughout history. And for as long as censorship has existed, people have found ways to use coded...
-
Q&A with wolfSSL, the team behind Lightway’s cryptography
When we created Lightway, our groundbreaking VPN protocol, security and privacy were our top priorities. We chose to incorporate wolfSSL, a well-established, open-source cryptography library that has ...
-
Not just a game: How Minecraft fights for digital freedom
Can’t read a book banned in your country? Head to a library accessible to all—a library that only exists in the world of Minecraft. Minecraft is one of the most played games in the world today—a...
-
Guide to Facebook’s new privacy settings
Facebook has just rolled out a revamped Settings page for its iOS and Android app, as well as its mobile web, ostensibly to help users browse its menus more effectively. What’s new with Facebook’s...
-
What is email tracking, and why you should turn it off
The simple act of reading your email could give companies and advertisers a lot more information than you’d like. Email tracking allows the sender to see when an email was opened by a recipient, h...
-
Australia’s ‘hacking’ bill lets police take over a person’s social media
Last week, Australia passed a bill that would give police a lot of power to spy on people through their online accounts and devices. Read on to find out how Orwellian this surveillance bill is—and b...
-
Tips to safeguard your privacy before a device repair
Handing your device over to a repair professional can be nerve-racking. Will the repair person figure out your credit card details? Will they find your tax documents? What about those sensitive photos...
-
5 times misuse of work email got someone fired
There are many reasons not to use your work email for personal matters, not least that it's probably against company policy. Most work emails are likely monitored, company emails are easy targets for ...
-
8 of the biggest crypto thefts of all time
It’s easy to see why crypto heists capture the public imagination. First, there’s the sheer amount of money to be pilfered—legacy banking institutions rarely get robbed of such vast amounts of m...
-
3 easy privacy settings on iPhone you didn’t know about
Apple is considered the more secure operating system than Android. As a closed system, Apple doesn’t release its source code to app developers and doesn’t let users modify any of its products. The...
Featured
