Warrant canaries were once all the rage, but we hear about them less and less now. Are they still useful? How are the newer transparency reports different?
By Josh Lake
in VPN & Privacy
on April 15, 2022
Tor is mature and stable, but if you’re looking to run a full-on dark web site that remains as hid
By Jon Watson
in VPN & Privacy
on March 12, 2018
Researchers unearthed troves of personal information and sensitive materials including intimate phot
By Paul Bischoff
in VPN & Privacy
on June 27, 2018
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
By Josh Lake
in Information Security
on September 5, 2023
If you have intelligent switches and/or routers, they may support NetFlow, and you can add software or appliance-based probes that export NetFlow. We show you the best NetFlow analyzers & collector tools.
By John Kimball
in Net Admin
on November 21, 2024
60 percent of Brits say the government should be able to monitor mass communications. Nearly half ag
By Paul Bischoff
in VPN & Privacy
on March 19, 2017
We searched through the top 400 apps in the Apple App Store to see whether or not their privacy policies comply with the Children’s Online Privacy Protection Act rules. Our findings suggest as many as 1 in 4 may violate COPPA with many collecting personal data without parental consent.
By Rebecca Moody
in App Studies
on June 29, 2023
As the US election approaches, many people look to their local county websites for information on vo
By Rebecca Moody
in Privacy Studies
on October 30, 2024