-
How to secure your Bitcoins and prevent irrecoverable wallet loss
Your Bitcoin wallet is like a Swiss bank account in your pocket. It’s not easy for others to view it, and if you work it right, it’s as anonymous as cash. But having your own bank means you have t...
-
How to replace old or damaged hard drives securely
If you are like most other computer users, you’ll rarely throw away or delete data. And with disk space becoming cheaper and cheaper, you’ll rarely have to. But if you do ever need to get rid of a...
-
Internet hacks: Phishing and spearphishing explained
Phishing, pronounced fishing, is a social engineering technique designed to steal passwords, credit card details, and other sensitive information. The ultimate goal is to use these credentials to gain...
-
Do I need antivirus on my computer?
Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history of malware, what antivirus software does, and whether you truly need ...
-
What the Panama Leak means for corruption and privacy
Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the Panama Papers to media outlets around the world. The Panama ...
-
Internet hacks: Brute-force attacks and how to stop them
A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...
-
How much can metadata reveal? Just ask John McAfee
Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...
-
The court case that will define technology and privacy for decades
On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...
-
How to keep your messages private and anonymous
Keeping your chats private can be an arduous and tiring task. And trying to keep them anonymous can be very daunting. Yet our chats contain some of our most sensitive pieces of information - we often ...
-
Tails 2.0 installation and review
This post was originally published on January 25, 2016. One of the major barriers Edward Snowden faced when preparing the most extensive leak of classified documents in modern history was teaching Gle...