Homepage Featured

If you are using the Newspaper or Carousel optional homepage layout, add this label to posts to display them in the featured area on the homepage.

Recent Articles

Seven ‘no log’ VPN providers leak 1.2TB of user logs

A string of “zero logging” VPN providers have some explaining to do after more than a terabyte of user logs were found on their servers unprotected and facing the public internet.
This data, we are told, included in at least some cases clear-text passwords, personal information, and lists of websites visited, all for anyone to stumble upon.
It all came to light this week after Comparitech’s Bob Diachenko spotted 894GB of records in an unsecured Elasticsearch cluster that belonged to UFO VPN. Continue Reading →

Filed under:

How to Set Up a Cheap Burner Phone


If you’re taking to the streets to demand justice for the victims of police brutality and homicide, you may want to leave your phone at home. No matter how peaceful your behavior, you are at risk of getting arrested or assaulted by police. Cops might confiscate your phone and search it regardless of whether or not they’re legally allowed to, or they might try to break it, especially if it contains photos or video of their violent or illegal actions.

At the same time, it’s a good idea to bring a phone to a protest so you can record what’s happening and get the message out on social media. Filming police is completely legal and within your rights, and it’s one of the few tools citizens have against police brutality. It’s also important to be able to communicate with others in real time or to find your friends in case you get separated.

To reconcile this tension — between wanting to protect your privacy and wanting to digitally document protests and police misdeeds — the safest option is to leave your primary phone, which contains a massive amount of private information about you, at home and instead bring a specially prepared burner phone to protests.

I discuss how to do this at length below, and in the video above.

What if I Can’t Afford a Burner Phone?

I bought a Nokia 1.3 smartphone for $99, as well as three months of prepaid phone service for $40. If this is too expensive for you, you may have other options:
•If you have an old phone collecting dust in a drawer, as long as it still works and the battery still holds a charge, you can use this as your burner phone rather than buying a new one. You just need a new SIM card, like one that comes with prepaid cell service. Make sure to factory reset the phone before getting ready to protest.
•There are even cheaper phones and prepaid service options than the ones I chose, and these can work fine as well.
•If you want to avoid paying for phone service for your second phone, depending on your current cell phone provider and what types of phones you have, you may be able to remove the SIM card from your main phone and insert it into your burner phone, and then put it back after the protest. This will cause all calls and texts to temporarily go to your burner phone instead of your main one. You’ll want to make sure the SIM card slot on the second phone can accommodate the size of the SIM card you have on your primary phone.

If a separate burner phone still isn’t an option and you decide you need to bring your primary phone, here are some steps to take to make it safer and less likely for your private data to end up in the hands of the police:
•Disable fingerprint and face unlock, and instead require typing a passcode or password to unlock your phone. This makes it take longer to get into your phone, but it also makes it considerably harder for police to get in without your consent.
•Make sure your passcode or password is not easily guessable. If you’re using a numeric passcode, it should be at least 6 digits, but longer is better.
•Set up a SIM PIN, which prevents police from removing the SIM card from your phone and inserting it into another, which would allow them to take over your phone number. Here are iPhone instructions and Android instructions for doing this. If you set a SIM PIN, you’ll need to type it every time you reboot your phone in addition to your passcode.
•If you’re using Android, make sure your phone’s storage is encrypted (all iPhones have encrypted storage). On most Android phones, you can look in the Settings app, under Security > “Encrypt phone” to find phone encryption settings.
•Disable every smartphone feature that isn’t necessary like Wi-Fi, Bluetooth, and location services. You can also keep your phone in airplane mode when you don’t need to use the network. This will make your phone leak less information that police can use to track you. Continue Reading →

Filed under: ,

Apple Has A Vladimir Putin Problem

In November 2019, Russian parliament passed what’s become known as the “law against Apple.” The legislation will require all smartphone devices to preload a host of applications that may provide the Russian government with a glut of information about its citizens, including their location, finances, and private communications. Continue Reading →

Filed under:

Apple Takes a (Cautious) Stand Against Opening a Killer’s iPhones

Apple is privately preparing for a legal fight with the Justice Department to defend encryption on its iPhones while publicly trying to defuse the dispute, as the technology giant navigates an increasingly tricky line between its customers and the Trump administration.

Timothy D. Cook, Apple’s chief executive, has marshaled a handful of top advisers, while Attorney General William P. Barr has taken aim at the company and asked it to help penetrate two phones used by a gunman in a deadly shooting last month at a naval air station in Pensacola, Fla. Continue Reading →

Filed under:

She installed a Ring camera in her children’s room for ‘peace of mind.’ A hacker accessed it and harassed her 8-year-old daughter.


When Alyssa LeMay heard the strange music and sounds coming from her bedroom, she walked in expecting to find one of her sisters. But the room was empty.

Then, as the 8-year-old wandered around her room alone, the mysterious song abruptly stopped.

“Hello there,” a man’s voice said.

It wasn’t Alyssa’s father, who was elsewhere inside the family’s Mississippi home. The voice belonged to a stranger. And not only could the faceless man speak to the young girl — he could see her. Continue Reading →

Filed under:

Without encryption, we will lose all privacy. This is our new battleground.


In every country of the world, the security of computers keeps the lights on, the shelves stocked, the dams closed, and transportation running. For more than half a decade, the vulnerability of our computers and computer networks has been ranked the number one risk in the US Intelligence Community’s Worldwide Threat Assessment – that’s higher than terrorism, higher than war. Your bank balance, the local hospital’s equipment, and the 2020 US presidential election, among many, many other things, all depend on computer safety.

And yet, in the midst of the greatest computer security crisis in history, the US government, along with the governments of the UK and Australia, is attempting to undermine the only method that currently exists for reliably protecting the world’s information: encryption. Should they succeed in their quest to undermine encryption, our public infrastructure and private lives will be rendered permanently unsafe. Continue Reading →

Filed under: ,

This Man Launched a New Internet Service Provider from His Garage

Many people complain about their internet service, but Brandt Kuykendall did something about it. A resident of the small town of Dillon Beach, CA, he found the service to his town was too slow and expensive – so he started a DIY ISP in his garage. It took Brandt months chasing down companies to get access to internet infrastructure, but once he started Dillon Beach Internet his neighbors were clamoring for access to his faster, cheaper, and better-serviced network. Continue Reading →

Filed under:

It Is Both Ridiculous And Dangerous To Make Domain Registrars Liable For Content On Domains

Going back more than five years, we’ve been warning about the dangers of moving copyright enforcement down the stack, away from the actual hosting companies deeper and deeper into infrastructure. This was, of course, part of the goal of SOPA — to make infrastructure companies liable for infringement, and to force them to shut down entire sites. Continue Reading →

Filed under: ,