Featured in Series

Select this option to allow this post to float to the top of any/all series landing pages sorting by Featured first.

Recent Articles

Crowdfunded Librem Phone Now Shipping


Purism, a Social Purpose Company (SPC) focusing on security and privacy with its hardware and software, has begun shipping its mass-produced Librem 5 phone to customers.

The Librem 5 is a one-of-a-kind general-purpose computer in a phone form-factor that Purism has designed and built from scratch following a successful crowdfunding campaign that raised over $2.2 million. Both the hardware and software design is focused on respecting the end user’s freedom and giving them control over their privacy and security. The Librem 5 doesn’t run Android nor iOS but instead runs the same PureOS operating system as Purism’s laptops and mini PC. Continue Reading →

Filed under: ,

Seven ‘no log’ VPN providers leak 1.2TB of user logs

A string of “zero logging” VPN providers have some explaining to do after more than a terabyte of user logs were found on their servers unprotected and facing the public internet.
This data, we are told, included in at least some cases clear-text passwords, personal information, and lists of websites visited, all for anyone to stumble upon.
It all came to light this week after Comparitech’s Bob Diachenko spotted 894GB of records in an unsecured Elasticsearch cluster that belonged to UFO VPN. Continue Reading →

Filed under:

How to Set Up a Cheap Burner Phone


If you’re taking to the streets to demand justice for the victims of police brutality and homicide, you may want to leave your phone at home. No matter how peaceful your behavior, you are at risk of getting arrested or assaulted by police. Cops might confiscate your phone and search it regardless of whether or not they’re legally allowed to, or they might try to break it, especially if it contains photos or video of their violent or illegal actions.

At the same time, it’s a good idea to bring a phone to a protest so you can record what’s happening and get the message out on social media. Filming police is completely legal and within your rights, and it’s one of the few tools citizens have against police brutality. It’s also important to be able to communicate with others in real time or to find your friends in case you get separated.

To reconcile this tension — between wanting to protect your privacy and wanting to digitally document protests and police misdeeds — the safest option is to leave your primary phone, which contains a massive amount of private information about you, at home and instead bring a specially prepared burner phone to protests.

I discuss how to do this at length below, and in the video above.

What if I Can’t Afford a Burner Phone?

I bought a Nokia 1.3 smartphone for $99, as well as three months of prepaid phone service for $40. If this is too expensive for you, you may have other options:
•If you have an old phone collecting dust in a drawer, as long as it still works and the battery still holds a charge, you can use this as your burner phone rather than buying a new one. You just need a new SIM card, like one that comes with prepaid cell service. Make sure to factory reset the phone before getting ready to protest.
•There are even cheaper phones and prepaid service options than the ones I chose, and these can work fine as well.
•If you want to avoid paying for phone service for your second phone, depending on your current cell phone provider and what types of phones you have, you may be able to remove the SIM card from your main phone and insert it into your burner phone, and then put it back after the protest. This will cause all calls and texts to temporarily go to your burner phone instead of your main one. You’ll want to make sure the SIM card slot on the second phone can accommodate the size of the SIM card you have on your primary phone.

If a separate burner phone still isn’t an option and you decide you need to bring your primary phone, here are some steps to take to make it safer and less likely for your private data to end up in the hands of the police:
•Disable fingerprint and face unlock, and instead require typing a passcode or password to unlock your phone. This makes it take longer to get into your phone, but it also makes it considerably harder for police to get in without your consent.
•Make sure your passcode or password is not easily guessable. If you’re using a numeric passcode, it should be at least 6 digits, but longer is better.
•Set up a SIM PIN, which prevents police from removing the SIM card from your phone and inserting it into another, which would allow them to take over your phone number. Here are iPhone instructions and Android instructions for doing this. If you set a SIM PIN, you’ll need to type it every time you reboot your phone in addition to your passcode.
•If you’re using Android, make sure your phone’s storage is encrypted (all iPhones have encrypted storage). On most Android phones, you can look in the Settings app, under Security > “Encrypt phone” to find phone encryption settings.
•Disable every smartphone feature that isn’t necessary like Wi-Fi, Bluetooth, and location services. You can also keep your phone in airplane mode when you don’t need to use the network. This will make your phone leak less information that police can use to track you. Continue Reading →

Filed under: ,

The Growing Threat to Free Speech Online

There are times when vitally important stories lurk behind the headlines. Yes, impeachment is historic and worth significant coverage, but it’s not the only important story. The recent threat of war with Iran merited every second of intense world interest. But what if I told you that as we lurch from crisis to crisis there is a slow-building, bipartisan movement to engage in one of most significant acts of censorship in modern American history? What if I told you that our contemporary hostility against Big Tech may cause our nation to blunder into changing the nature of the internet to enhance the power of the elite at the expense of ordinary Americans? Continue Reading →

Filed under:

Apple Has A Vladimir Putin Problem

In November 2019, Russian parliament passed what’s become known as the “law against Apple.” The legislation will require all smartphone devices to preload a host of applications that may provide the Russian government with a glut of information about its citizens, including their location, finances, and private communications. Continue Reading →

Filed under:

Apple Takes a (Cautious) Stand Against Opening a Killer’s iPhones

Apple is privately preparing for a legal fight with the Justice Department to defend encryption on its iPhones while publicly trying to defuse the dispute, as the technology giant navigates an increasingly tricky line between its customers and the Trump administration.

Timothy D. Cook, Apple’s chief executive, has marshaled a handful of top advisers, while Attorney General William P. Barr has taken aim at the company and asked it to help penetrate two phones used by a gunman in a deadly shooting last month at a naval air station in Pensacola, Fla. Continue Reading →

Filed under:

Why Americans Should Worry About the New EU Copyright Rules

Last spring, 200,000 Europeans took to the streets to protest against a new EU copyright law that risks to restrict online culture and block vast numbers of legal online communications such as memes, reaction gifs, video game reviews or remixes. It is the latest clash between a generation that has grown up with the Internet as a means of cultural expression and a much older generation of lawmakers who prioritize the interests of entertainment companies over online culture. Continue Reading →

Filed under: ,

She installed a Ring camera in her children’s room for ‘peace of mind.’ A hacker accessed it and harassed her 8-year-old daughter.


When Alyssa LeMay heard the strange music and sounds coming from her bedroom, she walked in expecting to find one of her sisters. But the room was empty.

Then, as the 8-year-old wandered around her room alone, the mysterious song abruptly stopped.

“Hello there,” a man’s voice said.

It wasn’t Alyssa’s father, who was elsewhere inside the family’s Mississippi home. The voice belonged to a stranger. And not only could the faceless man speak to the young girl — he could see her. Continue Reading →

Filed under: