Post-Roe Privacy
July 13 2022This is an excellent essay outlining the post-Roe privacy threat model. (Summary: period tracking apps are largely a red herring.)
Taken together, this means the primary digital threat for...
Read more
This is an excellent essay outlining the post-Roe privacy threat model. (Summary: period tracking apps are largely a red herring.)
Taken together, this means the primary digital threat for...
Read more
Report by Georgetown’s Center on Privacy and Technology published a comprehensive report on the surprising amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE).
Our two-year investigation,...
Read more
The crooks hit us up with this phishing email less than half an hour after they activated their new scam domain.
Read moreIt's a simple jingle and it's solid advice: "If in doubt, don't give it out!"
Read moreLatest epsiode - listen (or read) now!
Read moreFriends don't let friends get scammed. Not everyone knows how typical scams unfold, so here are some real-world examples...
Read moreWe’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research...
Read moreO! What a tangled web we weave, when first we practise to deceive.
Read moreTwitter was fined $150 million for using phone numbers and email addresses collected for two-factor authentication for ad targeting.
Read moreThe online identity "brokerage" SSNDOB Market didn't want people to be in any doubt what it was selling.
Read more
Recent Comments