privacy

Using Signal correctly

Posted on

There is a major issue with Signal: Your account is tied to your phone number. This makes these apps really easy to use, since there are no usernames or passwords to deal with. It also makes it easy to discover other app users; if someone is a contact in your phone and has the app […]

encryption

The Five Eyes Statement on Encryption

Posted on

The Five Eyes, often abbreviated as FVEY, is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence. Earlier this September, law enforcement officials from the Five Eyes intelligence alliance — made up […]

hardware

Why Air Gaps Won’t Protect Your Data

Posted on

One Important Caveat As impressive as all of Guri’s work is, they all carry one critical assumption that limits their effectiveness. For all them, Guri assumes that someone can get physical access to the air-gapped computer, and be able to successfully install malware on it. That means most of your air gaps are safe. But […]

security

Qubes U2F Proxy

Posted on

The Qubes U2F Proxy is a secure proxy intended to make use of U2F two-factor authentication devices with web browsers without exposing the browser to the full USB stack, not unlike the USB keyboard and mouse proxies we’ve already implemented in Qubes. For even more protection, you can combine this with the Qubes firewall to ensure, for example, that the browser in […]

encryption

Tell me a secret…

Posted on

…and I’ll explain how encrypted messaging works. If you send a message using end-to-end encrypted messaging apps — like iMessage, WhatsApp, Signal or Wickr — it’s basically impossible for law enforcement agencies (or anyone else) to intercept and read it. You won’t be surprised to hear they’re not too happy about that. But do you […]

mobiles

Librem 5 Linux Phone Delayed until April 2019

Posted on

Promising to offer users unprecedented control and security features that aren’t available on any mainstream smartphone out there, the Librem 5 device was supposed to hit the streets in early January 2019, but the company informs Softpedia that they decided to delay the initial shipping of the smartphone due to some issues affecting the device’s […]

privacy

“Nothing to Hide” Argument is Flawed

Posted on

Over the years, we at DuckDuckGo have often heard a flawed counter-argument to online privacy: “Why should I care? I have nothing to hide.” As Internet privacy has become more mainstream, this argument is rightfully fading away. However, it’s still floating around and so we wanted to take a moment to explain three key reasons why […]

encryption

End-to-end encryption

Posted on

Government officials continue to seek technology companies’ help fighting terrorism and crime. But the most commonly proposed solution would severely limit regular people’s ability to communicate securely online. End-to-end is important, but security experts have warned for years that the most vulnerable place for your data is not during transit from place to place, but rather […]

security

Before You Turn On 2FA…

Posted on

Many online accounts allow you to supplement your password with a second form of identification, which can prevent some prevalent attacks. However, in trying to persuade users to adopt second factors, advocates sometimes forget to disclose that all security measures have trade-offs . As second factors reduce the risk of some attacks, they also introduce […]

software

Social Mapper – facial recognition tool

Posted on

Today, researchers at Trustwave released a new open-source tool called Social Mapper, which uses facial recognition to track subjects across social media networks. Designed for security researchers performing social engineering attacks, the system automatically locates profiles on Facebook, Instagram, Twitter, LinkedIn, and other networks based on a name and picture. Those searches can already be performed […]