Tag: Surveillance

An illustration of a meter. Thumbs up on one end, thumbs down on the other.
4 mins
Your devices are rating you. Behave accordingly.
In a world judged by social media, a low score makes everyday life difficult. You can’t rent a car, book a hotel, or pay for flights.
An illustration of a CA certificate.
3 mins
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to...
The Kazakhstan flag, except with a padlock where the sun should be.
2 mins
How to stop the Kazakhstan government from intercepting your internet traffic
Update: The Kazakh government has halted its CA plans for now. If you previously installed the certificate, make sure...
A smartphone screen with an open eye on a red background.
3 mins
Report: Stalkerware apps not held accountable for infringing privacy rights
Stalkerware—spyware applications installed on devices to surveil children, employees, and partners—has become the latest tool used by abusers to...
Facial recognition scan with a question mark on the face.
3 mins
The fight for your face: The battles deciding the fate of...
Companies and governments are putting more resources into facial recognition technology to capture your face. Now, people are fighting back.
A phone with a magnifying glass showing a black void with NSA on the handle.
2 mins
A controversial NSA phone records program might be shutting down
The National Security Agency (NSA) may be ending a program that analyzes the records of hundreds of millions of...
Massive housing leak exposed buyer documents
4 mins
An unprotected server leaked 24 million sensitive housing documents not once...
Personal documents included mortgage loan agreements, payment schedules, borrowers’ phone numbers, and more.
An illustration of internet symbol in handcuffs.
3 mins
Laws that threaten internet freedom around the world
We recently explained why Australia’s new cybersecurity bill is a bad idea. It gives law enforcement the ability to...
An illustration of a laptop held by puppet strings.
2 mins
What are botnets, and how do you protect against them?
Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit...
Facebook Meme Challenge Data Mining
4 mins
Facebook’s 10-Year Challenge went from nostalgic to dystopian real quick
NOTE: This post was originally published on January 25, 2019 A seemingly innocuous photo op with a potentially seedy underside,...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online