
How smartphones build a dossier on you
We break down the most covert mechanism of smartphone surveillance using real-life examples.
53 articles
We break down the most covert mechanism of smartphone surveillance using real-life examples.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
We examine a special breed of scams aimed at lovers, married couples, and singles. Read on to learn how to avoid falling for “Brad Pitt”.
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
Is a taped-over webcam or phonecam a sign of paranoia – or smart thinking?
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
Even in 2024, the world is rife with digital paranoia and superstition. Is my smartphone tracking me? Will incognito mode make me invisible? This post answers these and lots of other related questions.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
The new AI function in Microsoft Windows has already been dubbed a “security nightmare” on the internet. What risks does it carry, and how to stay safe?
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?