The Surveillance Report – featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online. The former PrivacyTools team is now working on Privacy Guides, your trusted resource for crowdsourced software recommendations.
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events. The information shared in this volume is based on real experiences with his actual clients, and is unlike any content ever released in his other books.
A New Era of Cyberwar and the Hunt for
the Kremlin’s Most Dangerous Hackers
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businesses—from drug manufacturers to software developers to shipping companies. At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics, primarily in the areas of privacy, decentralization, cryptocurrency and the blockchain but also touching on the Internet of Things and other next-generation technologies.
The staff at decentralize.today believe in the basic human right of being able to live the life we choose to lead; to be free from intrusion, control and interference by the ‘state’ and major corporations; and to the integrity of our personal data and dignity.
The Promise and the Peril of the Digital Age
Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world, you bear a responsibility to help address the world you have helped create. This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation.
In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world’s largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech’s relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying “Microsoft memoir,” the book pulls back the curtain remarkably wide onto some of the company’s most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.
Why and How You Should Take Back Control of Your Data
Every minute of every day, our data is harvested and exploited… It is time to pull the plug on the surveillance economy.
Governments and hundreds of corporations are spying on you, and everyone you know. They’re not just selling your data. They’re selling the power to influence you and decide for you. Even when you’ve explicitly asked them not to.
Reclaiming privacy is the only way we can regain control of our lives and our societies. These governments and corporations have too much power, and their power stems from us–from our data. Privacy is as collective as it is personal, and it’s time to take back control.
Privacy Is Power tells you how to do exactly that. It calls for the end of the data economy and proposes concrete measures to bring that end about, offering practical solutions, both for policymakers and ordinary citizens.
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is an expert guide to protecting you and your friends from online spying.
- Read the BASICS to find out how online surveillance works.
- Dive into TOOL GUIDES for instructions to installing secure applications.
- More detailed information in the FURTHER LEARNING sections.
- If you’d like a guided tour, look for the list of common SECURITY SCENARIOS.
Who Has Your Data and Why You Should Care
Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our data is being used—sometimes against us—by the private sector, the government, and even our employers and schools. It explains the trends in data science, technology, and the law that impact our everyday privacy.
It’s high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us.
This book is for readers who want answers to three questions: Who has your data? Why should you care? And most important, what can you do about it?
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument. The documentary was produced and directed by a pair of Berlin-based journalists, Mihaela Gladovic and Marc Meillassoux. It was crowdfunded by over 400 backers.
NOTHING TO HIDE questions the growing, puzzling and passive public acceptance of massive corporate and governmental incursions into individual and group privacy and rights.
People generally agree that mass surveillance regimes are inherently invasive and authoritarian. Yet at the same time, the number of online apps and “free” services people install is constantly increasing. Forced to accept their terms and conditions, they click away their privacy and grant access to their own personal data. To justify their compliance, most of the people usually repeat: “Anyway, I don’t interest anyone”, “Why would they look at me?” and finally “I have NOTHING TO HIDE”.
The ‘Mister X Experiment’
Through the stories of five protagonists, the documentary questions the threats that mass surveillance can pose to our democracies and for people who might think they are not concerned. The main character of the movie is a young artist in Berlin, who tend to think that he has “nothing to hide”.
Mister X accepted to be tracked over 30 days on his cell phone and laptop. His data were then given to a data analyst and a tracker specialist. The experiment needed a month of preparation, a month of shooting and a month of analysis. The challenge was to see how much the two hackers could learn about Mister X through his digital activity (WhatsApp, Facebook, GPS location…) focusing only on his metadata (without looking into the contents of his communications).