Go Incognito by Techlore

  • On ·
  • By ·

Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the world and provide them with not only a tutorial for improving their data habits, but to transform a user’s way of thinking about why, where, when, and how to treat their data and personal information.

To top it off, Go Incognito is available free to watch, is shareable to the public through a Creative Commons license, and even offers a premium version for users who want a few more perks.


“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

  • On ·
  • By ·

Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy’s arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).

For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence.

Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.


“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle

The Perfect Weapon Documentary

  • On ·
  • By ·

Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌

Directed by Emmy-winning filmmaker John Maggio and featuring interviews with top military, intelligence, and political officials on the frontlines of cyberterrorism, the documentary brings to light the combatants and innocent victims caught in the crosshairs of a hidden war that has been going on for decades — a war that America started, but has no idea how to finish.‌


“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle

VetSec: A Veteran Cyber Security Community

  • On ·
  • By ·

Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the IT and Cyber Security world as well as helping those that are currently transitioning out of the military and looking into these career fields. The VetSec community is open to active serving and military veterans of the US and allied nations.

Currently, VetSec offers:

  • A Slack channel with over 1,500 members, which allows veterans in any IT or cyber security field to network with each other.
  • Free training videos, focused on ethical hacking.
  • A Cyber Security blog with tutorials on a wide variety of topics.

The VetSec community, training, and services are, and always will be, 100% free.


“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle

Cyber Crime Documentary

  • On ·
  • By ·

Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as a result. It destroys businesses and even lives. Are you the next victim? Join us on a journey, visiting with 10 of our nation’s leading experts in Cyber Security as they explore the world of cyber crime and how you can avoid becoming a victim.


“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle

Do You Trust This Computer? Documentary

  • On ·
  • By ·

Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our lives. Do You Trust This Computer? explores the promises and perils of our new era. Will A.I. usher in an age of unprecedented potential, or prove to be our final invention?


“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle

The Defenders of Digital Video Series

  • On ·
  • By ·

The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark and dangerous place. But there are people fighting back to protect everything we all rely upon to survive…

A global collective of change-makers, heros, and mavericks. They battle against unseen threats. They defend the digital world to protect the real world. if digital is safe, open, and free we all have the confidence to say “Bring on the future.” They are the Defenders of Digital. These are their stories.


“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle

Code 2600 Documentary

  • On ·
  • By ·

Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film explores the impact of this new and growing connectivity on human relations, person privacy, and security as individuals and as a society while highlighting the wide-spanning socio-technical fallout caused by data collection and cyber attacks.


“Almost a perfect crime.” The hacking ring and an attempt to steal a billion dollars. Investigators blame North Korea. Pyongyang denies involvement. The story begins
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China's Grand Strategy to Displace American Order For more than a century, no US adversary or coalition of adversaries has ever reached
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle