The Great Hack Documentary

  • On ·
  • By ·

Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle for control of our most intimate personal details. From award-winning filmmakers Karim Amer and Jehane Noujaim, THE GREAT HACK uncovers the dark world of data exploitation with astounding access to the personal journeys of key players on different sides of the explosive Cambridge Analytica/Facebook data scandal.

Academy-Award nominees Amer and Noujaim (The Square, Control Room, Startup.com) continue their tradition of exploring the seismic ripples of social media with this riveting, complex film. THE GREAT HACK forces us to question the origin of the information we consume daily. What do we give up when we tap that phone or keyboard and share ourselves in the digital age?


Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of

ProPrivacy.com

  • On ·
  • By ·

ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate the privacy industry (VPNs, ad blockers), so you know who to trust. Learn how to protect your digital privacy and stay safe online with ProPrivacy.


/e/ OS is a complete, fully “deGoogled” version of Android. /e/OS is an open-source mobile operating system paired with carefully selected applications. They form a
MySudo is your private identity for the digital world. Sudo identities are a digital extension of you that shield your personal and private information from
Stripped down to the basics, the Silent Pocket Napa Leather RFID Blocking Simple Card Wallet is perfect for business travelers and others on the go.
Over the last ten years, mobile phone evolution has made them our daily companions, within reach at all times. But they have also quietly transformed
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
A free, open-source, and completely encrypted notes app. A writing experience unlike any other. Standard Notes is free to use on every platform, and comes
The Firefox Multi-Account Containers extension lets you carve out a separate box for each of your online lives – no more opening a different browser
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
Free and available for Android, iPhone, and Desktop! As an Open Source project supported by grants and donations, Signal can put users first. There are
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
Bromite is a Chromium fork with ad blocking and privacy enhancements; take back your browser! Bromite provides a no-clutter browsing experience without privacy-invasive features and
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
In a society increasingly determined to erode that right, a fast, trustworthy and easy-to-use VPN is a good first step toward reclaiming it. Mullvad is
Explore beyond the reaches of the Internet. Trail Sense uses your phone's sensors to assist with wilderness treks or survival situations. With user privacy in
Locals is a subscription-based community platform. Made for creators, by creators. This is a place for independent creators to publish content, engage with supporters, and
Major cellular providers are creating unified customer identifiers based on customer account information (name, address, billing information) and unique identifiers on your mobile devices so
Magic Earth is a free maps and navigation app based on OpenStreetMap data. Enjoy 3D maps, Satellite maps, Turn-by-turn navigation, HD Traffic, and Offline maps. Find the
The Social Network Built on Trust, Control and Love MeWe is the rapidly growing high integrity social network with all the social features people love
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe. What
Minds is an open source and decentralized social networking platform where users are rewarded with Minds tokens for contributions to the community. Their goal is
The Silent Pocket Leather Handbag clutch handbags protect you from identity theft and credit card data breaches with the most advanced RFID Secure Technology, blocking
Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.

The Social Dilemma Documentary

  • On ·
  • By ·

Discover what’s hiding on the other side of your screen

We tweet, we like, and we share— but what are the consequences of our growing dependence on social media? This documentary-drama hybrid reveals how social media is reprogramming civilization with tech experts sounding the alarm on their own creations. 

The Social Dilemma features the voices of technologists, researchers and activists working to align technology with the interests of humanity.


Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of

Exodus Privacy

  • On ·
  • By ·

εxodus – the Privacy Auditing Platform for Android Applications

εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a piece of software meant to collect data about you or what you do. In a way, εxodus reports are a way of knowing what really are the ingredients of the cake you are eating. εxodus does not decompile applications, its analysis technique is entirely legal.

The εxodus website lets you:

  • Check an Android application report using the search engine
  • Analyze a new Android application by requesting analysis
  • Go further, providing a list of tools and things you can do to improve your privacy on your smartphone

/e/ OS is a complete, fully “deGoogled” version of Android. /e/OS is an open-source mobile operating system paired with carefully selected applications. They form a
MySudo is your private identity for the digital world. Sudo identities are a digital extension of you that shield your personal and private information from
Stripped down to the basics, the Silent Pocket Napa Leather RFID Blocking Simple Card Wallet is perfect for business travelers and others on the go.
Over the last ten years, mobile phone evolution has made them our daily companions, within reach at all times. But they have also quietly transformed
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
A free, open-source, and completely encrypted notes app. A writing experience unlike any other. Standard Notes is free to use on every platform, and comes
The Firefox Multi-Account Containers extension lets you carve out a separate box for each of your online lives – no more opening a different browser
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
Free and available for Android, iPhone, and Desktop! As an Open Source project supported by grants and donations, Signal can put users first. There are
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
Bromite is a Chromium fork with ad blocking and privacy enhancements; take back your browser! Bromite provides a no-clutter browsing experience without privacy-invasive features and
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
In a society increasingly determined to erode that right, a fast, trustworthy and easy-to-use VPN is a good first step toward reclaiming it. Mullvad is
Explore beyond the reaches of the Internet. Trail Sense uses your phone's sensors to assist with wilderness treks or survival situations. With user privacy in
Locals is a subscription-based community platform. Made for creators, by creators. This is a place for independent creators to publish content, engage with supporters, and
Major cellular providers are creating unified customer identifiers based on customer account information (name, address, billing information) and unique identifiers on your mobile devices so
Magic Earth is a free maps and navigation app based on OpenStreetMap data. Enjoy 3D maps, Satellite maps, Turn-by-turn navigation, HD Traffic, and Offline maps. Find the
The Social Network Built on Trust, Control and Love MeWe is the rapidly growing high integrity social network with all the social features people love
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps,
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe. What
Minds is an open source and decentralized social networking platform where users are rewarded with Minds tokens for contributions to the community. Their goal is
The Silent Pocket Leather Handbag clutch handbags protect you from identity theft and credit card data breaches with the most advanced RFID Secure Technology, blocking
Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.

Kill Chain Documentary

  • On ·
  • By ·

Kill Chain: The War on Democracy

In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses of today’s election technology, an issue that is little understood by the public or even lawmakers. From directors Simon Ardizzone, Russell Michaels and Sarah Teale, the team behind HBO’s 2006 Emmy®-nominated documentary Hacking DemocracyKill Chain again follows Finnish hacker and cyber security expert Harri Hursti as he travels around the world and across the U.S. to show how our election systems remain unprotected, with very little accountability or transparency. Hursti’s eye-opening journey is supplemented by candid interviews with key figures in the election security community, as well as cyber experts and U.S. senators from both parties who are fighting to secure the integrity of the vote before November 2020. As the film shows, individuals, foreign states and other bad actors can employ a myriad of techniques to gain access to voting systems at any stage – from voter registration databases to actual election results. Through this lens, seemingly unrelated or uncoordinated security breaches of the recent past can be seen as part of a “kill chain” – a military doctrine to plot meticulous, long-game attacks, understanding that breaking down trust in voting results is the surest way to undermine democracy. As enlightening as it is disturbing, Kill Chain underscores the fragility of our election process and points to the clear solutions available to protect us against sabotage.


Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of

The Creepy Line Documentary

  • On ·
  • By ·

“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Eric Schmidt

An eye-opening documentary, The Creepy Line reveals the stunning degree to which society is manipulated by Google and Facebook and blows the lid off the remarkably subtle – hence powerful – manner in which they do it.

The Creepy Line takes the conversation about data privacy and control further than ever before by examining what Google and Facebook do once they control a user’s data. Not only is this data sold to the highest bidder, but it is used to mold, massage, and manipulate the public consciousness while influencing opinion on a vast scale – all with the goal of transforming society to fit their worldview.


Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of

NSA Guidance on Location Data

  • On ·
  • By ·

The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for users if it is accessed by hackers.


Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of

ThreatWire

  • On ·
  • By ·

ThreatWire is your source for
security, privacy, and internet freedom news!

ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, privacy, and what is threatening the freedom of our Internet. We all want to know what kind of laws are being passed to inhibit our internet freedom and privacy. We are the targets of hacks small and large. If you’re like me, you want to know what threats are currently residing in the connected world.


Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of

The Value of Your Personal Data Documentary

  • On ·
  • By ·

The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of data is endless, from health care uses to marketeers who can accurately predict your behavior. But who is making money from it? And who is the owner of your personal data?

Weapons of Mass Surveillance Documentary

  • On ·
  • By ·

The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are subject to state-sponsored espionage. Governments with dubious human rights records are now using mass surveillance technology to thoroughly track and quell any murmurs of dissent – and it is western companies that are providing the technology to do so.


Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts--and a gripping inside look
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best "out of the box" user experience by providing the latest
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of
  • 1
  • 2