ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate the privacy industry (VPNs, ad blockers), so you know who to trust. Learn how to protect your digital privacy and stay safe online with ProPrivacy.
Discover what’s hiding on the other side of your screen
We tweet, we like, and we share— but what are the consequences of our growing dependence on social media? This documentary-drama hybrid reveals how social media is reprogramming civilization with tech experts sounding the alarm on their own creations.
The Social Dilemma features the voices of technologists, researchers and activists working to align technology with the interests of humanity.
εxodus – the Privacy Auditing Platform for Android Applications
εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a piece of software meant to collect data about you or what you do. In a way, εxodus reports are a way of knowing what really are the ingredients of the cake you are eating. εxodus does not decompile applications, its analysis technique is entirely legal.
The εxodus website lets you:
- Check an Android application report using the search engine
- Analyze a new Android application by requesting analysis
- Go further, providing a list of tools and things you can do to improve your privacy on your smartphone
Kill Chain: The War on Democracy
In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses of today’s election technology, an issue that is little understood by the public or even lawmakers. From directors Simon Ardizzone, Russell Michaels and Sarah Teale, the team behind HBO’s 2006 Emmy®-nominated documentary Hacking Democracy, Kill Chain again follows Finnish hacker and cyber security expert Harri Hursti as he travels around the world and across the U.S. to show how our election systems remain unprotected, with very little accountability or transparency. Hursti’s eye-opening journey is supplemented by candid interviews with key figures in the election security community, as well as cyber experts and U.S. senators from both parties who are fighting to secure the integrity of the vote before November 2020. As the film shows, individuals, foreign states and other bad actors can employ a myriad of techniques to gain access to voting systems at any stage – from voter registration databases to actual election results. Through this lens, seemingly unrelated or uncoordinated security breaches of the recent past can be seen as part of a “kill chain” – a military doctrine to plot meticulous, long-game attacks, understanding that breaking down trust in voting results is the surest way to undermine democracy. As enlightening as it is disturbing, Kill Chain underscores the fragility of our election process and points to the clear solutions available to protect us against sabotage.
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Eric Schmidt
An eye-opening documentary, The Creepy Line reveals the stunning degree to which society is manipulated by Google and Facebook and blows the lid off the remarkably subtle – hence powerful – manner in which they do it.
The Creepy Line takes the conversation about data privacy and control further than ever before by examining what Google and Facebook do once they control a user’s data. Not only is this data sold to the highest bidder, but it is used to mold, massage, and manipulate the public consciousness while influencing opinion on a vast scale – all with the goal of transforming society to fit their worldview.
ThreatWire is your source for
security, privacy, and internet freedom news!
ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, privacy, and what is threatening the freedom of our Internet. We all want to know what kind of laws are being passed to inhibit our internet freedom and privacy. We are the targets of hacks small and large. If you’re like me, you want to know what threats are currently residing in the connected world.
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of data is endless, from health care uses to marketeers who can accurately predict your behavior. But who is making money from it? And who is the owner of your personal data?
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are subject to state-sponsored espionage. Governments with dubious human rights records are now using mass surveillance technology to thoroughly track and quell any murmurs of dissent – and it is western companies that are providing the technology to do so.
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
The Data Detox Kit’s clear suggestions and concrete steps help people harness all aspects of their online lives, making more informed choices and changing their digital habits in ways that suit them.
Are you voting soon in the elections? Check out the Voter’s Guide for 7 tips on how to detox your data in the run up to an election.