Privacy washing is a widely used deceptive strategy. Learning to detect it better is an important skill to develop to help us to respond to it and report it.| Privacy Guides
Privacy Is Like Broccoli Illustration: Em / Privacy Guides If you are just starting the journey to improve your privacy online, you might feel overwhelmed by all the information you recently learned. This is normal, don't panic! When we first start learning about how much data is collected on us, and all the things we need to do to protect it, it's very common to feel stressed and distressed. In a state of panic, you might be tempted to try doing it all at once, driven by an urgent desire to ...| Privacy Guides
How To Improve Your Privacy and Security on Mastodon Montage: Em / Privacy Guides | Illustration: @dopatwo@mastodon.social (1) Mastodon mascot by @dopatwo@mastodon.social and Mastodon logo used with permission from Mastodon gGmbH. This site is not otherwise affiliated with Mastodon gGmbH. Increasingly, more and more people have joined Mastodon in recent years. The advantages provided by a decentralized network and using open-source software maintained by a nonprofit organization are undeniabl...| Privacy Guides
Privacy and Security on Mastodon Illustration: Em / Privacy Guides | Logo: Mastodon gGmbH Mastodon is an open-source and decentralized social network that has been growing in popularity for the past few years. While most social media rely on commercial models harvesting users' data to sell to advertisers, Mastodon offers a human-centric alternative that doesn't seek profits from your data and attention. This means better social connections, better controls, and better privacy. Mastodon doesn'...| Privacy Guides
Queer Dating Apps: Beware Who You Trust With Your Intimate Data Illustration: Em / Privacy Guides | Photo: Surasak Ch / Unsplash When discussing the intersection of data privacy and LGBTQ+ experiences, it's inevitable to also talk about queer dating apps. Due to a smaller percentage of the population and a number of factors complicating in-person dating, people part of the queer community are more likely to seek online platforms to meet lovers and friends. Unfortunately, using queer dating ap...| Privacy Guides
You Can Say NO Photo: Gabby K / Pexels In the age of facial recognition and age verification, it might feel like our data is being harvested left and right, completely outside our control or consent. Yet, we still have a powerful weapon to fight back against surveillance: The power to say no. The power to say no is one we severely underutilize. Of course, there are circumstances where it can be difficult (impossible even!) to refuse. Saying no can come at a cost, but this isn't true everywher...| Privacy Guides
Creating a Tricked-Out Monero Server with TrueNAS Illustration: Jonah Aragon / Privacy Guides In this guide, we will walk you through setting up a very powerful Monero server on TrueNAS. By completing these steps, you will be able to connect to your own self-hosted Monero node with the official Monero wallet and Cake Wallet, and you will be able to connect to your own self-hosted Monero LWS server with Edge Wallet and MyMonero. Guest Contributor Please welcome Justin Ehrenhofer as a first-tim...| Privacy Guides
Stay Safe, but Stay Connected Photo: Jiroe Matia Rengel / Unsplash In data privacy, we often talk about the dangers of data collection and exposed data. It can get overwhelming to learn more about all the information that is collected on us, especially at the beginning. As a coping mechanism, some people react by downplaying concerns, disregarding dangers, and ignoring precautions altogether. Others react the opposite way: by isolating themselves, and no longer sharing anything with anyone. B...| Privacy Guides
Selling Surveillance as Convenience Illustration: Em / Privacy Guides | Photo: Zeki Okur / Unsplash Increasingly, surveillance is being normalized and integrated in our lives. Under the guise of convenience, applications and features are sold to us as being the new better way to do things. While some might be useful, this convenience is a Trojan horse. The cost of it is the continuous degradation of our privacy rights, with all that that entails. As appalling as it is, the truth is the vast m...| Privacy Guides
The Importance of Data Privacy For The Queer Community Illustration: Em / Privacy Guides | Photo: Chris Robert / Unsplash Data privacy is important for everyone. But for some marginalized populations, data privacy is indispensable for social connection, access to information, and physical safety. For Pride month this year, we will discuss topics at the intersection of data privacy and experiences specific to the LGBTQ+ community. While it's difficult to get a complete estimate on this, due to...| Privacy Guides
The Power of Digital Provenance in the Age of AI Photo: Kseniya Lapteva / Pexels | Logo: Content Credentials With the popularity of generative AI, it's becoming more and more difficult to distinguish reality from fiction. Can this problem be solved using cryptography? What are the privacy implications of the currently proposed systems? The Problem Can you tell which of these images are AI generated? ...Have a guess? --- Actually, they're all real. But the fact that you may have believed some ...| Privacy Guides
Your Online Life Is IRL Leon Seibert / Unsplash If you, like myself, have been inhabiting the internet for a few decades, you're probably familiar with the old adage IRL: In Real Life. The acronym was used a lot when the distinction between online life and offline life was much greater than it is now. In today's world, can we really keep referring to our digital life as being somehow disconnected from our "real life"? While it's true that pseudo-anonymity online is still alive and well, most ...| Privacy Guides
Age Verification Wants Your Face, and Your Privacy Photo: Kyle Glenn / Unsplash Age verification laws and propositions forcing platforms to restrict content accessed by children and teens have been multiplying in recent years. The problem is, implementing such measures necessarily requires identifying each user accessing this content, one way or another. This is bad news for your privacy. For a few years now, several legislators in North America, Europe, and Australia have expressed concern a...| Privacy Guides
PSA: The security level slider in Tor Browser (and Mullvad Browser) does not fully apply until restarting the browser. This presents a high risk to people who switch from Standard to Safer security during a browsing session in order to protect themselves from browser exploits.| Privacy Guides
If you need a password manager for iOS or macOS that gives you full control over your data, KeePassium is a fantastic option. KeePassium offers some synchronization features, but keeps your password database offline by default. You choose who to trust to store your passwords, and you can change it whenever you want.| Privacy Guides
You might have heard of Tor in the news a few times, yet never dared to try it yourself. Despite being around for decades, Tor is still a tool too few people know about. Today, Tor is easy to use for anyone. It not only helps journalists and activists, but anybody who seeks greater privacy online or access to information regardless of location. But what is Tor exactly? How can Tor help you? And why is it such an important tool?| Privacy Guides
Last week, OpenAI's CEO Sam Altman announced in San Francisco that the World project he co-founded, formerly known as Worldcoin, is opening six stores across the United States, allowing users of the project's app to scan their eyeballs.| Privacy Guides
Privacy Pass is a new way to privately authenticate with a service. Let's look at how it could change the way we use services.| Privacy Guides
Encryption is not a crime, encryption protects all of us. Encryption, and especially end-to-end encryption, is an essential tool to protect everyone online. Attempts to undermine encryption are an attack to our fundamental right to privacy and an attack to our inherent right to security and safety.| Privacy Guides
Privacy Guides is formally taking a stand against dangerous and frightening technologies.| Privacy Guides
This article is an interview with Micah Lee, the creator of Cyd and OnionShare, founder of Lockdown Systems, and author of Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data.| Privacy Guides
Privacy is a human right that should be granted to everyone, no matter the reason. That being said, it's also important to remember that for millions of people around the world, data privacy is crucial for physical safety. For people in extreme situations, privacy can literally mean life or death.| Privacy Guides
There is a growing sentiment that the US shouldn't be relied upon for the technologies that many people and businesses use every day. These privacy-centric recommendations come from a variety of European-based companies and organizations, that you should definitely consider checking out!| Privacy Guides
This tutorial demonstrates how to install the local-only password manager KeePassXC and secure a password database with YubiKey.| Privacy Guides
In privacy, we talk a lot about how to protect our own data, but what about our responsibility to protect the data of others? If you care about privacy rights, you must also care for the data of the people around you. Together, we must start building a culture of data privacy where everyone cares for the data of others.| Privacy Guides
This tutorial demonstrates how to reset a YubiKey close to factory defaults and create a backup of most YubiKey applications on a spare key.| Privacy Guides
The UK government has served a technical capability notice to Apple under the UK Investigatory Act. Apple's response was to remove the Advanced Data Protection feature from the UK this week. What does this mean for Apple users in the UK and for encryption rights worldwide?| Privacy Guides
Privacy is only dead if we let it die. Be careful about the all-or-nothing mindset in data privacy, it can do more damage than good to the cause. While striving for improvements, do not forget to cheer and celebrate each small win.| Privacy Guides
Privacy is intrinsically intertwined with politics. Each change in governance can have serious effects on privacy rights and privacy tools, for better or for worse. Let's examine with concrete examples how politics affect legislations that can have an immense impact on the privacy tools and features we use.| Privacy Guides
When browsing the web at home becomes dangerous to your safety, there are tools that can help minimizing your digital traces to stay safe. Tails is one of these tools. Here's why, when, and how you can install and use Tails.| Privacy Guides
Your phone is an essential tool, but it also represents a huge risk to your privacy and security. Understanding these best practices when it comes to securing your smartphone will help keep you and your data safe.| Privacy Guides