For quick reference, we've created a handy guide designed to be printed, folded, and carried in your pocket (PDF download). Now, more than ever, citizens must be able to hold those in power ...
Mobile phones were not designed for privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance ...
Digital fingerprinting is the process where a remote site or service gathers little bits of information about a user's machine, and puts those pieces together to form a unique picture, or "fingerprint ...
Phones can get viruses and other kinds of malware (malicious software ), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...
In all modern mobile networks, the cellular provider can calculate where a particular subscriber's phone is located whenever the phone is powered on and registered with the network. The ability to do ...
This page was translated from English. The English version may be more up-to-date. This is an overview of network censorship, but it is not comprehensive. There are different ways of beating internet ...
A tool that can encrypt and store your passwords using a single master password , making it practical to use many different passwords on different sites and services without having to memorize them.
Most devices let you delete data from them—for instance, you can drag a file to the Trash icon, or press delete in a photo album. But deletion does not always mean that the original data is gone.