Apple’s recent revelation about a U.S. government order to create a “backdoor” for undermining iPhone encryption will leave lots of people wondering which encryption methods are reliable. Here’s a quick run-down of which encryption algorithms to trust, and which ones are flawed. First, you should understand that there are three basic ways that encryption can […]
The Internet of Things (IoT) is poised to make life more convenient in many ways. For the privacy-conscious, however, IoT devices also present all manner of new challenges. Here’s an overview of the five main ways in which IoT adoption will create new privacy threats. For now, IoT devices have yet to see massive adoption. […]
Smart thermostats — the kind that connect to your home’s wireless network so that they can be controlled over the Internet — are increasingly popular. But their rapid rate of adoption has far outpaced discussion of the security and privacy risks they pose. Here’s an overview of these privacy challenges, and tips for addressing them. […]
A VPN-capable router is a convenient device — it provides VPN connections to all your computers and mobile devices. You won’t have to install a VPN client on each device, all those connected devices count as one connection with your VPN provider.