Month: February 2016

How Does ICLOAK Plug-and-Play Privacy Work?

ICLOAK recently launched its plug-and-play online privacy solution, which is based on a custom Linux distribution that boots from a USB stick. We contacted the company to get a better sense of how exactly its privacy features work, including Tor integration, VPN availability and more. This is what ICLOAK founder Eric Delisle said in response …

How Does ICLOAK Plug-and-Play Privacy Work? Read More »

How To: Use Email Privately without Being Tracked

Virtually everyone needs an email account. Yet keeping emails private and secure is challenging because, by design, email identifies the sender. You also can’t protect emails from tracking with privacy tools like Tor or VPN. But that doesn’t mean there aren’t things you can do to protect your email privacy. Here are our tips for …

How To: Use Email Privately without Being Tracked Read More »

How to Use Encryption Effectively on Android Phones

Android phones and tablets have come with built-in encryption support for several years. Since the Android Lollipop release in 2014 encryption has even been turned on by default. But that doesn’t necessarily mean your Android personal data is secure. There are additional steps you should take to prevent access to your data in case your …

How to Use Encryption Effectively on Android Phones Read More »

New U.S.-E.U. Online Privacy Agreement Lacks Teeth

The United States made new promises this week that European citizens’ data stored on U.S. servers would not be subject to surveillance by the U.S. government. But so far, promises are the only thing the U.S. has offered to assure European concerns about online data privacy. The promises were part of a new agreement between …

New U.S.-E.U. Online Privacy Agreement Lacks Teeth Read More »

Scroll to Top