Amazon Disables Data Encryption in Fire OS Tablets

If you thought Apple’s battle against government encryption backdoors would lead to more privacy and security on mobile devices, think again. Amazon has just announced plans to make its Fire HDX tablets less private by ceasing to support full device data encryption. Fire OS, Amazon’s operating system for Fire tablets, used to support full device

Amazon Disables Data Encryption in Fire OS Tablets Read More »

How Does ICLOAK Plug-and-Play Privacy Work?

ICLOAK recently launched its plug-and-play online privacy solution, which is based on a custom Linux distribution that boots from a USB stick. We contacted the company to get a better sense of how exactly its privacy features work, including Tor integration, VPN availability and more. This is what ICLOAK founder Eric Delisle said in response

How Does ICLOAK Plug-and-Play Privacy Work? Read More »

Two Ways to Make Anonymous Phone Calls

Want to make a phone call without revealing your real identity? There are several ways you can do this, ranging from using a throw-away phone to restricting caller ID settings permanently on your smartphone. But what if you just want to make private, anonymous calls occasionally, without purchasing a special phone for it? Here are

Two Ways to Make Anonymous Phone Calls Read More »

How To: Use Email Privately without Being Tracked

Virtually everyone needs an email account. Yet keeping emails private and secure is challenging because, by design, email identifies the sender. You also can’t protect emails from tracking with privacy tools like Tor or VPN. But that doesn’t mean there aren’t things you can do to protect your email privacy. Here are our tips for

How To: Use Email Privately without Being Tracked Read More »

How to Use Encryption Effectively on Android Phones

Android phones and tablets have come with built-in encryption support for several years. Since the Android Lollipop release in 2014 encryption has even been turned on by default. But that doesn’t necessarily mean your Android personal data is secure. There are additional steps you should take to prevent access to your data in case your

How to Use Encryption Effectively on Android Phones Read More »