Privacy-Respecting Services

How to Secure Wireless Routers for Data Privacy

A poorly secured home wireless network is one of the easiest ways for an attacker to steal private data. Here are tips for understanding how to keep your wifi secure and private, including which wifi encryption methods are best. If you think that simply enabling security features on your wireless router means people can’t steal

How to Secure Wireless Routers for Data Privacy Read More »

Five Privacy Challenges Posed by the Internet of Things (IoT)

The Internet of Things (IoT) is poised to make life more convenient in many ways. For the privacy-conscious, however, IoT devices also present all manner of new challenges. Here’s an overview of the five main ways in which IoT adoption will create new privacy threats. For now, IoT devices have yet to see massive adoption.

Five Privacy Challenges Posed by the Internet of Things (IoT) Read More »

The Best Web Browsers for Privacy and Security

Which Web browser should you use if you are concerned about privacy? From Tor Browser to commercial offerings like Comodo Dragon to a DIY approach, there are lots of options to choose from. Keep reading for an overview and tips on finding the best browser for privacy and security. There is no one-size-fits all solution

The Best Web Browsers for Privacy and Security Read More »

How To: Set Up a Tails Virtual Machine for Private Browsing

If you want the privacy advantages of using a secure Linux-based OS like Tails but don’t want to use Linux all the time, an easy (and free) solution is to run Tails inside a virtual machine. Here’s how. These instructions should work for pretty much any Linux-based OS. But we have written them for Tails,

How To: Set Up a Tails Virtual Machine for Private Browsing Read More »

Scroll to Top