How to Use Encryption Effectively on Android Phones

by Tracy Knauer •

Android phones and tablets have come with built-in encryption support for several years. Since the Android Lollipop release in 2014 encryption has even been turned on by default. But that doesn’t necessarily mean your Android personal data is secure. There are additional steps you should take to prevent access to your data in case your device is stolen. Here’s what …

Tor Project Will Pay Developers to Find Privacy Flaws

by Tracy Knauer •

Tor developers have acknowledged security vulnerabilities in the platform, but also started a major effort to fix them, by launching a program that will pay people who find bugs in the Tor code. The new Tor initiative is a bug bounty program. That means programmers who review Tor code and find bugs will receive cash for their efforts. They don’t …

U.K. Government Monitors Taxpayers’ Online Activity

by Tracy Knauer •

Why do government authorities want to monitor Internet users’ online activity? In the United Kingdom, one big reason is to find tax evaders by tracking social media accounts. The Belfast Telegraph reports that HM Revenue & Customs — the agency that collects taxes in the U.K. — has deployed a tool called Connect to monitor citizens’ social media activity. It …

Pakistan’s Prevention of Electronic Crimes Bill (PECB) Law Could Increase Censorship

by Tracy Knauer •

Pakistan’s Prevention of Electronic Crimes Bill (PECB), a draft law that regulates Internet-related technology and content, could radically increase the government’s censorship abilities, according to the Electronic Frontier Foundation. The bill, which was rewritten last April, provides the government with powers to control how people use various types of electronic technology, including the Internet and websites. Here is the document …