Upgrading Bitcoin, Part 2: A challenging process
It takes time for an idea to turn into code, and that code to be deployed on the Bitcoin network. Here is how this process works.
Why more apps should integrate Tor
It allows for end-to-end encrypted peer-to-peer connections on the dark web.
How to improve your email security
No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From...
Big changes to data protection laws in the EU and Brazil
A key ruling in the EU and Brazil's version of the GDPR means privacy safeguards just got strengthened for hundreds of millions of people.
U.S. Senate to vote on EARN IT bill, endangering encryption
The widely criticized EARN IT bill, which might eradicate end-to-end encryption, is now up for voting by the U.S. Senate.
The battle to outlaw end-to-end encryption in the U.S. is heating...
This post was originally published on July 2, 2020. Following the introduction of the EARN IT bill in the U.S....
EARN IT Act: U.S. might permanently ban end-to-end encryption
The EARN IT bill could make tech companies liable for its users' behavior and has far-reaching consequences for privacy and encryption.
How to work from home: Keeping safe and sane while remote
The coronavirus outbreak has prompted a lot of companies, including Google and Apple, to recommend their employees work from...
Let’s Encrypt has issued a billion certificates, securely encrypting nearly 200...
An effortless way to check whether the site you just logged on to maintains an encrypted connection is whether...
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to...