PRVCY 101 – Assistant Devices for Home

In a time when convenience often outweighs concerns, digital home assistants like Alexa, Google Home, and Siri have found their way into the sanctity of our living spaces. Promising to simplify our lives with voice-activated commands to control our house, play music, or inform us in real-time about news, these devices are now ubiquitous. However, beneath the surface of convenience lies a significant threat to privacy: surveillance.

Continue ReadingPRVCY 101 – Assistant Devices for Home

Are Carbon Footprint Passports Real?

In an era where sustainability is at the center of global discussions, it's no surprise that the concept of carbon footprint passports is gaining traction. As the world becomes increasingly monitored and travel and transportation are the main means of exercising the right to free movement, tracking individual movements and so-called carbon footprints for travel purposes poses a threat.

Continue ReadingAre Carbon Footprint Passports Real?

Smart Mirror: The Battle for the Surveillance of Our Bodies and Behavior

Interactive mirrors can be used in your home to inform you right in the morning about your schedule, where and when you need to be (and countless other things)! That really doesn't sound fun. "Smart" mirrors are another example of the obvious tension between technological innovation and privacy. In this blog post, we've discovered why the most sensitive ethical questions revolve around influencing behavior and, of course, data collection.

Continue ReadingSmart Mirror: The Battle for the Surveillance of Our Bodies and Behavior

What are Open Source TVs and How Do They Work?

Imagine a TV that not only lets you watch your favorite shows and movies but also opens up a world of customization, community-driven development, and unparalleled flexibility. In this blog post, we dive into the exciting world of open-source smart TVs and explore their potential, benefits, and the communities driving their development.

Continue ReadingWhat are Open Source TVs and How Do They Work?

PRVCY 101: A Guide to Secure File Management for Digital Privacy

In an era dominated by technology, our lives are intricately woven into the digital fabric. From personal photos to confidential documents, the digital world hosts a treasure trove of sensitive information. As our digital footprints expand, the importance of protecting our privacy grows. In this blog post, we will explore the realm of digital privacy in file management and offer practical tips to ensure the security of your digital assets.

Continue ReadingPRVCY 101: A Guide to Secure File Management for Digital Privacy

PRVCY 101: iOS App Store: Breaking the Monopoly

In the vast digital landscape, few companies wield as much influence as Apple Inc., and at the center of its ecosystem is the Apple Store - an exclusive marketplace for iOS apps. Apple's closed ecosystem has undoubtedly contributed to the company's success, but it has also sparked intense debates about issues of monopolistic control, competition, and the impact on developers and consumers. In this blog post, we delve into the Apple Store monopoly and examine its effects, controversies, and possible alternatives.

Continue ReadingPRVCY 101: iOS App Store: Breaking the Monopoly

PRVCY 101: Enhancing the Android App Store Experience with Security and Privacy

For most Android users, the Play Store is the first stop when it comes to apps and games. Due to its mandatory use, which is readily available on most Android devices, few people think about seeking alternatives. However, there are surprisingly many Play Store competitors that have nothing to hide regarding their offerings. From fully open-source stores to commercial alternatives, everything is represented.

Continue ReadingPRVCY 101: Enhancing the Android App Store Experience with Security and Privacy

The Silent Threat: Manipulation and Surveillance in the World of Video Games

In the digital age, video games have evolved beyond mere entertainment into complex virtual worlds where millions of players interact daily. While these immersive experiences offer an escape from reality, concerns are growing about the dangers of manipulation and surveillance in the gaming industry. In this blog post, we explore the subtle threats posed by these practices and their potential impact on players.

Continue ReadingThe Silent Threat: Manipulation and Surveillance in the World of Video Games

Exploring Creativity Beyond the Comfort Zone: From Idea to Robot

In a world dominated by technology, it's not uncommon for people to fear what the future will hold in terms of work, life, and finances associated with technology. A very good idea is to perceive technology as something new: something that should be fun. For those who have dreamed of creating their own innovations. For some, it's the thrill of bringing their imagination to life. Such an exciting and creative endeavor is the journey on which we explore technology and create a robot. We embark on a journey of discoveries and innovations, tracing the steps from an idea to a functioning robot.

Continue ReadingExploring Creativity Beyond the Comfort Zone: From Idea to Robot

What should you look for in the most secure routers?

The answer is simple, you need an encrypted router. Your router connects you to the Internet. Given the increasing number of cyber threats, protecting our home networks is no longer a luxury, but a necessity. An encrypted router is one of the most crucial lines of defense between your devices and countless online threats. Some routers are not secure at all, while those that are offer varying levels of security and privacy. That’s why it’s so important to choose a secure router. Let’s find out how.

Continue ReadingWhat should you look for in the most secure routers?