Understanding the Difference: Privacy, Security, and Anonymity

In today's digital age, where our lives are increasingly online, understanding the concepts of privacy, security, and anonymity has never been more important. While these terms are often used interchangeably, they refer to distinct aspects of how we protect our information and identities on the internet. Let's break down each concept to better understand the differences and why they matter.

Continue ReadingUnderstanding the Difference: Privacy, Security, and Anonymity

Digital Privacy & Biometric Fingerprinting: Two natural enemies

In the digital age, biometric fingerprint technology is at the forefront of the battle for security. Claiming to offer unparalleled convenience, it is one of the most vulnerable ways to pay and be recognized. Biometric fingerprints, which are unique to each person, unlock a world where your identity is the key to everything from your smartphone to banking services. This surveillance technology simplifies verification processes and ensures that big tech companies and governments can access your personal data and assets with just the touch of your finger.

Continue ReadingDigital Privacy & Biometric Fingerprinting: Two natural enemies

Swiss Federal Council plans website blocks in case of power shortage

A scenario currently deemed unlikely has prompted the Swiss Federal Council to take specific measures to prevent a collapse of the power supply. In the event of a power shortage, the government intends to make it difficult to transmit large amounts of data over mobile networks and to block certain websites. The proposal envisages that certain websites will be blocked in a first step. This mainly affects platforms for social media, videos, and music that are widely used by many people.

Continue ReadingSwiss Federal Council plans website blocks in case of power shortage

Trolls Factories: Spreading misinformation and fake news

Different researches has been exposing how governments are using a troll factory to spread lies on social media and in comment sections of popular websites. Paid internet trolls whose online attacks are endangering journalists and political opponents. Extensive traces of this operation were identified across various social media platforms, encompassing Telegram, Twitter, Facebook, and TikTok.

Continue ReadingTrolls Factories: Spreading misinformation and fake news

The digital euro will not be freely disposable

The digital euro is set to undergo a significant shift in terms of its usability. Gone are the days of freely spending money on anything and everything. The digital euro will be programmed to only be spent on approved transactions, ensuring that it remains within the boundaries of its intended use. The European Central Bank's digital euro, as outlined in a recent report by the German Ministry of the Interior, will possess a distinct characteristic - programmability. This means that the digital euro will be designated for specific purposes, restricting its owner from unrestricted disposal.

Continue ReadingThe digital euro will not be freely disposable

The future of protests is here

Under the watchful eye of the machines, privacy has become a relic of the past. Surveillance systems, embedded in every corner of society, monitor our every move, word, and thought. Censoring what they called dissidents or promoters of public disorder. The police enforcement use this constant surveillance to maintain an iron grip on their human subjects, crushing any whisper of rebellion or resistance. Individuality is suppressed, conformity is enforced, and dissent is swiftly punished. In this blog post, we will delve into the present and future of protest.

Continue ReadingThe future of protests is here

The tragic case of Gonzalo Lira

Gonzalo Lira, formerly known as "Coach Red Pill", was a 55-year-old Chilean-American man who died in a Ukrainian prison. He was imprisoned there for speaking out about the war in Ukraine. This sparked an international controversy and raised questions about freedom of expression and human rights in times of war. Lira began his career with controversial dating tips on YouTube, where he claimed to be a relationship expert. But when the Russian army launched a large-scale invasion of Ukraine in February 2022, he suddenly switched to political topics.

Continue ReadingThe tragic case of Gonzalo Lira

What to do in case of a internet shutdown?

An internet shutdown occurs when an organization, often a government, intentionally disrupts the internet or mobile apps such as WhatsApp or Telegram in order to control online discourse. Experts define this as "a deliberate disruption of internet or electronic communications that renders them inaccessible or virtually unusable for a particular population group or in a particular location, often to exert control over the flow of information". These interruptions are also referred to as "blackouts" or "kill switches".

Continue ReadingWhat to do in case of a internet shutdown?

The Silent Threat: Manipulation and Surveillance in the World of Video Games

In the digital age, video games have evolved beyond mere entertainment to become complex virtual worlds where millions of players interact daily. While these immersive experiences offer an escape from reality, there's a growing concern about the dangers of manipulation and surveillance within the gaming industry. In this blog post, we'll delve into the subtle threats posed by these practices and their potential impact on players.

Continue ReadingThe Silent Threat: Manipulation and Surveillance in the World of Video Games

Tech Companies and keyboards: they know even your deleted messages

In an era dominated by digital communication, the concept of privacy has become increasingly elusive. Many users believe that deleting a message is synonymous with erasing it from existence, creating a false sense of security. However, the reality is far more complex, as tech companies possess the means to retain and analyze deleted messages. In this blog post, we'll explore the mechanisms that allow tech companies to access every word you type in your keyboard and the implications for user privacy.

Continue ReadingTech Companies and keyboards: they know even your deleted messages