PRVCY Insider

Family
Chris

Smile, the police are watching you on camera

You’ve probably noticed the CCTV cameras sprouting up everywhere, on city streets and in public places. Yes, these insidious Closed-Circuit Television (CCTV) cameras have become the new police in our lives.

Since the development of technology, police departments around the world are finding new ways to find criminals, but now we are all suspects.

Read More Ā»
Family
Chris

3 types of EMF radiation you need to keep away

Our home is the most precious material asset in our life. This means that many of us put a lot of effort into making our homes pleasant and comfortable. Many homeowners, however, fail to realise that comfort does not only come from the best furniture or architectural innovation.

There are a few invisible factors, silent thieves, as I like to call them, that affect the health of your home. Electromagnetic radiation is one of these factors that can seriously affect our health and wellbeing. Fortunately, homeowners have caught onto this and are growing more conscious of EMF protection.

Read More Ā»
Surveillance
Chris

10 years of lessons: Thank you Edward

Edward Snowden coined the topic of digital PRVCY because he believes that everyone deserves a separation between their private life and their right to intimacy. Snowden has been warning about the rapid advances in surveillance technology since 2013, ten years ago, and today we want to commemorate his commitment to digital privacy.

Read More Ā»
Artificial Intelligence
Chris

Exploring SMAT: A Social Media Analysis Toolkit for Activists, Journalists, and Researchers

In 2020, Mozilla Firefox announced the Social Media Analysis Toolkit (SMAT), which addresses the challenges of manipulated online discourse. Co-developed by Mozilla Fellow Emmi Bevensee, it is a free, easy-to-use and open-source tool designed to analyze digital conversations.

SMAT is designed to help activists, journalists, researchers and other non-profit organizations with censorship by analyzing and visualizing harmful online trends such as hate, misinformation and disinformation.

Read More Ā»
PRVCY Tips
Chris

Who has access to your emails?

There are various ways to gain access to your email account, for example via your devices or via a list that has just been hacked. It is therefore important to check that you are the only one who has access to your emails.

Read More Ā»
PRVCY Tips
Chris

What’s Wrong with Microsoft Teams?

Despite Microsoft Teams having more than 270 million active daily users in 2022, highly regulated industries and government organisations are still reluctant to deploy Teams or restrict its use due to information security concerns.

Yes, if a government agency doesn’t trust an app, website or service, neither should you.

Read More Ā»
Artificial Intelligence
Chris

Chatbots and data protection – the effects

Chatbots are those neat little pop-up windows that websites install to help you navigate.
Whether we’re looking for customer service, need help with shopping or just want to have a friendly chat, chatbots are there, smiling and offering quick answers and efficient solutions.

In this article, we’ll dive into the fascinating world of chatbot development and uncover the underlying mechanisms that enable their ability to understand, process and respond to human language, as well as the digital risks involved.

Read More Ā»
Digital Economy
Chris

The Power of Blockchain Technology: A Comprehensive Exploration

In the ever-evolving landscape of technology, one term has become increasingly synonymous with innovation, security, and transparency – blockchain. Originally devised as the underlying technology for cryptocurrencies like Bitcoin, blockchain has transcended its initial application, showing promise in revolutionizing various industries. In this comprehensive guide, we’ll unravel the intricacies of blockchain technology, exploring its core principles, applications, and the transformative impact it has on our digital future.

Read More Ā»
Family
Chris

Do you know what the Internets phone book is?

The Domain Name System (DNS) is the telephone book of the Internet.
Since the DNS is an integral part of most Internet queries, it can be a prime target for attacks.

By accessing your DNS, anyone can find out pretty much all of your online activity on your computer.

Read More Ā»
Family
Chris

9 ways how identity theft works

Unfortunately, this increase in online interactions has also led to a rise in identity theft, a malicious act in which criminals steal personal information to exploit or defraud unsuspecting victims.

Like other regions, Europe has had its share of identity theft, which has caused countless people financial loss and emotional distress.

Read More Ā»

PRVCY Insider

Master your Privacy and Cyber-Security

7 ways Big Tech is stealing your data right now, and how to stop it in 10 minutes.

EN - PRVCY Insider