PRVCY 101: iOS App store Breaking Down the Monopoly

Anyone familiar with the closed-off existence of Apple's mobile operating system knows that alternatives outside of the user experience desired by Apple are only accessible with some effort. In this blog post, we delve into the monopoly of the Apple Store, examining its impact, controversies, and these alternatives.

Continue ReadingPRVCY 101: iOS App store Breaking Down the Monopoly

PRVCY 101: Elevating the Android App Store Experience with Security and Privacy

For the majority of Android users, the Play Store is the primary port of call when it comes to apps and games. Due to its obligated character of use coming immediate availability on most Android devices, very few people think about looking for alternatives. Yet there are a surprising number of Play Store competitors that have nothing to hide in terms of what they offer. From the complete open source store to commercial alternatives, everything is represented.

Continue ReadingPRVCY 101: Elevating the Android App Store Experience with Security and Privacy

Iphone is having a identity crisis

Apple has been in the process of repositioning itself as a service company for some time now. The company has been constantly rolling out new and updated subscription options for cloud storage, music and news. Don't forget that Apple has invested enough money in Apple TV to win an Academy Award for Best Movie and beat Netflix. And Apple securing the rights to Major League Soccer and bringing Lionel Messi to a soccer team in Florida is one of the biggest moves in sports and streaming right now. That's just the tip of the iceberg, because inside, the hardware is losing the magic of years gone by. What's going on?

Continue ReadingIphone is having a identity crisis

Tech Companies and keyboards: they know even your deleted messages

In an era dominated by digital communication, the concept of privacy has become increasingly elusive. Many users believe that deleting a message is synonymous with erasing it from existence, creating a false sense of security. However, the reality is far more complex, as tech companies possess the means to retain and analyze deleted messages. In this blog post, we'll explore the mechanisms that allow tech companies to access every word you type in your keyboard and the implications for user privacy.

Continue ReadingTech Companies and keyboards: they know even your deleted messages

Kids and teens have never known a world without data sharing

Itā€™s not like you just walked into the kitchen one morning and your kid was sucking on a binky and editing Wikipedia, right? But somehow it is pretty close to that. For years thereā€™s been an ongoing conversation on internet usage in familiesā€™ lives, and in 2020, the pandemic made us come face-to-face with that elephant in the room: the internet.

Continue ReadingKids and teens have never known a world without data sharing

e-SIM and data protection: convenience or safeguarding data?

As e-SIM technology continues to revolutionize mobile connectivity, the debate around its implications for data privacy rages on. Is the convenience of e-SIMs compromising our data security, or are they the future's safeguard for our personal information? Explore the delicate balance between modern convenience and data protection in this insightful article.

Continue Readinge-SIM and data protection: convenience or safeguarding data?

Cyber espionage: an old political tool

In the ever-evolving landscape of international politics, the practice of cyber espionage has emerged as a formidable tool with a long history. As countries vie for power and influence, the use of technology to gather intelligence and gain strategic advantages dates back decades. This article explores the origins and evolution of cyber espionage as a time-tested political instrument, shedding light on its significance in contemporary geopolitics. Discover how this covert practice continues to shape global affairs and the delicate balance of power among nations. Explore the covert world of cyber espionage and its role in shaping the political narratives of our time.

Continue ReadingCyber espionage: an old political tool