#encrypted-communication

[ follow ]
#privacy
fromElectronic Frontier Foundation
2 days ago
Privacy technologies

How Push Notifications Can Betray Your Privacy (and What to Do About It)

Push notifications can reveal personal information, and both Apple and Google have restrictions on sharing this data with law enforcement.
fromBitcoin Magazine
2 weeks ago
Privacy technologies

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy technologies
fromComputerWeekly.com
2 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy technologies
fromBitcoin Magazine
2 weeks ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Privacy professionals
fromFast Company
1 day ago

How to hide your sensitive info (for real) when using ChatGPT and other AI chatbots

Chatbots can be useful for summarizing complex information, but sensitive data must be properly redacted to ensure privacy.
Information security
fromBusiness Matters
2 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
fromWIRED
4 days ago

Telegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market

Xinbi Guarantee has also hosted a wide variety of other black market offerings, including harassment services that threaten or throw feces at a victim for a fee, and even sex workers as young as 14 who are likely trafficking victims.
UK news
fromNature
5 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Privacy professionals
fromZDNET
4 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
#gmail
Information security
fromSecurityWeek
6 days ago

Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users

Google introduces end-to-end encryption in Gmail for enterprise users on mobile devices, enhancing privacy and security for email communications.
Privacy technologies
fromTechRepublic
5 days ago

Google Rolls Out End-to-End Encryption to Eligible Gmail Users on Mobile

Gmail now offers end-to-end encryption for mobile devices, enhancing email privacy for eligible Google Workspace users.
Information security
fromSecurityWeek
6 days ago

Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users

Google introduces end-to-end encryption in Gmail for enterprise users on mobile devices, enhancing privacy and security for email communications.
Privacy technologies
fromTechRepublic
5 days ago

Google Rolls Out End-to-End Encryption to Eligible Gmail Users on Mobile

Gmail now offers end-to-end encryption for mobile devices, enhancing email privacy for eligible Google Workspace users.
#cybersecurity
Information security
fromThe Hacker News
5 days ago

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

A cluster of 108 malicious Chrome extensions collects user data and injects ads, compromising browser security.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromThe Hacker News
5 days ago

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

A cluster of 108 malicious Chrome extensions collects user data and injects ads, compromising browser security.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
#whatsapp
Privacy technologies
fromTechRepublic
4 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

fromThe Verge
2 months ago
Privacy technologies

WhatsApp's new 'lockdown' settings add another layer of protection against cyberattacks

Privacy technologies
fromTechRepublic
4 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

fromThe Verge
2 months ago
Privacy technologies

WhatsApp's new 'lockdown' settings add another layer of protection against cyberattacks

#vpn
Information security
fromEngadget
2 months ago

ExpressVPN launches four new standalone apps

ExpressVPN introduced a four-app cybersecurity suite—ExpressKeys, ExpressMailGuard, ExpressAI, and Identity Defender—integrated into existing pricing, with some apps launched and others delayed or region-limited.
Privacy professionals
fromWIRED
3 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Privacy professionals
fromWIRED
1 month ago

If You Don't Have One, I Recommend a Free Dark Web Monitoring Service

Dark web monitoring services track compromised data across public hacker forums and databases to alert users when their personal information appears in breaches, though most breached data is found on the clear web rather than the dark web itself.
Privacy technologies
fromEngadget
2 weeks ago

Proton adds a secure video conferencing service called Meet to its toolbox

Proton launches Meet, a privacy-focused video-calling service, competing with Microsoft and Google while ensuring user anonymity and security.
Privacy professionals
fromWIRED
1 month ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Information security
fromZDNET
1 month ago

I tested NordVPN's free scam checker against a real threat in my inbox - here's how it did

NordVPN launched a free AI-powered scam checker tool that detects suspicious links, files, text, and images by identifying malicious databases and common scam patterns like scare tactics and artificial urgency.
Privacy technologies
fromZDNET
3 weeks ago

Firefox is adding a free VPN for all users - but can you trust it?

Mozilla is launching a free VPN for Firefox users, available March 24, with limitations on data usage.
Gadgets
fromEngadget
2 months ago

How much do VPNs cost?

Compare VPNs using the same subscription duration and tier to avoid misleading advertised monthly rates and identify fair value.
Law
fromAbove the Law
1 month ago

Hate To Say I Told You So Again: Your Chats Ain't Private - Above the Law

Communications with GenAI platforms lack attorney-client privilege protection because they occur between a client and a machine, not a lawyer, and are not confidential under platform terms of service.
Miscellaneous
fromenglish.elpais.com
2 months ago

Telegram, the platform favored by cybercriminals and disinformation

Telegram is linked to hoaxes, disinformation, and criminal use while founder Pavel Durov faces serious legal accusations including complicity in child pornography distribution.
Information security
fromSecurityWeek
1 month ago

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
fromTheregister
2 months ago

Matrix messaging gaining ground in government IT

FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Software development
Privacy technologies
fromZDNET
4 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
E-Commerce
fromCointelegraph
2 months ago

How a Third-Party Leak Fueled Phishing Against Ledger Users

A breach at an e-commerce partner can expose customers' order and contact details, enabling highly convincing phishing that leverages real purchase context.
fromwww.engadget.com
2 months ago

The best VPNs with free trials in 2026

A free trial to a virtual private network (VPN) can mean a few different things. Several of the best VPNs let you try them out without paying. A rare few, and only one on this list, let you try them without submitting payment information at all. Some VPNs have forever free plans that let you use them indefinitely without paying, as long as you're OK with some limits.
Gadgets
Privacy technologies
fromSecuritymagazine
1 month ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
Information security
fromThe Hacker News
1 month ago

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Storm-2561 uses SEO poisoning to distribute fake VPN clients that steal credentials by redirecting users to malicious websites hosting digitally signed trojans.
Privacy technologies
fromNextgov.com
4 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
fromThe Verge
2 months ago

Telegram is reportedly being slowed down and restricted in Russia

Telegram users in Russia may begin noticing service disruptions on Tuesday after Russia's communications regulator, Roskomnadzor, reportedly moved to slow down and restrict access to the app, as reported by Russian news outlet . Roskomnadzor said in a statement to RBC, translated using machine translation, that it "will continue to introduce successive restrictions" on Telegram, claiming the app is not taking adequate steps to prevent fraud and criminal activity.
Miscellaneous
Privacy technologies
fromWIRED
1 month ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
#end-to-end-encryption
Privacy technologies
fromwww.theguardian.com
1 month ago

Instagram to remove end-to-end encryption for private messages in May

Instagram will disable end-to-end encryption on direct messages from May 2026, allowing Meta to access all message contents due to low user adoption of the feature.
fromZDNET
2 months ago
Privacy technologies

Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats

Privacy technologies
fromwww.theguardian.com
1 month ago

Instagram to remove end-to-end encryption for private messages in May

Instagram will disable end-to-end encryption on direct messages from May 2026, allowing Meta to access all message contents due to low user adoption of the feature.
fromZDNET
2 months ago
Privacy technologies

Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats

#vpn-security
fromZDNET
1 month ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
1 month ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

fromZDNET
1 month ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
1 month ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

#tor
fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

#digital-privacy
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromTech Times
1 month ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
Privacy technologies
fromZDNET
1 month ago

I've used Tor browser for years, but now I'm using it on my Android phone - here's why

Tor Browser provides maximum privacy and anonymity on Android by routing traffic through encrypted relays, hiding IP addresses and location from websites, ISPs, and governments.
fromFast Company
2 months ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
fromZDNET
1 month ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
Information security
fromZDNET
2 months ago

7 apps I use to lock down, encrypt, and store my private files - and most are free

Use dedicated file-and-folder security apps across devices, stay vigilant about sharing and access, and keep operating systems and apps up to date.
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Firewalls can fail, passwords can be stolen, but strong encryption remains your last line of defense. InToday's digital world, protect sensitive personal details is more critical and important than ever. The AES algorithm (Advanced Encryption Standard) algorithm is one of the most trusted and widely used way or method for securing data against unauthorized access and frauded. Advanced Encryption Standard supports different levels like 128-bit, 192-bit, and 256-bit encryption, providing strong security for personal data and more.
Information security
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Privacy technologies
fromGSMArena.com
1 month ago

NordVPN call protection is now available on Android to flag potential scams

NordVPN launches call protection for Android users across multiple countries, warning about potential scam calls before answering by analyzing phone number reputation data.
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Privacy technologies
fromEngadget
7 months ago

The best VPN deals: Up to 87 percent off ProtonVPN, Surfshark, ExpressVPN, NordVPN and more

Long-term VPN plans often offer steep discounts, making annual or multi-year subscriptions substantially cheaper while adding privacy and extra security features.
Privacy technologies
fromEngadget
2 months ago

Why does my VPN keep disconnecting?

VPN disconnections usually stem from provider limits, device settings, internet issues, or kill-switch behavior and can typically be resolved through stepwise troubleshooting.
[ Load more ]