stories in this tag
Even Before Russian Interference, US Election Tech Was Failing
Nine Essential Privacy Settings and Add-ons for Mozilla Firefox
This Year's Top 7 Online Privacy Tools
How To Store Encrypted Data Collected By Your Web Application With PHP7 and LibSodium
VPN Leaks that Threaten Your Online Privacy Daily
Five Crucial Privacy and Security Settings for iOS 13
5 CSRF Vulnerabilities Known For Highest Bounty Rewards
How To Avoid Digital Identity Theft - 6 Steps To Stay Safe
GDPR vs CCPA: Data Privacy On The Lead [Infographic]
#Data Privacy Compliance
Happy Birthday, Internet!
Google Analytics & Privacy: Why Does it Matter?
#Open Source Software
How Worthwhile Is It to Use a Password Management System
Posting Videos of Your Kids on YouTube Is Weird
Strong Customer Authentication (SCA): The True Cost Might Shock You
#Strong Customer Authentication
Research Suggests That a Hard Brexit Could Lead to Significant Confusion within the UK Cloud Market
Compliance is Not a Guarantee Against Data Breach
#Data Privacy Compliance
A Sweater of Safety Wrapped Around My Internet Connection
Why Using a VPN is the Best Way to Protect Your Personal Data When Surfing the Web
How You Can Protect Your Online Privacy: Easy Steps for Daily Activities
Why Privacy Matters And How To Stop Online Harassment
Bitcoin is the bastion of Freedom Tech
#Bitcoin Vs Government
What is Alternative Mobility? And Why Digital Identity Is Crucial For Its Future
There is No More Encryption Debate: Backdoors Threaten the Whole World
[Mythbusting] How to Choose the Right VPN Service?
Your Data is the DNA of Artificial Intelligence
[Interview] Decentralization and Privacy in Telecommunications
Data Breaches: No Longer Delivering Punches to Business Reputation?
Why You Should Be Using a VPN in 2019 ?
#Virtual Private Network
Does The Best Secure Email Really Exist?
What Is The Best Private Encrypted Messenger! [10 Messengers Evaluated]
No Logs Policy: Do the Terms and Conditions of your VPN Really Mean It?
Building Trust And Security In A Collaborative P2P Marketplace - Why ID Verification Is Critical
Living in the world of AI - The Human Transformation
Privacy on Twitter: TOS and Privacy Settings
The Mythical Privacy in the Age of Bitcoin - And What We're Doing About It
Facebook & the Libra Effect: The New Importance of Privacy in Online Marketplaces
What is “Cyberbiosecurity?" and why we should stop using the term
Privacy in Crypto is Under Siege, We Need More Solutions to Protect Us
Why Governments Use Mass Surveillance—And What To Do About It
Apple Card is a great jail card
Understanding VPN Jurisdiction and International Privacy
Internet Privacy Tools for 2019
What to Learn From How the Korean Government Regulates Blockchain
Facial Recognition Login: Is This The New Security Standard?
VPNs for beginners: what a VPN can and cannot do
5 Best Browser Extensions For Protecting Your Privacy Online
We Need to Talk About Nigeria and Cybersecurity
Facebook: The Magic 8 Ball
Decentralized Cloud Storage is changing the face of the internet (2/2)
#Decentralized Cloud Storage
The best privacy-focused browsers in 2019
Privacy: What You Need To Know
Flame: The Most Sophisticated Cyber Espionage Tool Ever Made
On the Instagram API changes
The evolution of VPNs: from business security to privacy protection
Is this an Ubuntu-based Botnet deploying Tor Relays and Bridges?
The Inherent Value Of Private Information
Welcome to the Private Party!
State Controlled Internet: The Story About VPNs in China
Introducing Wibson, a decentralized data marketplace empowering individuals to monetize their own…
What is Secure Multi Party Computation?
Some Tor Relays, you might want to avoid.
Avoiding consumer lock-in with the decentralised web
The Arweave Project
Delivering Practical Privacy in Blockchain and DLT Applications
Hunting with ꓘamerka 2.0 aka FIST (Flickr, Instagram, Shodan, Twitter)
Secure Your Emails in 5 Minutes Using PGP
IronHide: Better Team Encryption
Remembering 2018’s Most Prominent Data Breaches
What is the Best Free Privacy Software?
#Best Privacy Software
Christian Stewart ✔️
Dark Web Shrinking At A Fast Pace, Just 15% Tor Sites Online
GDPR and Self-Sovereign Identity: What Lies Ahead
#Self Sovereign Identity
How Policy Leaders Can Democratize Data Ethics
Cryptocurrency Exchange: A DEX Offering The Complete Solution
Privacy Is Dead, And We Have Killed It
Independent audits, a new transparency practice in the VPN industry
There ain’t no such thing as a free service, and why I’m giving up Facebook in 2019.
How Browsers Help Us Lose Privacy (New Tricks)
The Benefits of Proxy Servers for Businesses
How to Track Someone Using Their Smartphone
Immutability is a Double-Edged Sword: Blockchain and Data Privacy
5 Reasons I Switched From Bitcoin To Dash
Leah Stella Stephens
Inadequate Smartphone Security as Second-Hand Smoke
A Beginner’s Guide to Personal Privacy Online
Domain Fronting in a nutshell
VPN vs Antivirus: Which is a Bigger Cyber Security Market and Which Does Your Company Need?
We Gave Privacy Policies an AI Overhaul, and You’ll Never Have to Read Them Again!
Understanding Blockchain Private Data. A Hands-on Example
Digital Trends’ “Tech for Good” Campaign Took Center Stage During SXSW
A Decentralised Blockchain-Based VPN Network Could Be The Future of Private Communication
Big Tech’s User Data Violations
6 Tips for Choosing the Right VPN for Personal Use
What VPN services aren’t telling you about data logging
The Good News From The CIA Hacks
President Trump’s Advisors are Wrong About Encryption
Why is Facebook Releasing the White Paper for their ‘Blockchain’ project Libra Now?
So You Want to Leave Facebook
Can the Free Market Save Privacy?
Facial Recognition Tech Raises Some Real Ethical Dilemmas
Why new social network Voice might not be a better answer to Facebook
We are all Digital Slaves
The Stablecoin you decide to spend will determine how future banking unfolds
Hackernoon Newsletter curates great stories by real tech professionals
Get solid gold sent to your inbox. Every week!
Topics of interest
Best of Hacker Noon