privacy
Age verification is forcing companies to undermine data privacy laws.
On February 3, 2026, the I2P anonymity network was flooded with 700,000 hostile nodes in what became one of the most devastating Sybil attacks an anonymity network has ever experienced. The network normally operates with 15,000 to 20,000 active devices. The attackers overwhelmed it by a factor
🇬🇧->🇵🇱 Przejdź do polskiej wersji tego wpisu / Go to polish version of this post
The Internet is almost anonymous and privacy-preserving by design. I mean, unless some administrator actively tries to track you, there is no built-in...
Changes to Ubuntu's telemetry with the new Ubuntu Insights tool include more frequent reporting, more controls and more transparency on what's collected.
Join the Be Like Clippy movement to make technology more user-friendly and transparent. Including a list of custom clippy profile pictures
With Firefox 145, we’re rolling out major privacy upgrades that take on browser fingerprinting — a pervasive and hidden tracking technique that lets we
Timelinize ("time-lynn-eyes") is an open source personal archival suite, designed for modern family history. It organizes all your data onto a single, unified timeline on your own computer.
The web browser made for people, with love. Best privacy by default, unbiased ad-blocking, no bloat and no noise. Fully open source.
(WIP) Zed fork focused on privacy and being local-first - zedless-editor/zed
Apps often demand excessive permissions, accessing your contacts, location, and more. Discover why sticking to your browser offers better privacy and control.
Barış Özmen Blog
: Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins
Facebook and Yandex link Web and App usage via a localhost network connection
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.
Contribute to privastead/privastead development by creating an account on GitHub.
ASIO boss Mike Burgess says he may soon use powers to compel tech companies to cooperate with warrants and unlock encrypted chats to aid national security investigations.