Your daily reads on everything digital
All Categories
Research
Product Updates
Privacy
How-To
Meet the Team
How to reduce and control your digital footprint?
A digital footprint refers to data we leave behind after going online. On the surface level, it covers all the details we submit or disclose…
Intrusive bossware and how it monitors remote workers
Bossware refers to software that employers use to measure just how productive their teams are. Such employee-monitoring solutions differ…
What is SSH, and how does it work?
SSH is a network protocol that allows you to connect to a remote computer or a server securely. It is not a specific product but a set of…
How does browser fingerprinting work?
Browser fingerprinting is a web-tracking method that remembers and identifies users according to their devices. It is one of the data…
What is PPTP? The obsolete protocol explained
Point-to-Point Tunneling (PPTP) is now a mostly obsolete network protocol, outranked by more reliable counterparts like IKEv2 or OpenVPN…
What is whitelisting?
Whitelisting is a trust-centric practice in cybersecurity. It usually refers to the creation of exceptions for a specific rule. Let’s say…
How internet shutdowns infringe democracy and human rights
Internet shutdowns are incidents when the internet and even cellular services suddenly become inaccessible or unusable. We have witnessed…
Mandatory SIM card registration policies across the world
Over the last decade, many governments have introduced policies governing prepaid SIM card registration. In short, citizens must share their…
What can your car know about you?
Car data refers to the information about the vehicle and its use, drivers, and passengers. Although you might treat your late-night ride…