#anonymousencrypted-platforms

[ follow ]
Information security
fromThe Hacker News
9 hours ago

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

A campaign targets ComfyUI instances for cryptocurrency mining and botnet enlistment through remote code execution exploits.
Cryptocurrency
fromFortune
1 day ago

A quantum threat to Bitcoin has some asking the unthinkable: Is it time to freeze old wallets belonging to Satoshi Nakamoto? | Fortune

Quantum computing poses a significant threat to Bitcoin wallets, particularly those of Satoshi Nakamoto, potentially allowing hackers to access them by 2029.
#linkedin
Privacy technologies
fromTech Times
1 day ago

LinkedIn 'BrowserGate' Investigation Alleges Secret Browser Extension Scanning Within Platform

LinkedIn allegedly collects extensive user data through a hidden system called 'Spectroscopy' without explicit user consent.
Privacy technologies
fromTNW | Insights
2 days ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
Privacy technologies
fromTech Times
1 day ago

LinkedIn 'BrowserGate' Investigation Alleges Secret Browser Extension Scanning Within Platform

LinkedIn allegedly collects extensive user data through a hidden system called 'Spectroscopy' without explicit user consent.
Privacy technologies
fromTNW | Insights
2 days ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
Deliverability
fromnews.bitcoin.com
2 days ago

Dmail Network to Cease Operations Following Five Years of Service

Dmail Network will permanently shut down its services on May 15, 2026, due to unsustainable infrastructure costs and a failed economic model.
Privacy professionals
fromZDNET
4 days ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
React
fromInfoWorld
4 days ago

Local-first browser data gets real

Signals provide a performant alternative for reactive state management in front-end development.
Information security
fromThe Hacker News
10 hours ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Bitgo CEO Proposes Using a Public Blockchain as the Ultimate Solution for Government Fraud

Mike Belshe proposes using a public blockchain to combat state and federal fraud, potentially addressing losses of up to $521 billion annually.
#data-privacy
Privacy professionals
fromenglish.elpais.com
1 week ago

This is how the illegal market for buying and selling personal data on Telegram works

Illicit data markets on Telegram in Latin America expose personal data, contributing to gender-based violence and highlighting vulnerabilities in government data management.
Privacy professionals
fromenglish.elpais.com
1 week ago

This is how the illegal market for buying and selling personal data on Telegram works

Illicit data markets on Telegram in Latin America expose personal data, contributing to gender-based violence and highlighting vulnerabilities in government data management.
#privacy
fromBitcoin Magazine
5 days ago
Privacy technologies

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

fromKTLA
1 month ago
Privacy technologies

These search engines don't track you

Several alternative search engines prioritize user privacy by avoiding tracking, encrypting queries, blocking ads, and offering customizable or ad-free search experiences.
Privacy technologies
fromBitcoin Magazine
5 days ago

What If Your VPN, Phone Number, And AI Chat Left Zero Trace? Meet Nadanada.me - The "Nothing At All" Privacy Revolution

LNVPN has evolved into a comprehensive privacy infrastructure service offering anonymous eSIM data plans, disposable phone numbers, and AI chat tools.
Web frameworks
fromTheregister
1 week ago

Firefox 149 brings a free VPN and native dialog boxes

Firefox 149 introduces a split view feature and a built-in free VPN with 50 GB monthly traffic for web content.
Digital life
fromScary Mommy
1 week ago

People On Reddit Are Sharing Their Favorite "Underground" Websites - Here Are The Best Ones

Many underground websites can enhance productivity, provide free resources, and offer unique experiences online.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
fromnews.bitcoin.com
3 days ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Guy Zyskind emphasized that the whitepaper reframes the conversation around quantum threats, stating that the traditional 10-year migration window now seems dangerously optimistic given Google's findings.
Information security
Privacy professionals
fromSilicon Canals
4 days ago

A money-transfer app stored customer passports on an unencrypted, publicly accessible server for nearly five years - Silicon Canals

Fintech companies face regulatory pressure to collect identity documents but lack enforceable obligations to protect them, leading to data breaches.
#meta
Information security
fromWIRED
4 days ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Privacy technologies
fromWIRED
2 weeks ago

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Information security
fromWIRED
4 days ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Privacy technologies
fromWIRED
2 weeks ago

The Danger Behind Meta's Decision to Kill End-to-End Encrypted Instagram DMs

Meta's retreat from end-to-end encryption on Instagram chat raises concerns about user privacy and sets a troubling precedent for big tech.
Russo-Ukrainian War
fromBusiness Insider
3 weeks ago

Inside the race to cut Russia off from the global internet

Russian military communications face severe disruption as SpaceX cuts Starlink access and authorities restrict Telegram, forcing troops to seek unreliable alternatives while the Kremlin systematically blocks major communication platforms.
#whatsapp
Privacy professionals
fromTechCrunch
6 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

Privacy professionals
fromTechCrunch
6 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

Privacy technologies
fromComputerWeekly.com
5 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromnews.bitcoin.com
5 days ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
#vpn
Information security
fromEngadget
2 months ago

ExpressVPN launches four new standalone apps

ExpressVPN introduced a four-app cybersecurity suite—ExpressKeys, ExpressMailGuard, ExpressAI, and Identity Defender—integrated into existing pricing, with some apps launched and others delayed or region-limited.
Privacy professionals
fromWIRED
1 week ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Privacy technologies
fromZDNET
2 weeks ago

Firefox is adding a free VPN for all users - but can you trust it?

Mozilla is launching a free VPN for Firefox users, available March 24, with limitations on data usage.
Law
fromAbove the Law
1 month ago

Hate To Say I Told You So Again: Your Chats Ain't Private - Above the Law

Communications with GenAI platforms lack attorney-client privilege protection because they occur between a client and a machine, not a lawyer, and are not confidential under platform terms of service.
Privacy professionals
fromWIRED
3 weeks ago

If You Don't Have One, I Recommend a Free Dark Web Monitoring Service

Dark web monitoring services track compromised data across public hacker forums and databases to alert users when their personal information appears in breaches, though most breached data is found on the clear web rather than the dark web itself.
Privacy technologies
fromZDNET
2 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy professionals
fromWIRED
3 weeks ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy technologies
fromSecuritymagazine
2 weeks ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
#digital-privacy
Privacy technologies
fromZDNET
3 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
3 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
3 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
3 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Gadgets
fromEngadget
2 months ago

How much do VPNs cost?

Compare VPNs using the same subscription duration and tier to avoid misleading advertised monthly rates and identify fair value.
Miscellaneous
fromenglish.elpais.com
1 month ago

Telegram, the platform favored by cybercriminals and disinformation

Telegram is linked to hoaxes, disinformation, and criminal use while founder Pavel Durov faces serious legal accusations including complicity in child pornography distribution.
#vpn-security
fromZDNET
3 weeks ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
3 weeks ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

fromZDNET
3 weeks ago
Privacy technologies

A guide to free VPNs: What you need to know, and what services to avoid

fromZDNET
3 weeks ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

fromBitcoin Magazine
2 months ago

Samourai Letter #3: Notes From The Inside

In modern life on the outside we are all so used to immediate feedback on everything we do. We write and publish an article and almost instantly comments start to roll in. You push to Twitter and the peanut gallery chimes in and has their say, and you as the content creator have an immediate idea of the general sentiment surrounding your work.
Food & drink
Privacy technologies
fromTech Times
3 weeks ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
fromwww.engadget.com
1 month ago

The best VPNs with free trials in 2026

A free trial to a virtual private network (VPN) can mean a few different things. Several of the best VPNs let you try them out without paying. A rare few, and only one on this list, let you try them without submitting payment information at all. Some VPNs have forever free plans that let you use them indefinitely without paying, as long as you're OK with some limits.
Gadgets
Privacy technologies
fromenglish.elpais.com
3 weeks ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
fromThe Verge
1 month ago

Telegram is reportedly being slowed down and restricted in Russia

Telegram users in Russia may begin noticing service disruptions on Tuesday after Russia's communications regulator, Roskomnadzor, reportedly moved to slow down and restrict access to the app, as reported by Russian news outlet . Roskomnadzor said in a statement to RBC, translated using machine translation, that it "will continue to introduce successive restrictions" on Telegram, claiming the app is not taking adequate steps to prevent fraud and criminal activity.
Miscellaneous
Privacy technologies
fromZDNET
4 weeks ago

I've used Tor browser for years, but now I'm using it on my Android phone - here's why

Tor Browser provides maximum privacy and anonymity on Android by routing traffic through encrypted relays, hiding IP addresses and location from websites, ISPs, and governments.
#tor
fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

fromZDNET
2 months ago
Privacy professionals

Why the most private way to browse the web isn't incognito mode (but this instead)

Gadgets
fromEngadget
2 months ago

How to turn off a VPN on iPhone

An iPhone VPN can be disconnected via the VPN app, Settings, or Control Center, or deleted to prevent it from reactivating.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Gadgets
fromThe Verge
1 month ago

How to un-Big Tech your online life

Recommendations include a new Mario Tennis Switch game, a wild time-travel movie, Sony's top earbuds, a new AI model, Dot calendar app, and zine discount.
Privacy technologies
fromTheregister
1 month ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
fromCoindesk
2 months ago

Privacy

This Privacy Notice applies to all personal information processed by CoinDesk, including its affiliates and subsidiaries (" CoinDesk," " we," " us," or " our "). It covers the information CoinDesk collects through the websites, mobile applications, electronic devices, all other products and services we provide, any other services that display this Privacy Notice, all of the associated content, functionalities, and advertising, and when you communicate with us by phone, email, or otherwise (collectively, the " Services ").
Privacy professionals
fromThe Hacker News
2 months ago

Google Disrupts IPIDEA - One of the World's Largest Residential Proxy Networks

Residential proxy networks have become a pervasive tool for everything from high-end espionage to massive criminal schemes,
Information security
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Privacy technologies
fromEngadget
7 months ago

The best VPN deals: Up to 87 percent off ProtonVPN, Surfshark, ExpressVPN, NordVPN and more

Long-term VPN plans often offer steep discounts, making annual or multi-year subscriptions substantially cheaper while adding privacy and extra security features.
Privacy technologies
fromFox News
2 months ago

5 tech terms that shape your online privacy

Limit app permissions, especially location, microphone, and photo access, and regularly adjust device privacy settings to prevent background data collection.
Privacy technologies
fromEngadget
2 months ago

How to use a VPN on iPhone

Install reputable VPNs on iPhone and iPad to secure public Wi‑Fi, mask location for streaming, and prefer researched, transparent providers over App Store ads.
Privacy technologies
fromEngadget
1 month ago

Why does my VPN keep disconnecting?

VPN disconnections usually stem from provider limits, device settings, internet issues, or kill-switch behavior and can typically be resolved through stepwise troubleshooting.
Privacy technologies
fromCointelegraph
1 month ago

Why Privacy Coins Often Appear in Post-Hack Fund Flows

Privacy coins act as a temporary black box in a broader laundering pipeline after hacks, reducing traceability and delaying enforcement while facilitating cash-out attempts.
fromZDNET
1 month ago

5 Linux servers that let you ditch the public cloud and reclaim your privacy - for free

You may have noticed that many European Union (EU) governments and agencies, worried about ceding control to untrustworthy US companies, have been embracing digital sovereignty. Those bodies are turning to running their own cloud and services instead of relying on, say, Microsoft 365 or Google Workspace. If you prize your privacy and want to control your own services, you can take that approach as well.
Privacy technologies
[ Load more ]