Anonymity Routers – Choose Wisely

The Anonabox fiasco hasn’t deterred other projects hoping to sell an anonymity router of their own. In fact, many of them see Anonabox’s 9,000 disappointed backers as proof of the demand for their own privacy-in-a-box product. At least five new or soon-to-launch crowdfunding projects now claim to offer a consumer-focused anonymity router with names like

Hack Your Own Network

Kali Linux is a security-focused operating system you can run off a CD or USB drive, anywhere. With its security toolkit you can crack Wi-Fi passwords, create fake networks, and test other vulnerabilities. Here’s how to use it to give your own a network a security checkup. Kali Linux is packed with software for testing

EFF Response to “FBI on Encryption”

FBI Director James Comey gave a speech yesterday reiterating the FBI’s nearly twenty-year-old talking points about why it wants to reduce the security in your devices, rather than help you increase it.  Here’s EFF’s response: The FBI should not be in the business of trying to convince companies to offer less security to their customers.

Lollipop Smart Lock Screen

Smart lock screens that will let you be super secure without ever entering a PIN again. Well, it’s there now and it works as advertised. Just pair your favorite wearable or Bluetooth gizmo, and the secure lock screen goes away. Lose connection, and it’s back.

Google Adds USB Two-Factor Authentication

Google’s two-factor authentication system is a great way to keep your email and other accounts safe, especially if you’ve always got a smartphone (or even a dumb phone) around. Today Google is adding even more options beyond the current phone call, text message, email, and app-based verification. The latest update to the desktop version of

Detracktor Cell Phone Pouch

Tablets and cell phones not only can track you but also act as remote listening and video recording devices. These devices can be remotely turned on and have your conversations listened to. DETRACKTOR products will stop the tracking and bugging of your cell phone and tablets as well as protect your ID and credit cards

IoT: 7 Scary Security Scenarios

What’s not to like about the Internet of Things? You drive to work in your connected car while the GPS automatically navigates you away from a traffic jam that would have parked you on the expressway for two hours. At the same time, your onboard messaging app reads you an email from your boss telling

Biometric Data Collection Plans

Part of the Government’s ongoing National Security agenda would see the Australian Customs and Border Protection agency gather oodles of biometric data on travellers going in and out of Australia and share it with various law enforcement agencies around the country. The plan may be headed for a happy derailment, however, after a bi-partisan Parliamentary


In the closing credits of Citizenfour, Poitras took the unusual step of adding an acknowledgment of the free software projects that made the film possible: The roll call includes the anonymity software Tor, the Tor-based operating system Tails, GPG encryption, Off-The-Record (OTR) encrypted instant messaging, hard disk encryption software Truecrypt, and Linux. All of that

Updates for Tor and Tails

As most of you are aware it’s very unusual for me to post any software updates – I’m not your mum. If you use it you should know how to look after it. BUT, here are two you should be aware of. Tor Browser 4.0 is released The first release of the 4.0 series is

Symantec Intelligence Report September 2014

Welcome to the September edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.


Blackphone has a problem. The mere fact of holding one in your hand advertises to the world that you’re using a Blackphone. That might not be a big problem for people who can safely be assumed to have access to sensitive information—politicians, security contractors, say—but if you’re a journalist investigating your own corrupt government or

Enable Two-Step Authentication

You know that passwords are inadequate for securing your online accounts. Two-step authentication is better. It requires you to enter additional information, such as a number the site texts to you, in order to access your account. It’s less convenient, but more secure. Every site that offers two-factor authentication has a different way of enabling

For those who have “nothing to hide”

With all the security issues cropping, we all do our best to get everyone to understand what the issue is. I’m sure we all know someone who says “I have nothing to hide”. Here is a great argument for that: “Over the last 16 months, as I’ve debated this issue around the world, every single


No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor