Privacy deep dives


 

What is an evil twin attack, and should they worry you?

January 26th, 2024 in Privacy deep dives

An evil twin attack is a cyberattack that occurs when an attacker  sets up a malicious WiFi network that mimics a legitimate one, often in…

What is ChaCha20?

December 28th, 2023 in Privacy deep dives

ChaCha20 is a performant and lightweight, yet highly secure, 256-bit stream cipher used to encrypt and decrypt data. It’s often used to secure data transmitted…

What is Freenet (now called Hyphanet)?

December 11th, 2023 in Privacy deep dives

Freenet is a decentralized, encrypted, open-source dark web designed to let you communicate with others, upload and download content, and access online information anonymously.  Learn…

Google Chrome’s IP Protection is privacy washing

November 21st, 2023 in Privacy deep dives

Last month, Google launched a new feature for Chrome called IP Protection that makes it easier for the company to spy on you. No surprise,…

What is WPA3?

November 9th, 2023 in Privacy deep dives

WiFi is the technology that lets you wirelessly connect your computer or mobile device to the internet. As with any connection on a network, there…

What is perfect forward secrecy?

October 31st, 2023 in Privacy deep dives

Perfect forward secrecy (PFS) is a cryptographic feature of internet communication protocols that ensures even if a session is compromised, past and future sessions remain…

What is a zero-day exploit and why are they dangerous?

October 20th, 2023 in Privacy deep dives

A zero-day is a software vulnerability or security flaw in a computer system that its developers or vendors are unaware of. The term zero-day (also…

What is IKEv2?

September 29th, 2023 in Privacy deep dives

IKEv2 is a VPN protocol used to secure VPN connections. Part of the IPSec protocol suite, it is sometimes (and strictly speaking, more correctly) referred…

Is Amazon Alexa spying on you?

September 26th, 2023 in Privacy deep dives

“Amazon and third parties (including advertising and tracking services) collect smart speaker interaction data. We find that Amazon processes voice data to infer user interests…

Secure
your internet

Get Proton VPN
Get Proton VPN