Presented under the guise of trade deals or national security, we lay out some of the laws and bills still in Parliament that affect Canadians‘ internet.
Businesses might be advertising on fake news sites without realizing it. Learn how to stop the spread of fake news sites and defund their operations.
A Tor hidden service runs inside the Tor network itself. In this case, network traffic enters the Tor network, but never exits.
How to maximize privacy under Australia’s data retention law. Use a VPN, encrypted OTT communication apps, and avoid your ISP’s email service.
Don’t let just anyone have your Social Security Number! Here’s how to secure your SSN online, and what to do if you believe it’s been stolen.
Looking for some popular or niche software? Don’t trust just any website! Our guide should help you safely download and install software from the web.
For this year’s Data Privacy Day, we’re encouraging readers to spend a few minutes securing their private information against identity theft
What is DRM? Why is it used? Is DRM good or bad? Real examples of hardware and software DRM. Blockchain DRM. DRM alternatives and arguments.
Fight for your right to privacy by sending your ISP a subject access request, signing the petition to repeal the Snooper’s Charter, and contacting your MP.
If you find yourself making a large number of online payments, you may want to consider these helpful tips to stay safe when paying online.