CBP bought ad location data for surveillance
Using advertising infrastructure, Customs and Border Protection can track users’ locations when targeted devices are served ads
Using advertising infrastructure, Customs and Border Protection can track users’ locations when targeted devices are served ads
Independent and freelance journalists working without institutional support face unique risks when filming federal agents. We share the gear, in-field security tactics, and digital security considerations used by two journalists on the ground to stay safe and to secure their footage.
A recent story of a Proton Mail user unmasked for Swiss authorities highlights what the company can and can’t protect
Intellexa founder and three others found guilty of using mercenary spyware to target journalists and senior government officials in Greece
Thinking of switching to Linux? Here are some distributions to consider for security
FPF’s Harlo Holmes offers advice on 404 Media podcast
Lockdown Mode is not just for dealing with remote malware — it also appears to shut down some forensic devices.
Court documents show how investigators can track digital activities, and reveal ways to harden journalists’ devices
We’re showing our favorite digital security tools some love in our newsletter this week. Read up on why we love security keys.
Let’s appreciate all that passcodes do for us by sending this week’s Valentines to them and their natural home, the password manager.
Larger groups come with more risk to your privacy, but you can make decisions about how to navigate groups safely
What can journalists do if they expect someone might take devices with sensitive information?
As heart-shaped chocolate boxes fill store aisles, allow us a moment to write a love letter to one of our favorite tools: Signal.
Confer is an open source, end-to-end encrypted chatbot.
Following the search of Washington Post reporter Hannah Natanson’s home, here are concrete steps to take to safeguard yourself and your sources
If you got one of these emails, you weren’t alone.
Even if you don’t live in the Golden State, there are things you can do to opt out of invasive data broker companies.
How might Chrome put guardrails on AI ‘agents’?
Read on for suggestions for staying safe while on the road
The Pentagon inspector general’s report gives more details on the incident than ever before.
To protect your sensitive conversations, you’ll need to make sure your device is safe.
Researchers discovered phone numbers and, in some instances, associated profile photos and names through WhatsApp’s contact discovery tool
Data breaches are an unfortunate fact of modern life. While we can’t always control the security of the apps and services we use, there are some steps we can take to limit how much of our data is out there.
The names, email addresses, and chat histories of over 17,000 employees and external business contacts in the company’s Slack system were exposed thanks to one infected computer.
Despite their growing presence, AI-powered browsers aren’t ready for prime time when it comes to security