Tech

Your iPhone Has a List of Every Location You’ve Visited

Apple is widely regarded as a tech company that actually cares about privacy for people using its devices. However, using an iPhone over an Android device doesn’t guarantee you better privacy protection. One feature that concerns us from a privacy standpoint is the location suggestion feature. While Apple protects that location data with your pass code, FaceID…

Tech

Why Collaborative Filtering Is Putting You In a Bubble

Popular websites and internet companies, like Amazon, Netflix and Facebook, use collaborative filtering to make recommendations to users about what they may be interested in. Collaborative filtering is what lets Amazon recommend other products, Netflix recommend new shows or movies, and how Facebook determines which posts you see in your News Feed. What is Collaborative Filtering?…

Tech

Best Firefox Privacy Add-Ons

Contents Privacy Badger uBlock Origin LessPass Cookie AutoDelete HTTPS Everywhere Decentraleyes uMatrix Search Encrypt TrackMeNot NoScript Security Suite Privacy Badger Privacy Badger is a tracker blocker that learns which trackers to block. Rather than maintaining a blacklist of “tracking” domains, Privacy Badger watches which domains follow you from site to site and blocks them once…

Tech

What Is Facial Recognition?

Government agencies around the world have started experimenting with using facial recognition technology in their surveillance and security efforts. While this surveillance may seem concerning, perhaps even more scary is that marketers are also using facial recognition data for identifying and tracking their customers. Companies spent $3.35 billion on facial recognition technology in 2016. That…

Tech

How Does RKill Work?

RKill is an antivirus program on Windows that terminates malware and other viruses. You should use RKill along with other antivirus software for removing viruses and malware from you device. RKill is a simple utility that will stop known malware processes from running on your device. While it will kill the malware from running, it won’t…

Tech

Comparison: Whitelist vs. Blacklist

Whitelists and blacklists are ways of filtering specific types of data, or from blocking malicious or unauthorized access to systems or databases. In the context of computer security, blacklisting and whitelisting are used as a means of access control. However, there are some differences between the two methods, and each method has its own advantages.…

Tech

Twofish Encryption: What Is It?

Twofish is an encryption algorithm designed by Bruce Schneier. It’s a symmetric key block cipher with a block size of 128 bits, with keys up to 256 bits. It is related to AES (Advanced Encryption Standard) and an earlier block cipher called Blowfish. Twofish was actually a finalist to become the industry standard for encryption,…