Privacy Matters
Subscribe
Sign in
Home
Archive
About
New
Top
Discussion
Nothing to hide, but a lot to protect
An innocent man is killed during a "swatting" incident because he had a rare Twitter handle that someone wanted. How could this happen?
Signature Management Unit, LLC
Jul 30, 2021
1
Share this post
Nothing to hide, but a lot to protect
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
PEGASUS Unleashed: Protecting yourself from spyware
Israeli firm NSO Group again makes headlines for their invasive spyware, targeting journalists, political opponents, and others. Here's our take on how…
Signature Management Unit, LLC
Jul 20, 2021
1
Share this post
PEGASUS Unleashed: Protecting yourself from spyware
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
April 2021
License plates, emails, & basic user data: why losing them is a major security risk
We explore the impacts of a mobile parking app cybersecurity incident, how it was framed, and what could have been improved.
Signature Management Unit, LLC
Apr 27, 2021
Share this post
License plates, emails, & basic user data: why losing them is a major security risk
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
Internet surveillance and you: how to fight browser fingerprinting and other invasive tech online
Corporate surveillance works to track your web browsing to sell you ads. How does the lone privacy user fight such a behemoth?
Signature Management Unit, LLC
Apr 13, 2021
Share this post
Internet surveillance and you: how to fight browser fingerprinting and other invasive tech online
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
War crimes & military coups: Here's our take on secure comms and why they matter
Brutal violent crimes by military leaders in Myanmar led a U.N. investigator to recommend protestors use ProtonMail and Signal to communicate securely.
Signature Management Unit, LLC
Apr 8, 2021
Share this post
War crimes & military coups: Here's our take on secure comms and why they matter
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
Burner phones in 2021: increasingly cumbersome but still worth it
Not just for spies or criminals, we share our thoughts on recent attempts to secure private communications "infrastructure", aka burner phones
Signature Management Unit, LLC
Apr 7, 2021
1
Share this post
Burner phones in 2021: increasingly cumbersome but still worth it
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
March 2021
Covert Comms (Issue № 5)
Swiss hackers and US security cameras | Chinese companies pose a threat to the US | China brings surveillance tools to Hong Kong | UK secretly tests…
Signature Management Unit, LLC
Mar 24, 2021
1
Share this post
Covert Comms (Issue № 5)
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
Covert Comms (Issue № 4)
CIA covert bases expand in Africa | viral Tom Cruise deepfakes make waves | new iPhone anti-stalking feature | the Pope visits Iraq | FBI needs help…
Signature Management Unit, LLC
Mar 10, 2021
3
1
Share this post
Covert Comms (Issue № 4)
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
COVID-19 & Privacy: here's how contact tracing works in this city of 600,000 people
We tackle some privacy issues surrounding COVID-19 contact tracing and explore the city of Milwaukee's present protocols. It's not as scary as it could…
Signature Management Unit, LLC
Mar 4, 2021
2
Share this post
COVID-19 & Privacy: here's how contact tracing works in this city of 600,000 people
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
Covert Comms (Issue № 3)
Our weekly(ish) brief on current events, espionage, digital security, and privacy from around the world.
Signature Management Unit, LLC
Mar 1, 2021
2
Share this post
Covert Comms (Issue № 3)
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
February 2021
The CIA can conduct covert cyber attacks against Russia and China. So what happens when they hack us?
Experts say a strong cyber offense can decrease cyber attacks against the homeland. We explore the effects of cyber covert action in the context of the…
Signature Management Unit, LLC
Feb 25, 2021
3
Share this post
The CIA can conduct covert cyber attacks against Russia and China. So what happens when they hack us?
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
Covert Comms (Issue № 2)
Our weekly(ish) brief on current events, espionage, digital security, and privacy from around the world.
Signature Management Unit, LLC
Feb 23, 2021
3
Share this post
Covert Comms (Issue № 2)
privacymatters.substack.com
Copy link
Twitter
Facebook
Email
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts