How can we help?

How can we help? Organizers, activists, journalists, whistleblowers, and others, do you need help learning how to use encryption and private communication tools? We want to teach you. We call our events Cryptoparties. They’re informal, low-pressure, free gatherings where anyone who wants help stepping up their privacy can learn from people who use these tools…

Read More

Developers May Gain Access to More Data Collected by Alexa

We discussed surveillance devices that people voluntarily bring into their homes at last night’s meeting. One of the threats we mentioned was that any data collected by a private entity can be obtained by a government entity with a court order or warrant. Another threat is that the rules regarding how data collected is handled…

Read More

Twitter Finally Offers App-Based Two-Factor Authentication

Enabling two-factor authentication is one of the best ways to improve the security of your online accounts. Most websites that offer two-factor authentication have opted to use either the Time-based One-time Password Algorithm (TOTP) or HMAC-based One-time Password Algorithm (HOTP), which are used in conjunction with an application such as Authy or Google Authenticator to…

Read More