The final piece of our four-part series on the various veillances to be aware of, how they operate and how you can reduce your exposure.
The is where we post our essay style content for a longer read and analysis of a certain subject matter
The is where we post our essay style content for a longer read and analysis of a certain subject matter
The final piece of our four-part series on the various veillances to be aware of, how they operate and how you can reduce your exposure.
Part three of our four-part series on the various veillances to be aware of, how they operate and how you can reduce your exposure.
Part two of our four-part series on the various veillances to be aware of, how they operate and how you can reduce your exposure.
Part one of our four-part series on the various veillances to be aware of, how they operate and how you can reduce your exposure.
Introduction
There is an emerging trend of insurance companies leveraging IoT devices or their own surveillance-based devices to harvest more data from our daily lives with the promise of a cost saving (amongst other rewards). This is the typical ‘data for dollars’ business model trending at the moment whereby a product or service is free or discounted in exchange for user data. Let’s have a look at some of the risks this can pose.
Since the Snowden revelations the scale of surveillance on ordinary citizens by the intelligence agencies of democratic western governments has been in the news and regularly debated. The Five Eyes alliance is arguably the biggest holder of the data gathered by the various surveillance programs and thus it’s worth knowing how the alliance is spying on you.
‘We kill people based on metadata‘- General Michael Hayden (former Director of the CIA & NSA) (1)
Introduction
We won’t pretend the quote above isn’t set at the top of the article intentionally to get your attention (but we hope it worked!). Metadata as a term doesn’t sound very exciting so we wanted to get your attention so as to not skip over this article. We hope you bare the quote in mind because as you’ll see metadata has many positive, important, and unavoidable uses in our daily lives which will make the quote even more disconcerting. We’ve also created and linked to a How-To Guide on removing metadata at the end of the article.
This article is an introduction to the various types of threats that can find their way on to your device and cause you all sorts of grief.
The final piece in our three-part series on password management. This article looks at Password Managers, what they are and if they’re worth using.
Building on a previous article, Password Hygiene 101, this article guides you in creating a strong password to support your newly established password hygiene habits.