The Reading Room is where we post our essay style content for a longer read and analysis of a certain subject matter.
- My data was stolen – what next?
- Online Shopping Scams
- Identity theft 101
- Why politicians and big business rarely stand up to the erosion of privacy
- Cryptocurrency & private payments
- Operation Ironside / Trojan Shield: The AN0M Encryption Sting
- What is it that bad actors want?
- Understanding the deep and dark parts of the internet
- The importance of software updates
- Deepfakes: A real and deeply alarming threat
- The Veillances Part Four: Uberveillance
- The Veillances Part Three: Sousveillance
- The Veillances Part Two: Dataveillance
- The Veillances Part One: Surveillance
- Risks posed by Interactive Insurance Policies
- The Five Eyes watching us
- Metadata 101
- Malware 101
- Password Managers 101
- Setting Strong Passwords
- Encryption 101
- Financial Surveillance Today’s way of transacting may be tomorrows buyer’s remorse
- Cookies 101: Cookie Management
- Internet of Things (IoT) 101
- Crisis Surveillance
- Virtual Private Network (VPN) 101
- The less obvious ways bad actors can access your data
- Challenging the way you imagine Data & Privacy
- Phishing 101
- Security Fatigue
- Password Hygiene 101
- Two Factor Authentication (2FA) 101
- Doxing 101
- Protesting with privacy at heart