Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.
120 Posts
5651 Claps
An illustration of a pixelated padlock

What will happen to internet privacy in the future?

2 min read
Unfortunately, we have reached a point where the internet doesn’t work correctly unless we sacrifice some of our privacy....
An illustration of a globe with horns and a halo.

What are the moral issues with internet privacy?

4 min read
The difference between right and wrong is rarely black and white. When it comes to the big moral issues...
An illustration of an ostrich burying its little head in the sand.

How plausible deniability can protect your data

3 min read
Plausible deniability allows individuals to claim they had no involvement in an action taken by others (or, in some...
A gravestone with "internet Privacy" engraved upon it.

Is internet privacy a lost cause?

4 min read
Most people think of privacy as a fundamental right. The right to have a personal conversation without someone listening,...
A laptop with a Venetian blind as a desktop image. But there's a twist! Binoculars peek through the blind. Nice.

Is someone watching you right now?

2 min read
Are you being spied on online? The short answer is: probably. This post will take a look at the key...
An image of a laptop shaking its contents into the bin.

How to properly dispose of your hard drives

3 min read
Data is valuable. Your pictures, legal documents, chat logs, and even saved video games are all things you wouldn't...
The United Nations logo atop a sequence of letters to depict encryption.

Why encryption is vital in free societies

4 min read
In 2011, the United Nations declared internet access a universal human right. That was a necessary step forward for digital...
Two crossed arms hold a different face. It's a bit freaky looking, to be perfectly honest.

Facial swapping software is now open-source

2 min read
Developed by experts from the Massachusetts Institute of Technology and NVIDIA, vid2vid technology allows anybody to swap the surface...
An illustration of a man in a hoodie using puppet strings on a man sat at a desk.

The art of social engineering: Are you being conditioned?

5 min read
As we get better at securing our computer systems, we are discovering that the weakest line of defense is,...
An illustrated man in a trench coat peruses the internet.

4 ways the CIA can hack you right now

2 min read
Five years ago, Edward Snowden revealed that the NSA extensively collects information on citizens worldwide. It’s now clear that...

Latest Posts

Featured Posts

Live Chat