Why Incognito Mode is a Lie.
Incognito Mode or Private Browsing mode is a feature that every browser has, but what if that was a lie and your activity in private mode could still be tracked?
In our intermediate lesson we'll cover private alternatives to popular applications that you can utilize. We'll also talk about how to obtain your apps in a privacy respecting way from alternative sources.
This is our home for the latest video content from the Privacy Guides team. Be sure you are subscribed to find out about our latest uploads, and share these videos with your family and friends if you find them helpful!
Incognito Mode or Private Browsing mode is a feature that every browser has, but what if that was a lie and your activity in private mode could still be tracked?
In this three-part course, we walk users through the steps they can take to make their phones as private and secure as possible.
Believe it or not, there’s a lot of parallels between being healthy and privacy. Both seem simple on the surface but get complicated fast. Yet, both are achievable. So what can the health journey teach us about the privacy journey?
Nate Bartram sat down with technology journalist Taylor Lorenz to decipher the slate of bills being fast-tracked through Congress which threaten free speech, privacy, and your right to freely access information on the internet.
Data brokerage is a billion-dollar industry built on selling your personal information without your knowledge or consent. This is what you need to know to keep your information protected.
Do quantum computers have the ability to break our encryption, and are they actually a threat to the privacy of our communications? In this video, we dig into the details and separate fact from Silicon Valley hype!
Every day when you browse the internet, you share identifiable information about your device and browser that companies use to target you with advertising and track your activity across the web.
Privacy isn't about hiding secrets - it's about power. In this video, we explain why thinking you "have nothing to hide" is a dangerous misconception, especially in our ever-connected digital age. Taking back your privacy is easier than you might think!
Age verification laws and propositions forcing platforms to restrict content accessed by children and teens have been multiplying in recent years. The problem is, implementing such measures necessarily requires identifying each user accessing this content, one way or another.
Today, we’re exploring Secureblue, a project aimed at addressing security concerns in traditional Linux distributions by significantly hardening existing components and systems.
Imagine a world where every conversation you had, every message you sent, every piece of data on your phone, was an open book to the government. In 1993, the NSA tried to do just that by inserting a tiny chip into everyone's phone.
In a world where everything is highly interconnected, it's easy to feel overwhelmed. Compartmentalization can be a good strategy and important privacy technique: Intentionally separating different parts of your life can help you manage stress, keep your data secure, and stay private online.
Microsoft is rolling out its controversial Recall feature to Windows users with Copilot+ PCs. However, there are still many privacy and security concerns that remain, even after its reworking.
During the Cold War, the US government tried to stop the export of strong cryptography.
Privacy isn’t dead, in fact it’s growing. In this video, we explore common arguments against protecting your privacy and why they're not only wrong but dangerous.
Encryption is a cornerstone of security on the modern internet, in this video we dive deep into how it works and explain why it's so important. This is especially crucial as many governments around the world are pushing to ban encryption and breach our fundamental right to privacy.
Are you mixing up privacy, security, and anonymity? Don't worry, it's more common than you might think! In this week's video we break down each term, so you can make educated decisions on what privacy tools are best for you.
Tor is an invaluable tool for bypassing censorship and browsing privately, in this week's video we dive into the details and explain how it works. Plus we cover some things you should avoid when using Tor to make sure you maintain your anonymity.
Worried about hackers and data breaches? You're not alone. In this video we outline 5 simple yet crucial steps you can take today to dramatically improve your online security and protect your personal information.
Text messaging has been a staple of communication for decades, but it's time to move on. In this video, we'll explore why SMS is an outdated and insecure technology and discuss better alternatives.