All Your Base (Should) Belong to You

With the adoption of cloud computing, developers are now able to cut costs when it comes to servers. Cloud computing can be more beneficial than on premise servers since companies only pay for what they need while a third party deals with the maintenance of the server (1). However, following a study done by Check …

War censorship exposes Putin’s leaky internet controls

President Vladimir Putin was attempting to make Russia’s internet a strong tool of surveillance and social control, similar to China’s so-called Great Firewall, long before waging war on Ukraine. As a result, Russian investigative journalist Andrei Soldatov was frightened when Western tech corporations began breaking relations with Russia following its invasion. He’d spent years exposing …

SEC votes to propose new rules for cybersecurity disclosure and incident reporting

What is SEC? The U.S. Protections and Exchange Commission (SEC) is an autonomous central government administrative organization answerable for safeguarding financial backers, keeping up with fair and methodical working of the protections showcases, and working with capital development. It was made by Congress in 1934 as the main government controller of the protection markets. The …

Conti Ransomware gang hit with data leak

Conti, a well-known ransomware organization, declared support for Russia when it attacked Ukraine on February 25. It turned out to be a terrible idea: a vast collection of the gang’s secrets was disclosed just days later. The data includes information on hacking activities, the gang’s Bitcoin wallets, and speculation on the future of cryptocurrency as …

Surveillance vs Privacy: How much is too much?

On January 11, 2022, the European Court of Human Rights (ECHR) ruled that Bulgaria’s laws on secret surveillance violated its citizens right to privacy under Article 8 of the European Human Rights Convention. Furthermore, when citizens asked about whether they had been subjected to surveillance, they received an insufficient response. Because of this, Bulgaria must …

Who Needs Microchips When You Have Cell Phones?

We’ve all heard the conspiracies about governments inserting microchips into vaccines so that they can track us and our daily activities. However, why would a government spare the expense to develop such an elaborate plan when they can use something as simple and innocuous as… a cellphone? On Monday, January 10th, the House of Commons …

Apple’s Controversial Private Relay and What it Says About Privacy as a Right

With IOS 15, Apple has introduced a new privacy feature to iCloud users… or at least those who are willing to pay. Available as a setting on iCloud+ accounts, Apple’s iCloud Private Relay functions somewhat similarly to a VPN, offering increased privacy and security when navigating the internet1. However, the implementation of this feature has …