Latest Posts
While convenient, many of the most well-known and popular cloud storage providers have direct access to your files - in some cases, third-parties may have access to your files as well.
Encrypted cloud storage providers respect user privacy and use zero knowledge end-to-end encryption implementatio...
This post was originally published on 26 APR 2021; it has since been updated and revised.
If you're looking for solid blocklists for your PiHole, then we have a collection of mega-blocklists for you right here.
We also have some words of wisdom to share when it comes to using these blocklists....
This post was originally published on 1 SEP 2022; it has since been updated and revised.
One of the biggest sticking points commonly brought up in the privacy community is the price of privacy.
As it generally goes, especially on the internet as a whole, free is not free – however, there are s...
With the iOS 16.2 update, Apple introduced “Advanced Data Protection,” which finally introduced end-to-end encryption (E2EE) for most items backed up or stored in iCloud.
Apple has long been criticized, with good reason, over its iCloud service not providing E2EE (where the user has the decryption...
(Will take you to a random post)