US, UK, and other governments asks tech companies to build backdoors into encrypted devices

The US, UK, and three other governments have called on tech companies to build backdoors into their encrypted products, so that law enforcement will always be able to obtain access. If companies don’t, the governments say they “may pursue technological, enforcement, legislative, or other measures” in order to get into locked devices and services.

Tech companies have (also) been wary to comply. Adding a backdoor into their products would inherently mean that their promise of data privacy is broken. It would also open them up to similar requests from other countries, which could use the backdoor access for spying in inappropriate circumstances.

Måste rusta cyberförsvaret! Vilket cyberförsvar?

Internet är ett skyttegravskrig idag. Sveriges infrastruktur, svenska företag och myndigheter attackeras kontinuerligt. Sverige har knappt något säkerhetsmedvetande och inget cyberförsvar heller. Det är fel att tro att Försvarsmakten sitter med kamouflagemålade apparater i ett bergrum och skyddar dig mot cyberbrottslingar. Det är du som är cyberförsvaret och det är du som är det främsta målet för attacker. Och det är dina gelikar som struntar i det.

Handboken Personlig säkerhet (2018)

Genom riskanalyser, aktiva val och medvetna förhållningssätt kan du värna om din personliga säkerhet. I handboken ges exempel på förebyggande åtgärder och skyddsåtgärder som kan användas för att förhindra eller avstyra hotfulla situationer om de skulle uppstå.

Här behandlas allt från hur du kan tänka kring sociala medier till hur du ska agera vid ett eventuellt terrorattentat. Boken är primärt skriven för politiskt aktiva, men råden fungerar lika väl för andra utsatta yrkesgrupper.

Dark Patterns: When Companies Use Design to Manipulate You

“Dark patterns” are designs that deliberately trick you into doing what a company wants. This can take all kinds of forms, from MoviePass not canceling people’s accounts to installers putting crapware on your machine.


at one point even closing the window offering the update would prompt the installation. A lot of people ended up accidentally installing Windows 10 because of this one, which makes sense: it was almost impossible to tell how to opt out.

’People You May Know:’ A Controversial Facebook Feature’s 10-Year History

In May 2008, Facebook announced what initially seemed like a fun, whimsical addition to its platform: People You May Know.

“We built this feature with the intention of helping you connect to more of your friends, especially ones you might not have known were on Facebook,” said the post.

In an investigation last year, we detailed the ways People You May Know, or PYMK, as it’s referred to internally, can prove detrimental to Facebook users. It mines information users don’t have control over to make connections they may not want it to make.

Kashmir Hill’s posts

Kashmir Hill is a senior reporter for the Special Projects Desk, which produces investigative work across all of Gizmodo Media Group’s web sites. She writes about privacy and technology.


CheckShortURL is an expand link facility: it allows you to retrieve the original URL from a shortened link before clicking on it and visiting the destination. We provide furthermore information about unshortened URL such as title, description, keywords and author of the page. It also checks if the original URL is on search engines, Twitter, and lets you know if the hidden link is safe or not.CheckShortURL supports almost all URL shortening services:,,,,,, and many others!

Three Reasons Why the ”Nothing to Hide” Argument is Flawed

1) Privacy isn’t about hiding information; privacy is about protecting information, and surely you have information that you’d like to protect.

2) Privacy is a fundamental right and you don’t need to prove the necessity of fundamental rights to anyone.

3) Lack of privacy creates significant harms that everyone wants to avoid.

Sextortion Scam: What to Do If You Get the Latest Phishing Spam Demanding Bitcoin?

You may have arrived at this post because you received an email from a purported hacker who is demanding payment or else they will send compromising information—such as pictures sexual in nature—to all your friends and family. You’re searching for what to do in this frightening situation.