Software updates are everywhere around us, from our phones offering us security and new features to our laptop or smart TV annoying us at the worst moment. Yet, they matter more than you might think!
An array of digital technologies are being deployed in the context of border enforcement. To effectively critique state use and delve into potential benefits of satellite and aerial surveillance, we must first understand it.
‘Free to Protest: The protestor’s guide to police surveillance and how to avoid it’ (UK edition) is a collection of bite-sized guides about high-tech police surveillance capabilities at protests, including tips and strategies about how you can protect yourself from being identified, tracked and
Uganda's Presidential election in January 2021 resulted in the incumbent President Museveni winning his sixth term in office, having held power for 35 years. The election took place amidst a global pandemic and the run up to election day was fraught. Violence left dozens dead and hundreds more
If you've never made a website, you might have not heard of AddThis or ShareThis, but chances are you've encountered them. These services offer the "share" buttons that easily integrates into websites. However, this feature is also used by these companies to track visitors across the web.
Your personal data can be collected by companies from many different sources and shaped into a "secret identity". This is when companies use information about you to assume your personality traits and predict your behaviour, and sell this profile onto others. But who are the companies behind this practice?
We spoke to trans-right activists in three country: the Philippines, France and Argentina to understand how ID systems in their countries are impacting their lives and how certain legal frameworks may help them.
In this guide you'll learn how to manually insert DNS entries for certain types of known hosts (e.g. ad-servers, trackers, malware websites) and point them to an empty address, so that those requests are blocked on your device. Unlike browser add-ons, DNS-level ad-blocking works on any application or service running on your device, not just your browser.
Advertisers need to uniquely identify you across apps and websites in order to aggregate data they might collect about you from those sources. To do so, Microsoft issues an Ad ID for your device, which it then shares with advertisers so they can serve you ads based on your data. In this guide you'll learn how to opt-out of targeted ads on Windows.
Blocking ads and trackers on your devices typically requires manual labour on each individual device (e.g. installing an ad-blocker on your browser, another on your phone, and another on your tablet). In this guide you'll learn how to install and setup Pi-Hole, a general purpose network-wide ad-blocker, on a Raspberry Pi to block ads on any device connected to your home network.
In this guide you'll learn how to manually insert DNS entries for certain types of known hosts (e.g. ad-servers, trackers, malware websites) and point them to an empty address, so that those requests are blocked on your device. Unlike browser add-ons, DNS-level ad-blocking works on any application or service running on your device, not just your browser.
Until recently, advertisers have been able to track users across their iPhones and the web using the Identifier for Advertisers (IDFA), a unique identifier that could be accessed by the apps you used and the site you visited. From version 14.5 of iOS, Apple gives you the option to opt out of tracking that apps would normally try to do. This guide shows you where to find these settings on your phone, and how to tweak them to keep pesky data hungry companies off the radar.