Educational

Examples, Explainer, Educational Case Study, Course, Guide

Long Read

Find the answers to all the questions you have regarding the UK's secret Technical Capability Notice (TCN) powers, Apple, and our fight against them.

News & Analysis

The AI industry is rushing to build AI Assistants that integrate into our lives. These firms need to answer questions about how they will protect our data, including from them.

Long Read

We think federated social media represents a better vision for the internet. Here's an exploration of what it is, and why we like it. 

Long Read

The next generation of AI Assistants may seek extensive access to our personal data, accounts and devices features. Can we trust their developers to protect our privacy and security?

Long Read

The CrowdStrike incident earlier this year had major implications for governments and businesses across the world. Here, we look at what it tells us about the security and robustness of the modern internet. 

Long Read

The concept of privacy is essential for Indigenous peoples to exercise their right to autonomy and self-determination, enabling them to better protect their cultural heritage and prevent external control, exploitation, and surveillance of their lands and identities.

Long Read

Private companies, including Big Tech, are responsible for a large number of digital health tools. While there may be benefits to health, there are also potential threats to your privacy from these initiatives.

In this piece, we outline some of these tools and give some examples of Big Tech involvement in digital health and consider what sort of future a Big Tech dominated vision of digital health might hold for your rights, your autonomy and our society

Long Read

This piece highlights concerns over the increasing use of data-intensive technologies in educational spaces (EdTech) and examines - among other things - how their unchecked implementation can jeopardize students' rights and education through potential privacy violations, discrimination, and the lack of student input in the adoption of these technologies.

Long Read

Surveillance databases are on the rise all around us and with them comes a wider array of issues. Here we begin to unpack these concerns and discuss some of the prominent global drivers of this trend.

Long Read

A glimpse into what you can find in the new version of PI’s Guide to International Law and Surveillance. From surveillance of public spaces to spyware and encryption, it’s got everything!

Explainer

Who are the workers behind the training datasets powering the biggest LLMs on the market? In this explainer, we delve into data labeling as part of the AI supply chain, the labourers behind this data labeling, and how this exploitative labour ecosystem functions, aided by algorithms and larger systemic governance issues that exploit microworkers in the gig economy.

Video

What do you know about cryptography? Have you ever wanted to get a better understanding of some of the maths behind encryption? This week we speak to Ed, a Senior Technologist at PI, about some of the history and basics of encryption.

23 May 2023
According to police plans to enhance “school safety”, security cameras and facial recognition will monitor children in Hong Kong in class and around educational facilities. The move is part of a trend also found in China, India, and the US toward mining children’s data, even though few benefits have
Long Read

Support systems are undergoing significant digitisation and automation under the banner of efficiency. Privacy International calls for the impacts of these innovations on the rights of people with disabilities to be comprehensively assessed and addressed.

Video

Jason Domino, sex worker and content creator, shares his tips to protect your privacy and security on platforms.

Video

Nate Bartram's security and privacy tips, privacy activist and content creator, share his privacy and security tips including using compartmentalisation, multiple online identities and more