The content on this page is outdated and needs to be reviewed. Please check back in a few weeks.
Page last edited → 15 May 2023
Page last reviewed → 6 August 2021
Index
1. Organizations and authorities
2. People
3. Movements and initiatives
4. Recurring live streams
5. Conferences
6. Podcasts
7. Blogs and newsletters
8. Guides
9. Films
10. Books
11. Reports and documents
12. Other resources
Organizations and authorities
Access Now
Access Now defends and extends the digital rights of people and communities at risk. By combining direct technical support, strategic advocacy, grassroots grantmaking, and convenings such as RightsCon, we fight for human rights in the digital age.
Algorithmic Justice League (AJL)
Technology should serve all of us. Not just the privileged few. Join the Algorithmic Justice League in the movement towards equitable and accountable AI.
American Civil Liberties Union (ACLU)
Defend the rights of all people nationwide. Abortion care, trans people’s right to live freely, people’s right to vote – our freedoms are at stake and we need you with us. Donate today and fuel our fight back in courts, statehouses, and nationwide.
Amnesty International
We campaign for a world where human rights are enjoyed by all. Amnesty International is a global movement of more than 10 million people in over 150 countries and territories who campaign to end abuses of human rights.
Chayn
We support those experiencing gender-based violence because we deserve the right to be free, and happy. Our resources will help you spot abuse, collect evidence, stay safe, get well and connect to local services.
Citizen Lab
University of Toronto
The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security.
Clinic to End Tech Abuse (CETA)
Cornell University
Everyone should be free to use technology without fear of harm from abusive partners or others. Survivors of abuse, stalking, or other mistreatment should have the support they need to keep themselves safe online and on their devices. Their voices should be at the center of technology design.
CryptoHarlem
Cybersecurity for the people. Nonprofit AntiSurveillance, Cybersecurity Education & Advocacy Organization.
DAIR Institute
The Distributed AI Research Institute is a space for independent, community-rooted AI research, free from Big Tech’s pervasive influence.
Digital Defense Fund (DDF)
We are Digital Defense Fund, and we do digital security for the abortion access movement. We envision a future where technology and innovation support secure, autonomous reproductive decisions, free from stigma.
Distributed Denial of Secrets (DDoSecrets)
Distributed Denial of Secrets is a journalist 501(c)(3) non-profit devoted to enabling the free transmission of data in the public interest. We publish and archive leaks.
Electronic Frontier Foundation (EFF)
The leading nonprofit defending digital privacy, free speech, and innovation.
European Data Protection Supervisor (EDPS)
The European Data Protection Supervisor (EDPS) is the European Union’s (EU) independent data protection authority.
European Digital Rights (EDRi)
The EDRi network is a dynamic and resilient collective of NGOs, experts, advocates and academics working to defend and advance digital rights across the continent. For almost two decades, it has served as the backbone of the digital rights movement in Europe.
Fight for the Future
We are a group of artists, engineers, activists, and technologists who have been behind the largest online protests in human history, channeling Internet outrage into political power to win public interest victories previously thought to be impossible. We fight for a future where technology is a force for liberation— not oppression. ✊
Freedom of the Press Foundation (FPF)
Freedom of the Press Foundation protects, defends, and empowers public-interest journalism in the 21st century.
GreatFire
We monitor and challenge internet censorship in China.
Mozilla
More power to you. Mozilla puts people before profit, creating products, technologies and programs that make the internet healthier for everyone.
NetBlocks
Mapping Internet freedom in real time. Open, secure and reliable connectivity is essential for rights such as freedom of expression and freedom of association. Now we can measure network connectivity at Internet scale.
NOYB
NOYB enforces your right to privacy everyday.
Open Observatory of Network Interference (OONI)
Global community measuring Internet censorship since 2012.
Privacy International
For a world where technology will empower and enable us, not exploit our data for profit and power.
Surveillance Technology Oversight Project (STOP)
We Watch the Watchers. S.T.O.P. fights to end discriminatory surveillance. Our team challenges both individual misconduct and broader systemic failures. We craft policies that balance new technologies and age-old rights. And we educate impacted communities on how they can protect their rights.
Tactical Tech
Tactical Tech is an international NGO that engages with citizens and civil-society organisations to explore and mitigate the impacts of technology on society.
World Wide Web Foundation
Fighting for the web we want. Everyone should have access to a safe and empowering web. We use original research, advocacy, and public action to shape the policies and products we need for the web we want.
People
Abeba Birhane
Abeba Birhane is a cognitive scientist researching human behavior, social systems, and responsible and ethical artificial intelligence (AI). Birhane is a Senior Fellow in Trustworthy AI at Mozilla Foundation and an Adjunct Lecturer/Assistant Professor at the School of Computer Science and Statistics at Trinity College Dublin, Ireland.
Alex Stamos
Alex Stamos is a cybersecurity expert, business leader and entrepreneur working to improve the security and safety of the Internet through his teaching and research at Stanford University. Stamos is the director of the Stanford Internet Observatory at the Cyber Policy Center, a part of the Freeman-Spogli Institute for International Studies, where he is also a research scholar.
Andrew Couts
Andrew Couts is Senior Editor, Security at WIRED overseeing cybersecurity, privacy, policy, politics, national security, and surveillance coverage.
Chelsea E. Manning
Chelsea E. Manning is a network security expert, activist, whistleblower, and a former intelligence analyst.
Etienne “Tek” Maynier
Etienne “Tek” Meynier is working as a Technologist at Human Rights Watch, where he is helping protect the organization from all kinds of digital threats as part of the HRW’s infosec team.
Eva Galperin
Eva Galperin is Director of Cybersecurity at the Electronic Frontier Foundation and co-founder of the Coalition Against Stalkerware. Her work is primarily focused on providing privacy and security for vulnerable populations around the world.
Evan Greer
Evan is Director of Fight for the Future and has been organizing hard-hitting political campaigns for more than a decade. A talented writer, she is a regular contributor to numerous publications, including The Guardian, Newsweek, and Time Magazine. Prior to joining Fight for the Future, she toured as a professional musician. She continues to create music and organize live music events.
Edward Snowden
Edward Snowden is a whisteblower and a board member at the Freedom of the Press Foundation. He works on methods of enforcing human rights through the application and development of new technologies.
Gennie Gebhart
Gennie Gebhart is Managing Director of Technology at the Electronic Frontier Foundation. Her research and writing primarily focuses on consumer privacy and security, with an emphasis on third-party tracking, platform policy, and secure messaging, as well as content moderation and open access.
Harlo Holmes
Harlo Holmes is the Chief Information Security Officer (CISO) and Director of Digital Security at Freedom of the Press Foundation. She strives to help individual journalists in various media organizations become confident and effective in securing their communications within their newsrooms, with their sources, and with the public at large.
Jessy Irwin
Jessy Irwin is CEO of Amulet. As a leader in her field, she is known for developing comprehensive, human-centric security programs, and she believes that everyone within an organization (or open source community!) is a member of the security team but they should not have to become experts in security to be safe online.
John Scott-Railton
John Scott-Railton researches spyware, phishing & disinformation as a Senior Researcher at Citizen Lab.
Joseph Cox
Joseph Cox is a journalist covering hackers, crime, and privacy for Motherboard/VICE.
Lily Hay Newman
Lily Hay Newman is a senior writer at WIRED focused on information security, digital privacy, and hacking.
Martin Shelton
Dr. Martin Shelton is the Principal Researcher at the Freedom of the Press Foundation, conducting user research on harassment of journalists and digital security education in J-schools. He also leads security editorial and the U.S. J-school digital security curriculum.
Matthew Green
Matthew D. Green, an associate professor of computer science and member of the Johns Hopkins University Information Security Institute, is a nationally recognized expert on applied cryptography and cryptographic engineering.
Meredith Whittaker
Meredith Whittaker is Signal‘s President and a member of the Signal Foundation Board of Directors.
Micah Lee
Micah Lee is The Intercept’s Director of Information Security. He is a computer security engineer and an open-source software developer who writes about technical topics, leaked datasets, and the far right. He develops security and privacy tools such as OnionShare, Dangerzone, and Semiphemeral.
Olivia Martin
Olivia Martin is the Deputy Director of Digital Security at Freedom of the Press Foundation. A graduate of NYU’s Gallatin School of Individualized Study, her professional work focuses on researching and delivering digital security trainings to journalists, activists, and human rights defenders.
Timnit Gebru
Timnit Gebru is the founder and executive director of the Distributed Artificial Intelligence Research Institute (DAIR).
Troy Hunt
Troy Hunt runs Have I Been Pwned and is a Microsoft Regional Director and MVP who travels the world speaking at events and training technology professionals.
Zack Whittaker
Zack Whittaker is the security editor at TechCrunch.
Movements and initiatives
Reclaim Your Face
A movement led by civil society organisations across Europe
The future must be ours to shape. Facial recognition can and will be used against each of us by governments and corporations – based on who we are and what we look like. Reclaim our public space. Ban biometric mass surveillance!
Stop Scanning Me
EDRi, EFF, Internet Society and many others
Privacy empowers, surveillance weakens. We all benefit from freedom and privacy to explore our identity, shape our futures and build communities where we can thrive. We all need safe spaces, especially in insecure situations.
Recurring live streams
CryptoHarlem weekly livestream
Real hackers, real talk, no cap! CryptoHarlem is an inner city digital surveillance clinic. We follow the cryptoparty guidelines. Learn how to use circumvention tools to protect your privacy and secure yourself online and off.
PrivChat
Tor Project
A conversation about tech, human rights, and internet freedom brought to you by the Tor Project.
Conferences
RightsCon
Access Now
RightsCon is the world’s leading summit on human rights in the digital age.
Podcasts
CYBER
Motherboard/VICE
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don’t have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they’re breaking and to the industry’s most famous hackers and researchers about the biggest news in cybersecurity.
Darknet Diaries
Jack Rhysider
True stories from the dark side of the Internet. This is a podcast about hackers, breaches, shadow government activity, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network. This is Darknet Diaries.
How to Fix the Internet
Electronic Frontier Foundation (EFF)
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward.
In Machines We Trust
MIT Technology Review
A podcast about the automation of everything. Host Jennifer Strong thoughtfully examines the far-reaching impact of artificial intelligence on our daily lives. Produced by MIT Technology Review, the podcast explores the rise of AI through the voices of people reckoning with the power of the technology, and by taking listeners up close with the inventors and founders whose ambitions are fueling the development of new forms of AI.
IRL: Online Life is Real Life
Mozilla
Please Note: The latest episode of this podcast was published in Sep 2022
Online life is real life, and with artificial intelligence it’s getting even more real. In Season 6, IRL zooms in on data, machine learning and algorithms, as host Bridget Todd shares real life stories about AI from around the world. This season doubles as Mozilla’s 2022 Internet Health Report, which explores who is reclaiming power to make online life healthier for everyone.
Kill Switch
Access Now and Volume
Please Note: This is a podcast mini-series published between Jul and Aug 2020
Kill Switch is a six-part series exploring the alarming rise of anti-democratic internet shutdowns across the world
Lock and Code
Malwarebytes
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
Moderated Content
Stanford Law School
Moderated Content from Stanford Law School is podcast content about content moderation, moderated by assistant professor Evelyn Douek. The community standards of this podcast prohibit anything except the wonkiest conversations about the regulation—both public and private—of what you see, hear and do online.
Random but Memorable
1Password
Lighthearted security advice and banter from 1Password and guests.
Security Now
TWiT
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
Smashing Security
Graham Cluley and Carole Theriault
News and views from the world of cybersecurity, hacking, and internet threats. A helpful and hilarious take on the week’s tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It’s not your typical cybersecurity podcast…
Technology Pill
Privacy International
Join Gus – our executive director – and a myriad of guests for our podcast, which looks at how technology is reshaping our lives every day and explores the new powers of governments and companies.
Troy Hunt’s Weekly Update
Troy Hunt
Updates from Troy Hunt, the creator of Have I Been Pwned.
WIRED Security
WIRED
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
Your Undivided Attention
Center for Humane Technology
In our podcast, Your Undivided Attention, co-hosts Tristan Harris and Aza Raskin explore the incredible power that technology has over our lives — and how we can use it to catalyze a humane future.
Blogs and newsletters
Digital Security Blog
Freedom of the Press Foundation (FPF)
Regular musings from FPF’s training community about the intersections of digital security and journalism.
Digital Security Digest
Freedom of the Press Foundation (FPF)
Digital security threats and harassment of journalists are pervasive. Sign up to this newsletter to stay up to date about the latest in digital security news and what you can do to take action.
Hello World
The Markup
A weekly newsletter—delivered every Saturday morning—that goes deep into our original reporting and the questions we put to big thinkers in the field.
The Mozilla Blog – Distilled
The main Mozilla blog for all official news, notes and ramblings from the Mozilla project. Expect to get updates on new Firefox releases, announcements on new initiatives and products and other major news from Mozilla. If there is only one blog you would like to follow, this is the one!
Mozilla Foundation Blog
Mozilla’s blog features guides to making your online life better, stories from the movement, and critical analysis of issues around internet health.
News & Advocacy
Freedom of the Press Foundation (FPF)
Stay up to date on government secrecy, surveillance, and the rights of reporters and whistleblowers.
Open Policy & Advocacy
Mozilla
Mozilla’s official blog on open Internet policy initiatives and developments.
The Proton Blog
News from the front lines of privacy and security.
Spread Privacy
DuckDuckGo
The Official DuckDuckGo Blog.
This week in security
Zack Whittaker
A weekly tl;dr cybersecurity newsletter of all the major stuff you missed, but really need to know. It includes news, the happy corner, a featured cyber cat (or friend), and more. It’s sent every Sunday, and it’s completely free.
Guides
2FA Directory
2FactorAuth
List of websites and whether or not they support 2FA.
A First Look at Digital Security
Access Now
This booklet is made to help identify what you might have to protect in your digital world. You will find each persona has characteristics and experiences you may share, threats you may face, and strategies that may be relevant to your work. You will find this booklet useful as a gateway to examine and map out your threats online.
BLOCKED
SWARM Collective
A sex worker’s guide to stalking and harassment. This is a 34-page PDF for sex workers on digital security, setting boundaries with clients, legal definitions of different kinds of stalking/harassment and where you can turn for help.
Data Detox Kit
Tactical Tech
Everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Data Detox x Youth
Tactical Tech
Data Detox x Youth is an activity book to help young people take control of their tech. This interactive toolkit encourages young people to think about different aspects of their digital lives, from their social media profiles to their passwords, with simple activities for reflection and play.
Device and Data Access when Personal Safety is At Risk
Apple
Apple makes it easy to connect and share your life with the people closest to you. What you share, and whom you share it with, is up to you — including the decision to make changes to better protect your information or personal safety.
- Checklist: If you want to see if anyone else has access to your device or accounts
- Checklist: If you want to make sure no one else can see your location
Diceware method
Arnold Reinhold
Diceware is a method for creating passphrases, passwords, and other cryptographic variables using ordinary dice as a hardware random number generator.
- EFF’s word list
- Arnold Reinhold’s word list
- Diceware (Wikipedia)
- How to Make a Super-Secure Password Using Dice (EFF)
- EFF Dice-Generated Passphrases (EFF)
- Passphrases That You Can Memorize — But That Even The NSA Can’t Guess (The Intercept)
Does my site need HTTPS?
Matt Holt
Find out if your site needs HTTPS.
Doxxing: Tips To Protect Yourself Online & How to Minimize Harm
Daly Barnett – Electronic Frontier Foundation (EFF)
By itself, being doxxed can be dangerous, as it may reveal information about you that could harm you if it were publicly known. More often it is used to escalate to greater harm such as mass online harassment, in-person violence, or targeting other members of your community. Your political beliefs or status as a member of a marginalized community can amplify these threats.
Everyday Encryption
Human Rights Watch
This game is about the everyday choices you make about your security, and the role encryption plays in those choices. Digital security is always about making compromises and tradeoffs—what do you want to protect, and from whom? You can never be 100 percent secure, but encryption can help reduce your digital security risks.
GDPR explained
What’s the General Data Protection Regulation (GDPR)? What does the new regulation mean for you as an individual? What does it mean for you as a company or organisation?
Guidance on Connected Toys and Devices
Data Protection Commission Ireland
Many children enjoy playing with toys and devices that have the ability to interact with them, either directly or through an online ‘app’. The popularity of these toys and devices, which can provide a fun and educational experience, along with advances in technology, means that there are more and more of these products on the market to choose from. With this in mind, the Data Protection Commission (DPC) has put together this short guidance to assist you if/when you decide to purchase one.
Guides & Training
Freedom of the Press Foundation (FPF)
Our training team delivers digital security trainings to news organizations, freelance and citizen journalists, and other at-risk groups. With education and advocacy, we aim to protect press freedoms through the adoption of the tools and practices included in our trainings.
How HTTPS works
DNSimple
Have you ever wondered why a green lock icon appears on your browser URL bar? And why is it important? We did too, and this comic is for you!
Just Delete Me
A directory of direct links to delete your account from web services.
Just Get My Data
A directory of direct links for you to obtain your data from web services.
Passkeys.directory
1Password
Passkeys.directory is a community-driven index of websites, apps, and services that offer signing in with passkeys.
*Privacy Not Included
Mozilla
How creepy is that smart speaker, that fitness tracker, those wireless headphones? We created this guide to help you shop for safe, secure connected products.
Protect yourself and your community: Use these digital security tips
Access Now
What you do online can have real consequences for you and the people you care about. To mitigate the digital threats that can affect you, your work, and your community, Access Now’s Digital Security Helpline created [a series of] GIFs that provide useful tips for protecting your accounts and data online.
Secure Messaging Apps Comparison
Mark Williams
I created this site to enable people to compare many so-called “secure messaging apps”. Likewise, I hope to educate people as to which functionality is required for truly secure messaging.
Security Education Companion
Electronic Frontier Foundation (EFF)
A free resource for digital security educators.
Security Planner
Consumer Reports
Keep Your Data Secure With a Personalized Plan. Cut down on data collection and prevent hackers from invading your laptop, tablet and even your phone. Answer a few simple questions to get customized recommendations to help you safely backup files, browse online without tracking, avoid phishing scams, and prevent identity theft.
Speak Up & Stay Safe(r)
Jaclyn Friedman, Anita Sarkeesian and Renee Bracey Sherman
Warning: This project was last updated in 2018, parts of it could now be outdated
A Guide to Protecting Yourself From Online Harassment.
Street-Level Surveillance
Electronic Frontier Foundation (EFF)
A Guide to Law Enforcement Spying Technology.
Surveillance Self-Defense
Electronic Frontier Foundation (EFF)
Tips, Tools and How-tos for Safer Online Communications.
Terms of Service; Didn’t Read
“I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that.
Your guide to the Digital Defenders
European Digital Rights (EDRi)
Warning: This guide was published in 2016, parts of it could be now outdatedated
Children’s freedom to explore and develop should not be limited due to lack of awareness of privacy-protecting strategies. The booklet helps them make safer and more informed choices about what to share and how to share online. It includes chapters on what privacy actually is, how to use safer messaging systems and how to improve the security of smartphones.
Zebra Crossing
Jason Li
An easy-to-use digital safety checklist.
Films
Citizenfour
Laura Poitras
CITIZENFOUR is a real life thriller, unfolding by the minute, giving audiences unprecedented access to filmmaker Laura Poitras and journalist Glenn Greenwald’s encounters with Edward Snowden in Hong Kong, as he hands over classified documents providing evidence of mass indiscriminate and illegal invasions of privacy by the National Security Agency (NSA).
Coded Bias
Shalini Kantayya
CODED BIAS explores the fallout of MIT Media Lab researcher Joy Buolamwini’s discovery that facial recognition does not see dark-skinned faces accurately, and her journey to push for the first-ever legislation in the U.S. to govern against bias in the algorithms that impact us all.
Books
The Age of Surveillance Capitalism
Shoshana Zuboff
The titanic power struggles of the twentieth century were between industrial capital and labor, but the twenty-first century finds surveillance capital pitted against the entirety of our societies in a bloodless battle for power and profit as violent as any the world has seen.
Permanent Record
Edward Snowden
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
- Free and unredacted Chinese version (Announcement tweet: English, Chinese)
Privacy is Power
Carissa Véliz
As surveillance creeps into every corner of our lives, Carissa Véliz exposes how our personal data is giving too much power to big tech and governments, why that matters, and what we can do about it.
Reports and documents
Atlas of Surveillance
Electronic Frontier Foundation (EFF)
The Atlas of Surveillance is a database of surveillance technologies deployed by law enforcement in communities across the United States. This includes drones, body-worn cameras, automated license plate readers, facial recognition, and more. This research was compiled by more than 500 students and volunteers, and incorporates datasets from a variety of public and non-profit sources.
Big Ass Data Broker Opt-Out List
Yael Grauer
Internet Health Report (2020)
Mozilla
In this Internet Health Report (our fourth!), we reflect on the year that passed to gear up for the work ahead. We include a diagnosis on the current condition of the internet in a slideshow of “Internet Facts and Figures.” Three spotlight articles explore aspects of internet health, data and artificial intelligence through the lenses of racial justice, data and labor in the gig economy, and corporate and algorithmic transparency.
Panoptic Tracker
Internet Freedom Foundation (IFF)
IFF’s Project Panoptic aims to bring transparency and accountability to the relevant government stakeholders involved in the deployment and implementation of facial recognition technology (FRT) projects in India. This project has been built with the help from volunteers at Datakind and Frappe.
Password storage disclosures
Michal Špaček
How securely do they store user passwords & how good are they at letting us know?
Surveillance giants: How the business model of Google and Facebook threatens human rights
Amnesty International
Google and Facebook help connect the world and provide crucial services to billions. To participate meaningfully in today’s economy and society, and to realize their human rights, people rely on access to the internet—and to the tools Google and Facebook offer. But Google and Facebook’s platforms come at a systemic cost. The companies’ surveillance-based business model is inherently incompatible with the right to privacy and poses a threat to a range of other rights including freedom of opinion and expression, freedom of thought, and the right to equality and non-discrimination.
Top 200 most common passwords
NordPass
Here are the top 200 most common passwords in 2022. We learned that despite growing cybersecurity awareness, old habits die hard. The research shows that people still use weak passwords to protect their accounts. This year, we looked at how culture impacts passwords. Explore the list now.
Universal Declaration of Human Rights
United Nations
The Universal Declaration of Human Rights (UDHR) is a milestone document in the history of human rights. Drafted by representatives with different legal and cultural backgrounds from all regions of the world, the Declaration was proclaimed by the United Nations General Assembly in Paris on 10 December 1948 (General Assembly resolution 217 A) as a common standard of achievements for all peoples and all nations. It sets out, for the first time, fundamental human rights to be universally protected and it has been translated into over 500 languages.
Why Privacy Matters
Miles McCain
Privacy is important. Here are some simple reasons why.
Other resources
App Tracking Transparency Prompts Gallery
Sylvain Gauchet
A collaborative effort to gather as many live App Tracking Transparency (ATT) prompt examples as possible.
Dark Patterns Tip Line
Consumer Reports
Every day, we’re exploited for profit through dark patterns: design tactics used in websites and apps to persuade you into doing things you probably would not do otherwise. We need to take a stand against dark patterns—and you can help by reporting a dark pattern today. It will help us fight back against companies using manipulative dark patterns to take our private information, money, and time. You deserve respect, online and off.
Deceptive Patterns
Testimonium
Deceptive patterns (also known as “dark patterns”) are tricks used in websites and apps that make you do things that you didn’t mean to, like buying or signing up for something. Many types of deceptive pattern are already illegal in the EU and US, depending on the type and context of use. Businesses that use deceptive patterns are often caught up in legal cases and get hit with big fines and penalties. We’ve collected over 400 examples in our hall of shame. The most commonly complained about companies are Google, Facebook, Amazon and LinkedIn.
Digital Violence
Forensic Architecture, Amnesty International and The Citizen Lab
How the NSO Group Enables State Terror.
Why No HTTPS?
Troy Hunt
This is a list of the world’s top 100 websites by Tranco rank (as well as the top 50 sites by country) not automatically redirecting insecure requests to secure ones.
The Glass Room – The Misinformation Edition
Tactical Tech
What happens when we increasingly rely on social media and the web for nearly all our information? What information do we see, and what do we miss? How do we know if a picture or a tweet is genuine or truthful? And what can we do if we can’t be sure? Tactical Tech’s newest edition of The Glass Room Community Edition explores misinformation in all its forms.
Information is Beautiful
Data, information, knowledge: we distil it into beautiful, useful graphics & diagrams.
iOS 14.5 Opt-in Rate – Weekly Updates Since Launch
Flurry Analytics
With Apple’s release of iOS 14.5 at the end of April, iOS app developers are now required to request permission to track their users beyond the app in use. In our report, we share the weekly opt-in rate as well as the percentage of users with ‘restricted’ app tracking, both in the U.S. and worldwide, following the launch of iOS 14.5.