Page last edited → 12 December 2022
Page last reviewed → 6 August 2021
Index
1. Organizations and authorities
2. People
3. Movements and initiatives
4. Recurring live streams
5. Conferences
6. Podcasts
7. Blogs and newsletters
8. Guides
9. Films
10. Books
11. Reports and documents
12. Other resources
Organizations and authorities
Access Now
We defend and extend the digital rights of users at risk around the world.
Algorithmic Justice League (AJL)
Technology should serve all of us. Not just the privileged few. Join the Algorithmic Justice League in the movement towards equitable and accountable AI.
American Civil Liberties Union (ACLU)
The ACLU dares to create a more perfect union — beyond one person, party, or side. Our mission is to realize this promise of the United States Constitution for all and expand the reach of its guarantees.
Amnesty International
Amnesty International is a global movement of more than 10 million people in over 150 countries and territories who campaign to end abuses of human rights.
Chayn
We are a global nonprofit, run by survivors and allies from around the world, creating resources to inform and support the healing of survivors of gender-based violence. We create open source online resources and services for survivors of abuse that are trauma-informed, intersectional, multi-lingual and feminist.
Citizen Lab
University of Toronto
The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security.
Clinic to End Tech Abuse (CETA)
Cornell University
Everyone should be free to use technology without fear of harm from abusive partners or others. Survivors of abuse, stalking, or other mistreatment should have the support they need to keep themselves safe online and on their devices. Their voices should be at the center of technology design.
CryptoHarlem
Cybersecurity for the people. Nonprofit Cybersecurity Education & Advocacy.
CyPurr Collective
We’re a small cryptoparty and cat-enthusiast collective. Our mission is to educate the public on cybersecurity in an accessible and hollistic way with fun cats. Our work aims to resist systemic oppressions through community self-defense.
Data Protection Commission Ireland
The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected. The DPC is the Irish supervisory authority for the General Data Protection Regulation (GDPR), and also has functions and powers related to other important regulatory frameworks including the Irish ePrivacy Regulations (2011) and the EU Directive known as the Law Enforcement Directive.
Digital Defense Fund (DDF)
Digital Defense Fund was established in 2017 in response to the increased need for security and technology resources in the abortion rights movement after the 2016 election. Our mission is to leverage technology to defend and secure access to abortion. We envision a future where technology and innovation support secure, autonomous reproductive decisions, free from stigma.
Electronic Frontier Foundation (EFF)
The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. EFF’s mission is to ensure that technology supports freedom, justice, and innovation for all people of the world.
European Digital Rights (EDRi)
EDRi is the biggest European network defending rights and freedoms online. Currently 44 non-governmental organisations are members of EDRi and dozens of observers closely contribute to our work.
Fight for the Future
We are a group of artists, engineers, activists, and technologists who have been behind the largest online protests in human history, channeling Internet outrage into political power to win public interest victories previously thought to be impossible. We fight for a future where technology liberates — not oppresses — us. ✊
Freedom of the Press Foundation (FPF)
Freedom of the Press Foundation is a non-profit organization that protects, defends, and empowers public-interest journalism in the 21st century.
GreatFire
We are an anonymous organization based in China. We launched our first project in 2011 in an effort to help bring transparency to online censorship in China. Now we focus on helping Chinese to freely access information. Apart from being widely discussed in most major mass media, GreatFire has also been the subject of a number of academic papers from various research institutions. FreeWeibo.com won the 2013 Deutsche Welle “Best Of Online Activism” award in the “Best Innovation” category. In 2016, GreatFire won a Digital Activism fellowship from Index on Censorship.
Mozilla
Mozilla makes browsers, apps, code and tools that put people before profit. Our mission: Keep the internet open and accessible to all.
NetBlocks
Mapping Internet freedom in real time. Open, secure and reliable connectivity is essential for rights such as freedom of expression and freedom of association. Now we can measure network connectivity at Internet scale.
Open Observatory of Network Interference (OONI)
The Open Observatory of Network Interference (OONI) is a free software project that aims to empower decentralized efforts in increasing transparency of Internet censorship around the world.
Privacy International
Governments and corporations are using technology to exploit us. Their abuses of power threaten our freedoms and the very things that make us human. That’s why PI is here: to protect democracy, defend people’s dignity, and demand accountability from institutions who breach public trust.
Surveillance Technology Oversight Project (STOP)
S.T.O.P. litigates and advocates for privacy, working to abolish local governments’ systems of mass surveillance. Our work highlights the discriminatory impact of surveillance on Muslim Americans, immigrants, the LGBTQ+ community, indigenous peoples, and communities of color, particularly the unique trauma of anti-Black policing.
Tactical Tech
Tactical Tech is an international NGO that engages with citizens and civil-society organisations to explore and mitigate the impacts of technology on society.
World Wide Web Foundation
The World Wide Web Foundation was established in 2009 by web inventor Sir Tim Berners-Lee and Rosemary Leith to advance the open web as a public good and a basic right. We are an independent, international organisation fighting for digital equality — a world where everyone can access the web and use it to improve their lives.
People
Chelsea E. Manning
Chelsea E. Manning is a network security expert, activist, whistleblower, and a former intelligence analyst.
Eva Galperin
Eva Galperin is Director of Cybersecurity at the Electronic Frontier Foundation. Her work is primarily focused on providing privacy and security for vulnerable populations around the world.
Evan Greer
Evan is Director of Fight for the Future and has been organizing hard-hitting political campaigns for more than a decade. A talented writer, she is a regular contributor to numerous publications, including The Guardian, Newsweek, and Time Magazine. Prior to joining Fight for the Future, she toured as a professional musician. She continues to create music and organize live music events.
Edward Snowden
Edward Snowden is a whisteblower and President at the Freedom of the Press Foundation. He works on methods of enforcing human rights through the application and development of new technologies.
Gennie Gebhart
Gennie Gebhart is Activism Director at the Electronic Frontier Foundation. Her research and advocacy focus on consumer privacy and security, with an emphasis on third-party tracking, platform policy, secure messaging, and student privacy. She also works on content moderation and open access.
Harlo Holmes
Harlo Holmes is the Chief Information Security Officer (CISO) and Director of Digital Security at Freedom of the Press Foundation. She strives to help individual journalists in various media organizations become confident and effective in securing their communications within their newsrooms, with their sources, and with the public at large.
Jessy Irwin
Jessy Irwin is Head of Security at Tendermint, where she excels at translating complex cybersecurity problems into relatable terms, and is responsible for developing, maintaining and delivering comprehensive security strategy that supports and enables the needs of her organization and its people.
Joseph Cox
Joseph Cox is a journalist covering hackers, crime, and privacy for Motherboard/VICE.
Lily Hay Newman
Lily Hay Newman is a senior writer at WIRED focused on information security, digital privacy, and hacking.
Martin Shelton
Dr. Martin Shelton is the Principal Researcher at the Freedom of the Press Foundation, conducting user research and overseeing security editorial.
Micah Lee
Micah Lee is First Look Media’s Director of Information Security. He is a computer security engineer and an open-source software developer who writes about technical topics like digital and operational security, encryption tools, whistleblowing, and hacking using language that everyone can understand without dumbing it down. He develops security and privacy tools such as OnionShare, Dangerzone, and semiphemeral.
Olivia Martin
Olivia Martin is the Deputy Director of Digital Security at Freedom of the Press Foundation. A graduate of NYU’s Gallatin School of Individualized Study, her professional work focuses on researching and delivering digital security trainings to journalists, activists, and human rights defenders.
Troy Hunt
Troy Hunt is the Creator of Have I Been Pwned and a Microsoft Regional Director and MVP. He travels the world speaking at events, trains technology professionals, and creates courses for Pluralsight.
Zack Whittaker
Zack Whittaker is the Security Editor at TechCrunch.
Movements and initiatives
Reclaim Your Face
A movement led by civil society organisations across Europe
A ban on biometric mass surveillance is the only solution for a future where our choices are made by us, not by algorithms.
Recurring live streams
CryptoHarlem weekly livestream
Every Friday from 1 to 2 PM ET. Eastern Time is the local time in the eastern part of North America (including New York, United States and Ottawa, Canada), if you’re in a different time zone you can compare local time info here.
Digital Security and Roms
Freedom of the Press Foundation (FPF)
Usually every other Friday from 2 to 3 PM ET or from 4:30 to 5:30 PM ET. Eastern Time is the local time in the eastern part of North America (including New York, United States and Ottawa, Canada), if you’re in a different time zone you can compare local time info here.
PrivChat
Tor Project
A conversation about tech, human rights, and internet freedom brought to you by the Tor Project.
Conferences
RightsCon
Access Now
RightsCon is the world’s leading summit on human rights in the digital age.
Podcasts
CYBER
Motherboard/VICE
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don’t have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they’re breaking and to the industry’s most famous hackers and researchers about the biggest news in cybersecurity.
Darknet Diaries
Jack Rhysider
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
FLOSS Weekly
TWiT
We’re not talking dentistry here; FLOSS all about Free Libre Open Source Software. Join host Doc Searls and his rotating panel of co-hosts every Wednesday as they talk with the most interesting and important people in the Open Source and Free Software community.
How to Fix the Internet
Electronic Frontier Foundation (EFF)
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward.
Lock and Code
Malwarebytes
Welcome to Lock and Code, a Malwarebytes podcast. Every two weeks, we serve up the latest cybersecurity headlines, plus we dig deep into some of the industry’s most vexing topics. From deep state to deep fakes, we separate cybersecurity myth from fact.
Random but Memorable
1Password
Lighthearted security advice and banter from 1Password and guests.
Security Now
TWiT
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
Smashing Security
Graham Cluley and Carole Theriault
A helpful and hilarious take on the week’s tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It’s not your typical cybersecurity podcast…
Technology Pill
Privacy International
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
Troy Hunt’s Weekly Update
Troy Hunt
Updates from Troy Hunt, the creator of Have I Been Pwned.
WIRED Security
WIRED
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED’s Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
Your Undivided Attention
Center for Humane Technology
In this podcast from the Center for Humane Technology, co-hosts Tristan Harris and Aza Raskin expose how social media’s race for attention manipulates our choices, breaks down truth, and destabilizes our real-world communities.
In Machines We Trust
MIT Technology Review
A podcast about the automation of everything. Host Jennifer Strong and the team at MIT Technology Review look at what it means to entrust artificial intelligence with our most sensitive decisions.
Kill Switch
Access Now and Volume
Please Note: This is a podcast mini-series published between Jul and Aug 2020
Kill Switch is a podcast series that explores the alarming rise of anti-democratic internet shutdowns and related digital rights violations across the world. The series follows inter-related stories looking at unique facets of internet shutdowns and digital rights violations from the unique perspectives of different role-players centered in different geographic locations.
IRL: Online Life is Real Life
Mozilla
Please Note: The latest episode of this podcast was published in Sep 2019
Our online life is real life. We walk, talk, work, LOL and even love on the Internet – but we don’t always treat it like real life. Host Manoush Zomorodi explores this disconnect with stories from the wilds of the Web, and gets to the bottom of online issues that affect us all.
Blogs and newsletters
Crafting Privacy
A labor of love. Updates and insights from the Standard Notes team.
Digital Security Blog
Freedom of the Press Foundation (FPF)
Regular musings from FPF’s training community about the intersections of digital security and journalism.
Distilled – The Mozilla Blog
The main Mozilla blog for all official news, notes and ramblings from the Mozilla project. Expect to get updates on new Firefox releases, announcements on new initiatives and products and other major news from Mozilla. If there is only one blog you would like to follow, this is the one!
Mozilla Foundation Blog
Mozilla’s blog features guides to making your online life better, stories from the movement, and critical analysis of issues around internet health.
News & Advocacy
Freedom of the Press Foundation (FPF)
Stay up to date on government secrecy, surveillance, and the rights of reporters and whistle-blowers.
Open Policy & Advocacy
Mozilla
Mozilla’s official blog on open Internet policy initiatives and developments.
Proton blog
Latest news on privacy and the internet.
Spread Privacy
DuckDuckGo
The Official DuckDuckGo Blog.
DuckDuckGo Privacy Newsletters
Privacy tips and news, straight to your inbox. Stay protected and informed with our privacy newsletters.
This week in security
Zack Whittaker
A weekly tl;dr cybersecurity newsletter of all the major stuff you missed, but really need to know. It includes news, the happy corner, a featured cyber cat (or friend), and more. It’s sent every Sunday, and is completely free.
Guides
2FA Directory
2FactorAuth
List of websites and whether or not they support 2FA.
A First Look at Digital Security
Access Now
This booklet is made to help identify what you might have to protect in your digital world. You will find each persona has characteristics and experiences you may share, threats you may face, and strategies that may be relevant to your work. You will find this booklet useful as a gateway to examine and map out your threats online.
BLOCKED
SWARM Collective
A sex worker’s guide to stalking and harassment. This is a 34-page PDF for sex workers on digital security, setting boundaries with clients, legal definitions of different kinds of stalking/harassment and where you can turn for help.
Data Detox Kit
Tactical Tech
Everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Data Detox x Youth
Tactical Tech
Data Detox x Youth is an activity book to help young people take control of their tech. This interactive toolkit encourages young people to think about different aspects of their digital lives, from their social media profiles to their passwords, with simple activities for reflection and play.
Device and Data Access when Personal Safety is At Risk
Apple
Apple makes it easy to connect and share your life with the people closest to you. What you share, and whom you share it with, is up to you — including the decision to make changes to better protect your information or personal safety.
- Checklist: If you want to see if anyone else has access to your device or accounts
- Checklist: If you want to make sure no one else can see your location
Diceware method
Arnold Reinhold
Diceware is a method for creating passphrases, passwords, and other cryptographic variables using ordinary dice as a hardware random number generator.
- EFF’s word list
- Arnold Reinhold’s word list
- Diceware (Wikipedia)
- How to Make a Super-Secure Password Using Dice (EFF)
- EFF Dice-Generated Passphrases (EFF)
- Passphrases That You Can Memorize — But That Even The NSA Can’t Guess (The Intercept)
Does my site need HTTPS?
Matt Holt
Find out if your site needs HTTPS.
Doxxing: Tips To Protect Yourself Online & How to Minimize Harm
Daly Barnett – Electronic Frontier Foundation (EFF)
By itself, being doxxed can be dangerous, as it may reveal information about you that could harm you if it were publicly known. More often it is used to escalate to greater harm such as mass online harassment, in-person violence, or targeting other members of your community. Your political beliefs or status as a member of a marginalized community can amplify these threats.
Everyday Encryption
Human Rights Watch
This game is about the everyday choices you make about your security, and the role encryption plays in those choices. Digital security is always about making compromises and tradeoffs—what do you want to protect, and from whom? You can never be 100 percent secure, but encryption can help reduce your digital security risks.
GDPR explained
What’s the General Data Protection Regulation (GDPR)? What does the new regulation mean for you as an individual? What does it mean for you as a company or organisation?
Guidance on Connected Toys and Devices
Data Protection Commission Ireland
Many children enjoy playing with toys and devices that have the ability to interact with them, either directly or through an online ‘app’. The popularity of these toys and devices, which can provide a fun and educational experience, along with advances in technology, means that there are more and more of these products on the market to choose from. With this in mind, the Data Protection Commission (DPC) has put together this short guidance to assist you if/when you decide to purchase one.
Guides & Training
Freedom of the Press Foundation (FPF)
Our training team delivers digital security trainings to news organizations, freelance and citizen journalists, and other at-risk groups. With education and advocacy, we aim to protect press freedoms through the adoption of the tools and practices included in our trainings.
How HTTPS works
DNSimple
Have you ever wondered why a green lock icon appears on your browser URL bar? And why is it important? We did too, and this comic is for you!
Just Delete Me
A directory of direct links to delete your account from web services.
Just Get My Data
A directory of direct links for you to obtain your data from web services.
*Privacy Not Included
Mozilla
How creepy is that smart speaker, that fitness tracker, those wireless headphones? We created this guide to help you shop for safe, secure connected products.
PrivacyTools
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. PrivacyTools provides services, tools and knowledge to protect your privacy against global mass surveillance.
Protect yourself and your community: Use these digital security tips
Access Now
What you do online can have real consequences for you and the people you care about. To mitigate the digital threats that can affect you, your work, and your community, Access Now’s Digital Security Helpline created [a series of] GIFs that provide useful tips for protecting your accounts and data online.
Secure Messaging Apps Comparison
Mark Williams
I created this site to enable people to compare many so-called “secure messaging apps”. Likewise, I hope to educate people as to which functionality is required for truly secure messaging.
Security Education Companion
Electronic Frontier Foundation (EFF)
A free resource for digital security educators.
Security Planner
Consumer Reports
Keep Your Data Secure With a Personalized Plan. Cut down on data collection and prevent hackers from invading your laptop, tablet and even your phone. Answer a few simple questions to get customized recommendations to help you safely backup files, browse online without tracking, avoid phishing scams, and prevent identity theft.
Speak Up & Stay Safe(r)
Jaclyn Friedman, Anita Sarkeesian and Renee Bracey Sherman
Warning: This project was last updated in 2018, parts of it could be now outdated
A Guide to Protecting Yourself From Online Harassment.
Street-Level Surveillance
Electronic Frontier Foundation (EFF)
A Guide to Law Enforcement Spying Technology.
Surveillance Self-Defense
Electronic Frontier Foundation (EFF)
Tips, Tools and How-tos for Safer Online Communications.
Terms of Service; Didn’t Read
“I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that.
Your guide to the Digital Defenders
European Digital Rights (EDRi)
Warning: This guide was published in 2016, parts of it could be now outdatedated
Children’s freedom to explore and develop should not be limited due to lack of awareness of privacy-protecting strategies. The booklet helps them make safer and more informed choices about what to share and how to share online. It includes chapters on what privacy actually is, how to use safer messaging systems and how to improve the security of smartphones.
Zebra Crossing
Jason Li
An easy-to-use digital safety checklist.
Films
Citizenfour
Laura Poitras
CITIZENFOUR is a real life thriller, unfolding by the minute, giving audiences unprecedented access to filmmaker Laura Poitras and journalist Glenn Greenwald’s encounters with Edward Snowden in Hong Kong, as he hands over classified documents providing evidence of mass indiscriminate and illegal invasions of privacy by the National Security Agency (NSA).
Coded Bias
Shalini Kantayya
CODED BIAS explores the fallout of MIT Media Lab researcher Joy Buolamwini’s discovery that facial recognition does not see dark-skinned faces accurately, and her journey to push for the first-ever legislation in the U.S. to govern against bias in the algorithms that impact us all.
Books
The Age of Surveillance Capitalism
Shoshana Zuboff
The titanic power struggles of the twentieth century were between industrial capital and labor, but the twenty-first century finds surveillance capital pitted against the entirety of our societies in a bloodless battle for power and profit as violent as any the world has seen.
Permanent Record
Edward Snowden
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
- Free and unredacted Chinese version (Announcement tweet: English, Chinese)
Privacy is Power
Carissa Véliz
As surveillance creeps into every corner of our lives, Carissa Véliz exposes how our personal data is giving too much power to big tech and governments, why that matters, and what we can do about it.
Reports and documents
Atlas of Surveillance
Electronic Frontier Foundation (EFF)
The Atlas of Surveillance is a database of surveillance technologies deployed by law enforcement in communities across the United States. This includes drones, body-worn cameras, automated license plate readers, facial recognition, and more. This research was compiled by more than 500 students and volunteers, and incorporates datasets from a variety of public and non-profit sources.
Big Ass Data Broker Opt-Out List
Yael Grauer
Internet Health Report (2020)
Mozilla
In this Internet Health Report (our fourth!), we reflect on the year that passed to gear up for the work ahead. We include a diagnosis on the current condition of the internet in a slideshow of “Internet Facts and Figures.” Three spotlight articles explore aspects of internet health, data and artificial intelligence through the lenses of racial justice, data and labor in the gig economy, and corporate and algorithmic transparency.
Panoptic Tracker
Internet Freedom Foundation (IFF)
IFF’s Project Panoptic aims to bring transparency and accountability to the relevant government stakeholders involved in the deployment and implementation of facial recognition technology (FRT) projects in India. This project has been built with the help from volunteers at Datakind and Frappe.
Password storage disclosures
Michal Špaček
How securely do they store user passwords & how good are they at letting us know?
Surveillance giants: How the business model of Google and Facebook threatens human rights
Amnesty International
Google and Facebook help connect the world and provide crucial services to billions. To participate meaningfully in today’s economy and society, and to realize their human rights, people rely on access to the internet—and to the tools Google and Facebook offer. But Google and Facebook’s platforms come at a systemic cost. The companies’ surveillance-based business model is inherently incompatible with the right to privacy and poses a threat to a range of other rights including freedom of opinion and expression, freedom of thought, and the right to equality and non-discrimination.
Top 200 most common passwords
NordPass
Here are the top 200 most common passwords in 2022. We learned that despite growing cybersecurity awareness, old habits die hard. The research shows that people still use weak passwords to protect their accounts. This year, we looked at how culture impacts passwords. Explore the list now.
Universal Declaration of Human Rights
United Nations
The Universal Declaration of Human Rights (UDHR) is a milestone document in the history of human rights. Drafted by representatives with different legal and cultural backgrounds from all regions of the world, the Declaration was proclaimed by the United Nations General Assembly in Paris on 10 December 1948 (General Assembly resolution 217 A) as a common standard of achievements for all peoples and all nations. It sets out, for the first time, fundamental human rights to be universally protected and it has been translated into over 500 languages.
Why Privacy Matters
Miles McCain
Privacy is important. Here are some simple reasons why.
Other resources
App Tracking Transparency Prompts Gallery
Sylvain Gauchet
A collaborative effort to gather as many live App Tracking Transparency (ATT) prompt examples as possible.
Dark Patterns
Harry Brignull
Dark Patterns are tricks used in websites and apps that make you do things that you didn’t mean to, like buying or signing up for something. The purpose of this site is to spread awareness and to shame companies that use them.
Dark Patterns Tip Line
Consumer Reports
Every day, we’re exploited for profit through dark patterns: design tactics used in websites and apps to persuade you into doing things you probably would not do otherwise. We need to take a stand against dark patterns—and you can help by reporting a dark pattern today. It will help us fight back against companies using manipulative dark patterns to take our private information, money, and time. You deserve respect, online and off.
Digital Violence
Forensic Architecture, Amnesty International and The Citizen Lab
How the NSO Group Enables State Terror.
Why No HTTPS?
Troy Hunt
This is a list of the world’s top 100 websites by Tranco rank (as well as the top 50 sites by country) not automatically redirecting insecure requests to secure ones.
The Glass Room – The Misinformation Edition
Tactical Tech
What happens when we increasingly rely on social media and the web for nearly all our information? What information do we see, and what do we miss? How do we know if a picture or a tweet is genuine or truthful? And what can we do if we can’t be sure? Tactical Tech’s newest edition of The Glass Room Community Edition explores misinformation in all its forms.
Information is Beautiful
Data, information, knowledge: we distil it into beautiful, useful graphics & diagrams.
iOS 14.5 Opt-in Rate – Weekly Updates Since Launch
Flurry Analytics
With Apple’s release of iOS 14.5 at the end of April, iOS app developers are now required to request permission to track their users beyond the app in use. In our report, we share the weekly opt-in rate as well as the percentage of users with ‘restricted’ app tracking, both in the U.S. and worldwide, following the launch of iOS 14.5.