Resources

In italiano »

Page last edited → 12 December 2022
Page last reviewed → 6 August 2021

Index

1. Organizations and authorities

2. People

3. Movements and initiatives

4. Recurring live streams

5. Conferences

6. Podcasts

7. Blogs and newsletters

8. Guides

9. Films

10. Books

11. Reports and documents

12. Other resources

Organizations and authorities

Access Now

We defend and extend the digital rights of users at risk around the world.

Algorithmic Justice League (AJL)

Technology should serve all of us. Not just the privileged few. Join the Algorithmic Justice League in the movement towards equitable and accountable AI.

American Civil Liberties Union (ACLU)

The ACLU dares to create a more perfect union — beyond one person, party, or side. Our mission is to realize this promise of the United States Constitution for all and expand the reach of its guarantees.

Amnesty International

Amnesty International is a global movement of more than 10 million people in over 150 countries and territories who campaign to end abuses of human rights.

Chayn

We are a global nonprofit, run by survivors and allies from around the world, creating resources to inform and support the healing of survivors of gender-based violence. We create open source online resources and services for survivors of abuse that are trauma-informed, intersectional, multi-lingual and feminist.

Citizen Lab

University of Toronto

The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security.

Clinic to End Tech Abuse (CETA)

Cornell University

Everyone should be free to use technology without fear of harm from abusive partners or others. Survivors of abuse, stalking, or other mistreatment should have the support they need to keep themselves safe online and on their devices. Their voices should be at the center of technology design.

CryptoHarlem

Cybersecurity for the people. Nonprofit Cybersecurity Education & Advocacy.

CyPurr Collective

We’re a small cryptoparty and cat-enthusiast collective. Our mission is to educate the public on cybersecurity in an accessible and hollistic way with fun cats. Our work aims to resist systemic oppressions through community self-defense.

Data Protection Commission Ireland

The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected. The DPC is the Irish supervisory authority for the General Data Protection Regulation (GDPR), and also has functions and powers related to other important regulatory frameworks including the Irish ePrivacy Regulations (2011) and the EU Directive known as the Law Enforcement Directive.

Digital Defense Fund (DDF)

Digital Defense Fund was established in 2017 in response to the increased need for security and technology resources in the abortion rights movement after the 2016 election. Our mission is to leverage technology to defend and secure access to abortion. We envision a future where technology and innovation support secure, autonomous reproductive decisions, free from stigma.

Electronic Frontier Foundation (EFF)

The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. EFF’s mission is to ensure that technology supports freedom, justice, and innovation for all people of the world.

European Digital Rights (EDRi)

EDRi is the biggest European network defending rights and freedoms online. Currently 44 non-governmental organisations are members of EDRi and dozens of observers closely contribute to our work.

Fight for the Future

We are a group of artists, engineers, activists, and technologists who have been behind the largest online protests in human history, channeling Internet outrage into political power to win public interest victories previously thought to be impossible. We fight for a future where technology liberates — not oppresses — us. ✊

Freedom of the Press Foundation (FPF)

Freedom of the Press Foundation is a non-profit organization that protects, defends, and empowers public-interest journalism in the 21st century.

GreatFire

We are an anonymous organization based in China. We launched our first project in 2011 in an effort to help bring transparency to online censorship in China. Now we focus on helping Chinese to freely access information. Apart from being widely discussed in most major mass media, GreatFire has also been the subject of a number of academic papers from various research institutions. FreeWeibo.com won the 2013 Deutsche Welle “Best Of Online Activism” award in the “Best Innovation” category. In 2016, GreatFire won a Digital Activism fellowship from Index on Censorship.

Mozilla

Mozilla makes browsers, apps, code and tools that put people before profit. Our mission: Keep the internet open and accessible to all.

NetBlocks

Mapping Internet freedom in real time. Open, secure and reliable connectivity is essential for rights such as freedom of expression and freedom of association. Now we can measure network connectivity at Internet scale.

Open Observatory of Network Interference (OONI)

The Open Observatory of Network Interference (OONI) is a free software project that aims to empower decentralized efforts in increasing transparency of Internet censorship around the world.

Privacy International

Governments and corporations are using technology to exploit us. Their abuses of power threaten our freedoms and the very things that make us human. That’s why PI is here: to protect democracy, defend people’s dignity, and demand accountability from institutions who breach public trust.

Surveillance Technology Oversight Project (STOP)

S.T.O.P. litigates and advocates for privacy, working to abolish local governments’ systems of mass surveillance. Our work highlights the discriminatory impact of surveillance on Muslim Americans, immigrants, the LGBTQ+ community, indigenous peoples, and communities of color, particularly the unique trauma of anti-Black policing.

Tactical Tech

Tactical Tech is an international NGO that engages with citizens and civil-society organisations to explore and mitigate the impacts of technology on society.

World Wide Web Foundation

The World Wide Web Foundation was established in 2009 by web inventor Sir Tim Berners-Lee and Rosemary Leith to advance the open web as a public good and a basic right. We are an independent, international organisation fighting for digital equality — a world where everyone can access the web and use it to improve their lives.

People

Chelsea E. Manning

Chelsea E. Manning is a network security expert, activist, whistleblower, and a former intelligence analyst.

Eva Galperin

Eva Galperin is Director of Cybersecurity at the Electronic Frontier Foundation. Her work is primarily focused on providing privacy and security for vulnerable populations around the world.

Evan Greer

Evan is Director of Fight for the Future and has been organizing hard-hitting political campaigns for more than a decade. A talented writer, she is a regular contributor to numerous publications, including The Guardian, Newsweek, and Time Magazine. Prior to joining Fight for the Future, she toured as a professional musician. She continues to create music and organize live music events.

Edward Snowden

Edward Snowden is a whisteblower and President at the Freedom of the Press Foundation. He works on methods of enforcing human rights through the application and development of new technologies.

Gennie Gebhart

Gennie Gebhart is Activism Director at the Electronic Frontier Foundation. Her research and advocacy focus on consumer privacy and security, with an emphasis on third-party tracking, platform policy, secure messaging, and student privacy. She also works on content moderation and open access.

Harlo Holmes

Harlo Holmes is the Chief Information Security Officer (CISO) and Director of Digital Security at Freedom of the Press Foundation. She strives to help individual journalists in various media organizations become confident and effective in securing their communications within their newsrooms, with their sources, and with the public at large.

Jessy Irwin

Jessy Irwin is Head of Security at Tendermint, where she excels at translating complex cybersecurity problems into relatable terms, and is responsible for developing, maintaining and delivering comprehensive security strategy that supports and enables the needs of her organization and its people.

Joseph Cox

Joseph Cox is a journalist covering hackers, crime, and privacy for Motherboard/VICE.

Lily Hay Newman

Lily Hay Newman is a senior writer at WIRED focused on information security, digital privacy, and hacking.

Martin Shelton

Dr. Martin Shelton is the Principal Researcher at the Freedom of the Press Foundation, conducting user research and overseeing security editorial.

Micah Lee

Micah Lee is First Look Media’s Director of Information Security. He is a computer security engineer and an open-source software developer who writes about technical topics like digital and operational security, encryption tools, whistleblowing, and hacking using language that everyone can understand without dumbing it down. He develops security and privacy tools such as OnionShare, Dangerzone, and semiphemeral.

Olivia Martin

Olivia Martin is the Deputy Director of Digital Security at Freedom of the Press Foundation. A graduate of NYU’s Gallatin School of Individualized Study, her professional work focuses on researching and delivering digital security trainings to journalists, activists, and human rights defenders.

Troy Hunt

Troy Hunt is the Creator of Have I Been Pwned and a Microsoft Regional Director and MVP. He travels the world speaking at events, trains technology professionals, and creates courses for Pluralsight.

Zack Whittaker

Zack Whittaker is the Security Editor at TechCrunch.

Movements and initiatives

Reclaim Your Face

A movement led by civil society organisations across Europe

A ban on biometric mass surveillance is the only solution for a future where our choices are made by us, not by algorithms.

Recurring live streams

CryptoHarlem weekly livestream

Every Friday from 1 to 2 PM ET. Eastern Time is the local time in the eastern part of North America (including New York, United States and Ottawa, Canada), if you’re in a different time zone you can compare local time info here.

Digital Security and Roms

Freedom of the Press Foundation (FPF)

Usually every other Friday from 2 to 3 PM ET or from 4:30 to 5:30 PM ET. Eastern Time is the local time in the eastern part of North America (including New York, United States and Ottawa, Canada), if you’re in a different time zone you can compare local time info here.

PrivChat

Tor Project

A conversation about tech, human rights, and internet freedom brought to you by the Tor Project.

Conferences

RightsCon

Access Now

RightsCon is the world’s leading summit on human rights in the digital age.

Podcasts

CYBER

Motherboard/VICE

Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don’t have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they’re breaking and to the industry’s most famous hackers and researchers about the biggest news in cybersecurity.

Darknet Diaries

Jack Rhysider

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

FLOSS Weekly

TWiT

We’re not talking dentistry here; FLOSS all about Free Libre Open Source Software. Join host Doc Searls and his rotating panel of co-hosts every Wednesday as they talk with the most interesting and important people in the Open Source and Free Software community.

How to Fix the Internet

Electronic Frontier Foundation (EFF)

The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward.

Lock and Code

Malwarebytes

Welcome to Lock and Code, a Malwarebytes podcast. Every two weeks, we serve up the latest cybersecurity headlines, plus we dig deep into some of the industry’s most vexing topics. From deep state to deep fakes, we separate cybersecurity myth from fact.

Random but Memorable

1Password

Lighthearted security advice and banter from 1Password and guests.

Security Now

TWiT

Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.

Smashing Security

Graham Cluley and Carole Theriault

A helpful and hilarious take on the week’s tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It’s not your typical cybersecurity podcast…

Technology Pill

Privacy International

Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.

Troy Hunt’s Weekly Update

Troy Hunt

Updates from Troy Hunt, the creator of Have I Been Pwned.

WIRED Security

WIRED

Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED’s Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.

Your Undivided Attention

Center for Humane Technology

In this podcast from the Center for Humane Technology, co-hosts Tristan Harris and Aza Raskin expose how social media’s race for attention manipulates our choices, breaks down truth, and destabilizes our real-world communities.

In Machines We Trust

MIT Technology Review

A podcast about the automation of everything. Host Jennifer Strong and the team at MIT Technology Review look at what it means to entrust artificial intelligence with our most sensitive decisions.

Kill Switch

Access Now and Volume

Please Note: This is a podcast mini-series published between Jul and Aug 2020

Kill Switch is a podcast series that explores the alarming rise of anti-democratic internet shutdowns and related digital rights violations across the world. The series follows inter-related stories looking at unique facets of internet shutdowns and digital rights violations from the unique perspectives of different role-players centered in different geographic locations.

IRL: Online Life is Real Life

Mozilla

Please Note: The latest episode of this podcast was published in Sep 2019

Our online life is real life. We walk, talk, work, LOL and even love on the Internet – but we don’t always treat it like real life. Host Manoush Zomorodi explores this disconnect with stories from the wilds of the Web, and gets to the bottom of online issues that affect us all.

Blogs and newsletters

Crafting Privacy

A labor of love. Updates and insights from the Standard Notes team.

Digital Security Blog

Freedom of the Press Foundation (FPF)

Regular musings from FPF’s training community about the intersections of digital security and journalism.

Distilled – The Mozilla Blog

The main Mozilla blog for all official news, notes and ramblings from the Mozilla project. Expect to get updates on new Firefox releases, announcements on new initiatives and products and other major news from Mozilla. If there is only one blog you would like to follow, this is the one!

Mozilla Foundation Blog

Mozilla’s blog features guides to making your online life better, stories from the movement, and critical analysis of issues around internet health.

News & Advocacy

Freedom of the Press Foundation (FPF)

Stay up to date on government secrecy, surveillance, and the rights of reporters and whistle-blowers.

Open Policy & Advocacy

Mozilla

Mozilla’s official blog on open Internet policy initiatives and developments.

Proton blog

Latest news on privacy and the internet.

Spread Privacy

DuckDuckGo

The Official DuckDuckGo Blog.

DuckDuckGo Privacy Newsletters

Privacy tips and news, straight to your inbox. Stay protected and informed with our privacy newsletters.

This week in security

Zack Whittaker

A weekly tl;dr cybersecurity newsletter of all the major stuff you missed, but really need to know. It includes news, the happy corner, a featured cyber cat (or friend), and more. It’s sent every Sunday, and is completely free.

Guides

2FA Directory

2FactorAuth

List of websites and whether or not they support 2FA.

A First Look at Digital Security

Access Now

This booklet is made to help identify what you might have to protect in your digital world. You will find each persona has characteristics and experiences you may share, threats you may face, and strategies that may be relevant to your work. You will find this booklet useful as a gateway to examine and map out your threats online.

BLOCKED

SWARM Collective

A sex worker’s guide to stalking and harassment. This is a 34-page PDF for sex workers on digital security, setting boundaries with clients, legal definitions of different kinds of stalking/harassment and where you can turn for help.

Data Detox Kit

Tactical Tech

Everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.

Data Detox x Youth

Tactical Tech

Data Detox x Youth is an activity book to help young people take control of their tech. This interactive toolkit encourages young people to think about different aspects of their digital lives, from their social media profiles to their passwords, with simple activities for reflection and play.

Device and Data Access when Personal Safety is At Risk

Apple

Apple makes it easy to connect and share your life with the people closest to you. What you share, and whom you share it with, is up to you — including the decision to make changes to better protect your information or personal safety.

Diceware method

Arnold Reinhold

Diceware is a method for creating passphrases, passwords, and other cryptographic variables using ordinary dice as a hardware random number generator.

Does my site need HTTPS?

Matt Holt

Find out if your site needs HTTPS.

Doxxing: Tips To Protect Yourself Online & How to Minimize Harm

Daly Barnett – Electronic Frontier Foundation (EFF)

By itself, being doxxed can be dangerous, as it may reveal information about you that could harm you if it were publicly known. More often it is used to escalate to greater harm such as mass online harassment, in-person violence, or targeting other members of your community. Your political beliefs or status as a member of a marginalized community can amplify these threats.

Everyday Encryption

Human Rights Watch

This game is about the everyday choices you make about your security, and the role encryption plays in those choices. Digital security is always about making compromises and tradeoffs—what do you want to protect, and from whom? You can never be 100 percent secure, but encryption can help reduce your digital security risks.

GDPR explained

What’s the General Data Protection Regulation (GDPR)? What does the new regulation mean for you as an individual? What does it mean for you as a company or organisation?

Guidance on Connected Toys and Devices

Data Protection Commission Ireland

Many children enjoy playing with toys and devices that have the ability to interact with them, either directly or through an online ‘app’. The popularity of these toys and devices, which can provide a fun and educational experience, along with advances in technology, means that there are more and more of these products on the market to choose from. With this in mind, the Data Protection Commission (DPC) has put together this short guidance to assist you if/when you decide to purchase one.

Guides & Training

Freedom of the Press Foundation (FPF)

Our training team delivers digital security trainings to news organizations, freelance and citizen journalists, and other at-risk groups. With education and advocacy, we aim to protect press freedoms through the adoption of the tools and practices included in our trainings.

How HTTPS works

DNSimple

Have you ever wondered why a green lock icon appears on your browser URL bar? And why is it important? We did too, and this comic is for you!

Just Delete Me

A directory of direct links to delete your account from web services.

Just Get My Data

A directory of direct links for you to obtain your data from web services.

*Privacy Not Included

Mozilla

How creepy is that smart speaker, that fitness tracker, those wireless headphones? We created this guide to help you shop for safe, secure connected products.

PrivacyTools

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. PrivacyTools provides services, tools and knowledge to protect your privacy against global mass surveillance.

Protect yourself and your community: Use these digital security tips

Access Now

What you do online can have real consequences for you and the people you care about. To mitigate the digital threats that can affect you, your work, and your community, Access Now’s Digital Security Helpline created [a series of] GIFs that provide useful tips for protecting your accounts and data online.

Secure Messaging Apps Comparison

Mark Williams

I created this site to enable people to compare many so-called “secure messaging apps”. Likewise, I hope to educate people as to which functionality is required for truly secure messaging.

Security Education Companion

Electronic Frontier Foundation (EFF)

A free resource for digital security educators.

Security Planner

Consumer Reports

Keep Your Data Secure With a Personalized Plan. Cut down on data collection and prevent hackers from invading your laptop, tablet and even your phone. Answer a few simple questions to get customized recommendations to help you safely backup files, browse online without tracking, avoid phishing scams, and prevent identity theft.

Speak Up & Stay Safe(r)

Jaclyn Friedman, Anita Sarkeesian and Renee Bracey Sherman

Warning: This project was last updated in 2018, parts of it could be now outdated

A Guide to Protecting Yourself From Online Harassment.

Street-Level Surveillance

Electronic Frontier Foundation (EFF)

A Guide to Law Enforcement Spying Technology.

Surveillance Self-Defense

Electronic Frontier Foundation (EFF)

Tips, Tools and How-tos for Safer Online Communications.

Terms of Service; Didn’t Read

“I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that.

Your guide to the Digital Defenders

European Digital Rights (EDRi)

Warning: This guide was published in 2016, parts of it could be now outdatedated

Children’s freedom to explore and develop should not be limited due to lack of awareness of privacy-protecting strategies. The booklet helps them make safer and more informed choices about what to share and how to share online. It includes chapters on what privacy actually is, how to use safer messaging systems and how to improve the security of smartphones.

Zebra Crossing

Jason Li

An easy-to-use digital safety checklist.

Films

Citizenfour

Laura Poitras

CITIZENFOUR is a real life thriller, unfolding by the minute, giving audiences unprecedented access to filmmaker Laura Poitras and journalist Glenn Greenwald’s encounters with Edward Snowden in Hong Kong, as he hands over classified documents providing evidence of mass indiscriminate and illegal invasions of privacy by the National Security Agency (NSA).

Coded Bias

Shalini Kantayya

CODED BIAS explores the fallout of MIT Media Lab researcher Joy Buolamwini’s discovery that facial recognition does not see dark-skinned faces accurately, and her journey to push for the first-ever legislation in the U.S. to govern against bias in the algorithms that impact us all.

Books

The Age of Surveillance Capitalism

Shoshana Zuboff

The titanic power struggles of the twentieth century were between industrial capital and labor, but the twenty-first century finds surveillance capital pitted against the entirety of our societies in a bloodless battle for power and profit as violent as any the world has seen.

Permanent Record

Edward Snowden

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

Privacy is Power

Carissa Véliz

As surveillance creeps into every corner of our lives, Carissa Véliz exposes how our personal data is giving too much power to big tech and governments, why that matters, and what we can do about it.

Reports and documents

Atlas of Surveillance

Electronic Frontier Foundation (EFF)

The Atlas of Surveillance is a database of surveillance technologies deployed by law enforcement in communities across the United States. This includes drones, body-worn cameras, automated license plate readers, facial recognition, and more. This research was compiled by more than 500 students and volunteers, and incorporates datasets from a variety of public and non-profit sources.

Big Ass Data Broker Opt-Out List

Yael Grauer

Internet Health Report (2020)

Mozilla

In this Internet Health Report (our fourth!), we reflect on the year that passed to gear up for the work ahead. We include a diagnosis on the current condition of the internet in a slideshow of “Internet Facts and Figures.” Three spotlight articles explore aspects of internet health, data and artificial intelligence through the lenses of racial justice, data and labor in the gig economy, and corporate and algorithmic transparency.

Panoptic Tracker

Internet Freedom Foundation (IFF)

IFF’s Project Panoptic aims to bring transparency and accountability to the relevant government stakeholders involved in the deployment and implementation of facial recognition technology (FRT) projects in India. This project has been built with the help from volunteers at Datakind and Frappe.

Password storage disclosures

Michal Špaček

How securely do they store user passwords & how good are they at letting us know?

Surveillance giants: How the business model of Google and Facebook threatens human rights

Amnesty International

Google and Facebook help connect the world and provide crucial services to billions. To participate meaningfully in today’s economy and society, and to realize their human rights, people rely on access to the internet—and to the tools Google and Facebook offer. But Google and Facebook’s platforms come at a systemic cost. The companies’ surveillance-based business model is inherently incompatible with the right to privacy and poses a threat to a range of other rights including freedom of opinion and expression, freedom of thought, and the right to equality and non-discrimination.

Top 200 most common passwords

NordPass

Here are the top 200 most common passwords in 2022. We learned that despite growing cybersecurity awareness, old habits die hard. The research shows that people still use weak passwords to protect their accounts. This year, we looked at how culture impacts passwords. Explore the list now.

Universal Declaration of Human Rights

United Nations

The Universal Declaration of Human Rights (UDHR) is a milestone document in the history of human rights. Drafted by representatives with different legal and cultural backgrounds from all regions of the world, the Declaration was proclaimed by the United Nations General Assembly in Paris on 10 December 1948 (General Assembly resolution 217 A) as a common standard of achievements for all peoples and all nations. It sets out, for the first time, fundamental human rights to be universally protected and it has been translated into over 500 languages.

Why Privacy Matters

Miles McCain

Privacy is important. Here are some simple reasons why.

Other resources

Sylvain Gauchet

A collaborative effort to gather as many live App Tracking Transparency (ATT) prompt examples as possible.

Dark Patterns

Harry Brignull

Dark Patterns are tricks used in websites and apps that make you do things that you didn’t mean to, like buying or signing up for something. The purpose of this site is to spread awareness and to shame companies that use them.

Dark Patterns Tip Line

Consumer Reports

Every day, we’re exploited for profit through dark patterns: design tactics used in websites and apps to persuade you into doing things you probably would not do otherwise. We need to take a stand against dark patterns—and you can help by reporting a dark pattern today. It will help us fight back against companies using manipulative dark patterns to take our private information, money, and time. You deserve respect, online and off.

Digital Violence

Forensic Architecture, Amnesty International and The Citizen Lab

How the NSO Group Enables State Terror.

Why No HTTPS?

Troy Hunt

This is a list of the world’s top 100 websites by Tranco rank (as well as the top 50 sites by country) not automatically redirecting insecure requests to secure ones.

The Glass Room – The Misinformation Edition

Tactical Tech

What happens when we increasingly rely on social media and the web for nearly all our information? What information do we see, and what do we miss? How do we know if a picture or a tweet is genuine or truthful? And what can we do if we can’t be sure? Tactical Tech’s newest edition of The Glass Room Community Edition explores misinformation in all its forms.

Information is Beautiful

Data, information, knowledge: we distil it into beautiful, useful graphics & diagrams.

iOS 14.5 Opt-in Rate – Weekly Updates Since Launch

Flurry Analytics

With Apple’s release of iOS 14.5 at the end of April, iOS app developers are now required to request permission to track their users beyond the app in use. In our report, we share the weekly opt-in rate as well as the percentage of users with ‘restricted’ app tracking, both in the U.S. and worldwide, following the launch of iOS 14.5.

Advertisement