article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. To celebrate Independence Day we want to draw your attention to five technologies that could improve life, liberty and the pursuit of happiness on the Internet. Cryptocurrencies. Onion networking.

Internet 114
article thumbnail

Interview: Joseph Steinberg, CyberSecurity Expert and Author

Joseph Steinberg

CyberSecurity Expert, Joseph Steinberg, was recently interviewed by the team at Utopia — a group of networking-technology enthusiasts seeking to provide readers with wise insights on security, privacy, and cryptocurrency — insights gained through interviews of people with considerable related experience.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Western Sanctions Undermining Russian Civilians’ Efforts To Obtain Accurate News Via VPNs?

Joseph Steinberg

VPN technologies deliver two major benefits to Russian citizens. They allow Russians to access banned sites, and they help protect users from government surveillance. Furthermore, bans on VPNs are hard to enforce – and technologically-savvy Russians have spread the word that such is the case.

VPN 218
article thumbnail

The Evolution of Darknets

Schneier on Security

This is interesting : To prevent the problems of customer binding, and losing business when darknet markets go down, merchants have begun to leave the specialized and centralized platforms and instead ventured to use widely accessible technology to build their own communications and operational back-ends.

article thumbnail

Spyware, ransomware and Nation-state hacking: Q&A from a recent interview

Security Affairs

Pegasus is probably the most popular surveillance software on the market, it has been developed by the Israeli NSO Group. Many other surveillance firms develop spyware that are every day abused in dragnet surveillance and target journalists, dissidents, and opponents of totalitarian regimes. Anyway, it is not the only one.

Spyware 91
article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.