Sai Ashish Konchadatheinsightfulcoder.hashnode.net·Feb 10, 2021Top 10 Extensions You Must Use For Your PrivacyWhile privacy has become a myth due to the advent of technology, there are a few easy ways to protect your identity. One of these ways is to install extensions directly into your web browser. In this article, we are going to explore the top 10 exten...106 likes·2.0K readsTechGoogle Chrome
Anish De12020.hashnode.net·Feb 17, 2022Privacy friendly website analytics with Umami and NextJSWebsite analytics is truly a very important thing. We can understand our audience well and can tailor our content to our audience for higher engagement. Google Analytics had always been the go-to solution as it is popular, easy to set up, and gives a...94 likes·2.0K readsNext.js
Phani Karankaizoku.hashnode.net·Dec 12, 2020FeaturedDouble Blind Passwords (aka Horcruxing)Before we get into Horcruxing, here's a quick prologue on online security hygiene. You can skip to the Horcruxing section if it seems redundant. Rules for Strong Online Security 1. Longer passwords (atleast 16 characters) are better than shorter on...91 likes·79.6K readsSecurity
OhekaforNo Trust Verify blogcgibin-1680678911277.hashnode.net·Apr 15, 2023Using Electrum through Nym's mixnetNymConnect is an interface allowing in one click to connect to the mixnet of Nym. The goal of NymConnect is to improve the privacy of the applications you already use by protecting your traffic from an observer and even from the application itself. I...46 readsNym Connectnym
Smaranjit Ghosesmaranjitghose.hashnode.net·Apr 14, 2023Mullvad Browser - A first glance🛣️Introduction Mullvad Browser is a multi-platform, free-to-use, an open-source web browser designed to prevent tracking and fingerprinting on the internet. At its core, it is a "hardened Firefox" that comes bundles with uBlock Origin and a Mullvad ...Privacy and Passionprivacy
Swaleha Parvinswaleha.hashnode.net·Apr 11, 2023Ethics of Data Collection and Privacy in the Digital Age: A Developer's PerspectiveIn the digital age, data collection and privacy have become hot-button issues. As technology continues to advance, companies and governments are collecting more personal data than ever before. As developers, we have a responsibility to consider the e...2Articles1Week
Kristof Riebbelskriebbels.hashnode.net·Apr 9, 2023An Egg-citing Approach to Email PrivacyPreviously on... In the previous blog post in this series, I discuss the evolution of email identities. I state the history of using creative and unique nicknames in the early days of the internet to the increasing need for real names to establish cr...39 readsPrivacyemail
Reaminatedreaminated-1680439082603.hashnode.net·Apr 8, 2023Are your PDFs Actually Redacted? Double Check!Introduction PDF is a very common file format for documents but one thing people may not realise is that the complexity the format provides can mean some things aren't quite as they seem. Specifically, I've seen numerous "redacted" documents where th...59 readsSecurity
OhekaforNo Trust Verify blogcgibin-1680678911277.hashnode.net·Apr 7, 2023Start your Nostr relay on NymTo understand the will to have Nostr relays working on the mixnet, please read the article Nostr x Nym which details our motivations. The fact of having a Nostr relay that works through the mixnet will allow to protect the users as for example that t...43 readsNostr x Nymprivacy
Kristof Riebbelskriebbels.hashnode.net·Apr 2, 2023The Importance of Unique Emails: Enhancing Your SecurityPreviously on... As mentioned in the initial article of this series, I've grown increasingly frustrated with phishing emails and fraudulent text messages. My objective is to regain control of my data, and writing these blog posts serves as a commitme...31 readsPrivacyprivacy
youssof antaryusof-antar.hashnode.net·Mar 29, 2023How to Prevent Screenshots in iOS and Android using Flutter2Introduction In today's world, the protection of sensitive information is a critical aspect of any application. One of the concerns that arise is the ability of users to take screenshots of the application's content, which may compromise sensitive da...Flutter
Moses Samanthakurthijadenmaxi.hashnode.net·Mar 27, 2023Protecting Your Online Privacy: A Guide to Installing Tails OSIn an age where data privacy and security are of utmost importance, Tails OS (The Amnesic Incognito Live System) provides a solution for those who want to protect their online activity. Tails is a privacy-focused operating system that is designed to ...tails
SkylerforTimefulhealthyteen.hashnode.net·Mar 26, 2023Annoying Password Rules Actually Make Us Less SecureIt is almost impossible to avoid passwords. Whether logging into social media or accessing bank statements, everyone relies heavily on passwords to keep their information secure. However, in recent years, the password requirements set by various webs...27 readsIn-Depth Analysespasswords