Not every cloud-based file storage solutions are made equal. Although almost each of them uses encryption to transmit and store your files, the devil is in the details.

Popular file storage services, such as Dropbox, have access to the file decryption keys. In other words, staff can and do access your files for things like detecting pirated media in your folders, or fulfiling law encforcement requests when being served with a warrant.

Continue reading...

The current legislation in Australia requires service provides to retain metadata for two years. In parallel, everything you type into the search bar on Google or Bing is retained along with your IP address and other relevant details. Therefore, your Internet browsing activity can be reconstructed and linked back to you by correlating the different datasets with each other.

To avoid these data correlation issues, you can switch to a search engine that promises not to retain any logs of your search queries. Read our latest guide for search engines that does not collect and retain anything of your search activity.

Continue reading...

Hard drive encryption protects from two things. Firstly, nobody can tamper with your computer (e.g. install backdoors) if you leave it unattended. Secondly, your files remain secure in case the laptop is stolen.

Continue reading...