(Protection from the Meltdown vulnerability does not require BIOS or processor updates.) This system's Intel processor provides high-performance protection from the Meltdown vulnerability. A properly updated operating system will be able to provide protection without significant system slowdown...
According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identifies Tor...
If you're on Android, I've written all about Tinfoil for Facebook, an app that wraps the mobile version of Facebook's website for maximum privacy. It lets youuse Facebook on Android without all the permissions, and even allows you to send messages without Messenger. Check out the artic...
Lock-Keeper is also implemented based on this ”Physical Separation” idea. It works as a sluice (“an artificial channel for a flow of water that is controlled by a valve or gate”) to guarantee that hackers and malign data have no opportunities to break into the internal network by any ...