Thank you, I've already joined Cointelegraph on Facebook!
Receive all Cointelegraph news immediately in Telegram.
Security experts agree that Intel computing processors, among others, have likely been compromised by the NSA, giving them the power to key log your pass phrases, and generally access your computer.
The act legalized and simplified the collecting of phone metadata for the NSA. Meanwhile Skype continues to collect data and deliver it to the Five Eyes
The Intercept, an online publication launched in February 2014 has published 48 top-secret and classified documents released by Edward Snowden about XKEYSCORE
CISA (Cybersecurity Information Sharing Act of 2015) easily passed through the U.S. Senate’s vote on Tuesday, creating a new avenue for consumer data sharing that benefits anti-privacy entities like the NSA
The U.S. House of Representatives has voted to end dragnet spying on American communications.
For updates and exclusive offers,
enter your e-mail below.
The newly patched “Venom” vulnerability in virtualization software is “perfect” for any organization targeting bitcoin wallets, private keys and forum passwords.
The controversial section 215 of the Patriot Act which has allowed mass collection of American's phone call metadata is set for reform or expiry by the first of June, does it really matter?
US House of Representatives votes to end bulk data collection by the NSA on Americans, ChangeTip comes to Soundcloud, and more news.
Republican Senator from Kentucky and presidential hopeful Rand Paul has succeeded in thwarting the renewal of the Patriot Act’s mass surveillance measures outlined in Section 215.
Fuel to the fire of financial privacy with fiat currency has been added this week: details of transactions shared between banks and the NSA being made public.
We have already reported on the American government’s exploration of cryptocurrencies — and the supposed threats they pose — back in the mid-90s.
Government and NSA could place trapdoors on millions of Diffie-Hellman-generated cryptographic keys to decrypt websites, applications, and encrypted messaging tools.
Want privacy online? Are you a Linux enthusiast? The NSA may have already classified you as an extremist.
WikiLeaks validates the identity of the Equation group. Edward Snowden suggests this leak is a warning that someone can prove US responsibility for any attacks which originated from this malware.
You registration completed successfully.
Confirmation email sent to email address provided.