Skip to content
CognitiveMetropolis
  • AI
  • Data
  • IOT
  • OS
  • Security
    • Privacy
  • Store
    • Shop Now
    • About Us
    • Contact
    • Shipping and Returns
    • Privacy Policy
  • Account
  • 0
0 Menu Close
  • AI
  • Data
  • IOT
  • OS
  • Security
    • Privacy
  • Store
    • Shop Now
    • About Us
    • Contact
    • Shipping and Returns
    • Privacy Policy
  • Account
  • 0

Operations Security

  1. Home>
  2. Operations Security
Many iOS Encryption Measures ‘Unused,’ Say Cryptographers

Many iOS Encryption Measures ‘Unused,’ Say Cryptographers

  • Post author:Cognitive Metropolis
  • Post category:Data/OS/Security

iOS does not utilize built-in encryption measures as much as it could do, allowing for potentially unnecessary security vulnerabilities, according to cryptographers at Johns Hopkins University (via Wired). Using publicly…

Continue Reading Many iOS Encryption Measures ‘Unused,’ Say Cryptographers
Three Interactive Tools for Understanding Police Surveillance

Three Interactive Tools for Understanding Police Surveillance

  • Post author:Cognitive Metropolis
  • Post category:Privacy

As law enforcement and government surveillance technology continues to become more and more advanced, it has also become harder for everyday people to avoid. Law enforcement agencies all over the…

Continue Reading Three Interactive Tools for Understanding Police Surveillance
TutaNota under prolonged DDoS Attack

TutaNota under prolonged DDoS Attack

  • Post author:Cognitive Metropolis
  • Post category:News

We like TutaNota at CognitiveMetropolis and think they are worthy of your support. We think this is true not only because they are open source but because unlike other similar…

Continue Reading TutaNota under prolonged DDoS Attack
Homeland Security details new tools for extracting device data at US borders

Homeland Security details new tools for extracting device data at US borders

  • Post author:Cognitive Metropolis
  • Post category:News

Travelers heading into the US have many reasons to be cautious about their devices, and a July report from the Department of Homeland Security gives even more concern on how…

Continue Reading Homeland Security details new tools for extracting device data at US borders
How to Use a Raspberry Pi as a Proxy Server with Privoxy

How to Use a Raspberry Pi as a Proxy Server with Privoxy

  • Post author:Cognitive Metropolis
  • Post category:IOT/Security

A web proxy server sits between the computers on your network and the internet. The proxy server intercepts HTTP and HTTPS traffic, acting as a border control officer. It checks…

Continue Reading How to Use a Raspberry Pi as a Proxy Server with Privoxy
How to Host a Deep Web IRC Server for More Anonymous Chatting

How to Host a Deep Web IRC Server for More Anonymous Chatting

  • Post author:Cognitive Metropolis
  • Post category:Privacy

Internet Relay Chat, or IRC, is one of the most popular chat protocols on the internet. The technology can be connected to the Tor network to create an anonymous and…

Continue Reading How to Host a Deep Web IRC Server for More Anonymous Chatting
Here’s a Map of the Surveillance Tech Police Are Using to Track You

Here’s a Map of the Surveillance Tech Police Are Using to Track You

  • Post author:Cognitive Metropolis
  • Post category:Privacy

An abundance of reporting has confirmed that you’re not paranoid, Minority Report was nonfiction, and face paint isn’t just an art project. We hear about how law enforcement can match…

Continue Reading Here’s a Map of the Surveillance Tech Police Are Using to Track You
Apple’s new security program puts special iPhone hardware into researchers’ hands

Apple’s new security program puts special iPhone hardware into researchers’ hands

  • Post author:Cognitive Metropolis
  • Post category:Uncategorized

Apple unveiled a new kind of iPhone on Wednesday, but it's not one that just anybody can get ahold of. The new batch of modified iPhones are tweaked specifically for…

Continue Reading Apple’s new security program puts special iPhone hardware into researchers’ hands
Home router warning: They’re riddled with known flaws and run ancient, unpatched Linux

Home router warning: They’re riddled with known flaws and run ancient, unpatched Linux

  • Post author:Cognitive Metropolis
  • Post category:IOT/Security

Germany's Fraunhofer Institute for Communication (FKIE) has carried out a study involving 127 home routers from seven brands to check for the presence of known security vulnerabilities in the latest…

Continue Reading Home router warning: They’re riddled with known flaws and run ancient, unpatched Linux
How to encrypt compressed files the easy way from Windows, macOS, or Linux

How to encrypt compressed files the easy way from Windows, macOS, or Linux

  • Post author:Cognitive Metropolis
  • Post category:Security

When considering how to share data efficiently, cloud storage has a leg up on hardware by making it easy to share files and folders with users across the globe with…

Continue Reading How to encrypt compressed files the easy way from Windows, macOS, or Linux
Older Posts →

Product Showcase

AMENDMENT1-Buy Now

Internet WiFi Privacy Router | How it Works | User Guide | Testimonials

Recent Posts

  • Firefox 85 Cracks Down on Supercookies
  • Tech Companies Are Profiling Us From Before Birth
  • Face Surveillance and the Capitol Attack
  • Many iOS Encryption Measures ‘Unused,’ Say Cryptographers
  • This Android malware claims to give hackers full control of your smartphone
  • Privacy
  • Contact
  • About Us
Copyright - OceanWP Theme by Nick
×
×

Cart