Privacy Talks | Interview with Hanna from Tutanota

This interview first aired on October 9, 2020 Timestamp Links & Questions: [0:40] – Why was Tutanota founded and what does it do? [1:24] – Where did the name “Tutanota” come from? [1:59] – Just how insecure is the average email that is not being sent through Tutanota? [2:52] – Speaking of encryption, we’ve noticed … Continue reading “Privacy Talks | Interview with Hanna from Tutanota”

0

  • Jul 28, 2018
  • Glyn Moody
  • Cybersecurity, General Privacy News,

Why Gmail’s new “confidential mode” is not so great for privacy, and potentially awful for the open Web

Gmail is used by well over a billion people worldwide, making it one of the most important online services. Google has recently started rolling out a new design that includes novel features. One of the most interesting of these is the so-called “confidential mode”. At first sight, that sounds like good news for privacy: “With … Continue reading “Why Gmail’s new “confidential mode” is not so great for privacy, and potentially awful for the open Web”

0

  • Jun 16, 2018
  • rasengan
  • General Privacy News,

DEAD – An attack vector on web services, due to e-mail’s faults due to DNS

Domain Emails Are Dead (DEAD) A security reminder that e-mail and DNS should never be a critical component of a secure system architecture. PROBLEM DEAD is a potential vulnerability in the DNS system that exists due to the poor method in which it was implemented in totality. DNS, which is largely controlled by ICANN, is … Continue reading “DEAD – An attack vector on web services, due to e-mail’s faults due to DNS”

0

  • Aug 29, 2017
  • Glyn Moody
  • Cybersecurity, General Privacy News,

Is this the key to foiling phishing attacks? Spoiler alert: probably

As readers of this blog know, VPNs are a great way to protect your privacy and security. But they address only some of the online threats we all face every day. Another important class of problems are caused by attacks that lead to accounts being taken over, identities being appropriated, data theft and financial losses. … Continue reading “Is this the key to foiling phishing attacks? Spoiler alert: probably”

2