Infographic: The Path of Data on the Internet
Data has to travel some distance through the internet to be useful for companies. This infographic shows the different steps and shows example of where data comes from and what it can be used for.
Data has to travel some distance through the internet to be useful for companies. This infographic shows the different steps and shows example of where data comes from and what it can be used for.
We deal with our privacy as if we were exchanging goods. We have no problem sharing private information if in return we get convenience, attention or money in some sort. Our privacy acts as a second currency we naturally have. The difference between a currency in the form of money and privacy is that you […]
Sudo is an app which let you create fake identities. You can use these identities anywhere in the online world if you don’t want to reveal your true identity. SudoPay lets you create credit cards that are not made out in your name. Both Sudo and SudoPay were created by the company “Anonyome Labs”. Currently, […]
The Tor browser is considered by many as the best choice for privacy protection. But what is the Tor browser? How do I get it and how does it protect my privacy. This is what I will answer in this post. The Tor browser is an open source browser, developed by the non-profit organization […]
As its name suggests this is the SnowHaze blog. Since I’m one of SnowHaze’s creators I’m not unbiased when writing an article about SnowHaze. 😉However, I wouldn’t have helped to build SnowHaze if something alike had already existed before. So I have to stress that I’m also truly convinced that SnowHaze is — for the […]
You have plenty to hide – (and yes, even if you’re not into any criminal activities!) Personal data trading has become a huge business in recent years. There are a lot of companies that collect data and sell it. The most famous ones are of course Google and Facebook, but there are many more. […]