DEV Community

# privacy

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Tutorial for using Xamarin.Google.UserMessagingPlatform (GDPR) for Google AdMob (Android only)

Tutorial for using Xamarin.Google.UserMessagingPlatform (GDPR) for Google AdMob (Android only)

11
Comments
5 min read
Getting started with Tor hidden services

Getting started with Tor hidden services

10
Comments 1
5 min read
What Is a Customer Data Platform?

What Is a Customer Data Platform?

1
Comments
5 min read
What are you doing for data privacy day?

What are you doing for data privacy day?

9
Comments 12
1 min read
Exploiting IndexedDB API information leaks in Safari 15

Exploiting IndexedDB API information leaks in Safari 15

20
Comments 2
7 min read
Introducing the Offen Protocol

Introducing the Offen Protocol

3
Comments
2 min read
An Introduction To PGP

An Introduction To PGP

21
Comments 2
18 min read
5 Million Users a Day From Snowflake to Iterable

5 Million Users a Day From Snowflake to Iterable

7
Comments
6 min read
How to Migrate from Segment to RudderStack

How to Migrate from Segment to RudderStack

8
Comments
8 min read
Bring Your Home Network Anywhere For Free - Home VPN with WireGuard on Raspberry Pi + Pi-hole (Ubuntu Server 20.04 LTS)

Bring Your Home Network Anywhere For Free - Home VPN with WireGuard on Raspberry Pi + Pi-hole (Ubuntu Server 20.04 LTS)

21
Comments
5 min read
Block Ads, Tracking, and Telemetry With Pi-hole on Raspberry Pi (Ubuntu Server 20.04 LTS)

Block Ads, Tracking, and Telemetry With Pi-hole on Raspberry Pi (Ubuntu Server 20.04 LTS)

6
Comments
9 min read
Practical Security Checklist for the WFH Network

Practical Security Checklist for the WFH Network

4
Comments
3 min read
Create a peer to peer chat app with webRTC

Create a peer to peer chat app with webRTC

76
Comments 1
3 min read
Private AI: Machine Learning on Encrypted Data

Private AI: Machine Learning on Encrypted Data

4
Comments
4 min read
Privacy and confidentiality in security testing

Privacy and confidentiality in security testing

3
Comments 1
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.