DEV Community

# privacy

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Proxychains - All the what's and how's.

Proxychains - All the what's and how's.

11
Comments
4 min read
As ameaças à criptografia ponta-a-ponta (end-to-end encryption)

As ameaças à criptografia ponta-a-ponta (end-to-end encryption)

2
Comments
3 min read
The Best Ways of Staying GDPR Compliant

The Best Ways of Staying GDPR Compliant

2
Comments
4 min read
How To Use Requests With Tor

How To Use Requests With Tor

2
Comments
1 min read
Como seria a sua vida se a internet fosse feita de sites do http://governo?

Como seria a sua vida se a internet fosse feita de sites do http://governo?

12
Comments 1
6 min read
Why should you care about Privacy?

Why should you care about Privacy?

3
Comments
4 min read
Skipping the Chrome "Your connection is not private" warning

Skipping the Chrome "Your connection is not private" warning

19
Comments
2 min read
Use your Yubikey to its Fullest

Use your Yubikey to its Fullest

27
Comments 4
9 min read
OpenHAB Home Automation

OpenHAB Home Automation

4
Comments 2
5 min read
One year on from our kick-off, milestone 3 is completed.

One year on from our kick-off, milestone 3 is completed.

3
Comments 1
2 min read
A Password is not Enough to Secure your Account. Use that as Well 🔐

A Password is not Enough to Secure your Account. Use that as Well 🔐

18
Comments
11 min read
Shopping cart state saved in database or cookie for guests?

Shopping cart state saved in database or cookie for guests?

23
Comments 8
1 min read
How to enable DNS-over-TLS on Ubuntu using CoreDNS

How to enable DNS-over-TLS on Ubuntu using CoreDNS

18
Comments
5 min read
6 Web Application Vulnerabilities and How to Prevent Them

6 Web Application Vulnerabilities and How to Prevent Them

35
Comments
5 min read
hCaptcha instead of Google's reCaptcha

hCaptcha instead of Google's reCaptcha

9
Comments
2 min read
🔥 FireUp CLI: Upload anything, right from your command-line

🔥 FireUp CLI: Upload anything, right from your command-line

6
Comments 2
1 min read
User Authentication, In 2020

User Authentication, In 2020

100
Comments 12
4 min read
What To Do With VPN? 20 Ways To Use Your VPN

What To Do With VPN? 20 Ways To Use Your VPN

10
Comments 4
7 min read
Try fair web analytics

Try fair web analytics

27
Comments 3
1 min read
Keybase overview 🔐

Keybase overview 🔐

6
Comments
3 min read
A fair and ethical alternative to established web analytics tools is missing. Therefore we develop one.

A fair and ethical alternative to established web analytics tools is missing. Therefore we develop one.

31
Comments 1
1 min read
Finally I migrated from Chrome to Edge

Finally I migrated from Chrome to Edge

11
Comments 14
2 min read
Top 10 WordPress Security Hacks To Keep Your Website Safe

Top 10 WordPress Security Hacks To Keep Your Website Safe

16
Comments
7 min read
What is your email platform ?

What is your email platform ?

12
Comments 12
1 min read
Consentman: a lightweight manager for complying with user consent

Consentman: a lightweight manager for complying with user consent

14
Comments
3 min read
Cloud Providers Considered Harmful Part 1

Cloud Providers Considered Harmful Part 1

5
Comments
4 min read
Homomorphic Encryption - for Web Apps 🤔

Homomorphic Encryption - for Web Apps 🤔

11
Comments 1
7 min read
Protect your website users' privacy in a few simple steps

Protect your website users' privacy in a few simple steps

7
Comments
3 min read
Protect Your Contact Information From Crawlers

Protect Your Contact Information From Crawlers

61
Comments 17
3 min read
Web Tracking IS GOOD

Web Tracking IS GOOD

12
Comments 10
3 min read
Data privacy and protection in healthcare

Data privacy and protection in healthcare

7
Comments 2
1 min read
Security of Wireless Devices

Security of Wireless Devices

4
Comments 1
6 min read
Quit Google Analytics, Self-hosted Gatsby Statistics with Ackee

Quit Google Analytics, Self-hosted Gatsby Statistics with Ackee

42
Comments 6
5 min read
How do you maintain your security and privacy?

How do you maintain your security and privacy?

8
Comments
2 min read
SkyHole: Privacy In A Digital Age

SkyHole: Privacy In A Digital Age

9
Comments
5 min read
What Is Tor and Should We Use It?

What Is Tor and Should We Use It?

17
Comments 9
4 min read
Cloud Providers are a danger to Individual Autonomy

Cloud Providers are a danger to Individual Autonomy

5
Comments
3 min read
Should Tech Companies Use the Universal Declaration of Human Rights as a Guide for their Privacy and Content Policies?

Should Tech Companies Use the Universal Declaration of Human Rights as a Guide for their Privacy and Content Policies?

6
Comments 1
1 min read
lock-your-pc.com: A page made for people that do not lock their PC's

lock-your-pc.com: A page made for people that do not lock their PC's

32
Comments 1
1 min read
How to run Matomo in a Docker container while passing database credentials as environment variables

How to run Matomo in a Docker container while passing database credentials as environment variables

4
Comments 1
4 min read
The Identity Platform For The People

The Identity Platform For The People

5
Comments
2 min read
Atlas VPN launched!

Atlas VPN launched!

13
Comments 7
1 min read
Increasing the privacy of Firefox and Ubuntu

Increasing the privacy of Firefox and Ubuntu

6
Comments
1 min read
Unified Meta Tag for GDPR/Privacy - Discussion about the future of web privacy

Unified Meta Tag for GDPR/Privacy - Discussion about the future of web privacy

3
Comments
1 min read
Spend too much time on social media? Try RSS.

Spend too much time on social media? Try RSS.

12
Comments 9
3 min read
Choosing a Safe and Memorable Password

Choosing a Safe and Memorable Password

9
Comments
8 min read
PGP Subkeys for Keybase

PGP Subkeys for Keybase

3
Comments
3 min read
10+ places to earn crypto as a writer

10+ places to earn crypto as a writer

36
Comments 17
4 min read
Holidays 2019 - Episode 4.5

Holidays 2019 - Episode 4.5

3
Comments
2 min read
Privacy and Security News from October 2019 - Episode 4

Privacy and Security News from October 2019 - Episode 4

5
Comments
9 min read
I Have Nothing to Hide Fallacy

I Have Nothing to Hide Fallacy

10
Comments
9 min read
How to reclaim your privacy on the internet

How to reclaim your privacy on the internet

9
Comments
9 min read
Services Should Help Us Remember

Services Should Help Us Remember

7
Comments
2 min read
VPN ? ah.. What?

VPN ? ah.. What?

6
Comments 1
3 min read
I'm a nobody; why would anyone want to hack me?

I'm a nobody; why would anyone want to hack me?

48
Comments 2
8 min read
Just launched our first product called FelloWage 🎉

Just launched our first product called FelloWage 🎉

37
Comments 8
1 min read
We should have an email for each website

We should have an email for each website

11
Comments 13
2 min read
Password Managers are Safer and More Convenient for You

Password Managers are Safer and More Convenient for You

12
Comments 3
14 min read
Several People Are Spying

Several People Are Spying

5
Comments 1
3 min read
5 AWS Technologies That’ll Make Your Life Easier

5 AWS Technologies That’ll Make Your Life Easier

83
Comments
5 min read
loading...