In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known … Leaked NSA Malware Is Helping Hijack Computers Around the WorldRead more
Technology
The Surveillance Industry Is Killing Democracy
India is rapidly digitising. There are good things and bad, speed-bumps on the way and caveats to be mindful of. The weekly column Terminal focuses … The Surveillance Industry Is Killing DemocracyRead more
Fake progress
http://techrights.org/videos/digital-vegan-series.webm Roy Schestowitz – source techrights.org
Neo-Luddism
I’m a Luddite. This is not a hesitant confession, but a proud proclamation. I’m also a social scientist who studies how new technologies affect politics, … Neo-LuddismRead more
On Copyright Scams, Surveillance Capitalism and the Lies of Big Tech
In their new book, Chokepoint Capitalism: How Big Tech and Big Content Captured Creative Labor Markets and How We’ll Win Them Back (Beacon, 2022), Rebecca … On Copyright Scams, Surveillance Capitalism and the Lies of Big TechRead more
How Big Tech rewrote the nation’s first cell phone repair law
New York state took a historic step toward curbing the power of Big Tech when lawmakers passed the Digital Fair Repair Act, giving citizens the … How Big Tech rewrote the nation’s first cell phone repair lawRead more
Tor Browser 12.0 Released
Tor Browser 12.0 is now available from the Tor Browser download page and also from our distribution directory. This new release updates Tor Browser to … Tor Browser 12.0 ReleasedRead more
Abolish Silicon Valley
Wendy Liu Abolish Silicon Valley: How to Liberate Technology from Capitalism
The Techno-Feudal Method
Elon Musk had good reasons to feel unfulfilled enough to buy Twitter for $44 billion. He had pioneered online payments, upended the car industry, revolutionized … The Techno-Feudal MethodRead more
This Bluetooth Attack Can Steal a Tesla Model X in Minutes
Tesla has always prided itself on its so-called over-the-air updates, pushing out new code automatically to fix bugs and add features. But one security researcher … This Bluetooth Attack Can Steal a Tesla Model X in MinutesRead more