Snowden Archive
A Look at the Inner Workings of NSA's XKEYSCORE
Documents provided by NSA whistleblower Edward Snowden shed light on the inner workings of XKEYSCORE, one of the most extensive programs of mass surveillance in human history.
Snowden Archive
Documents provided by NSA whistleblower Edward Snowden shed light on the inner workings of XKEYSCORE, one of the most extensive programs of mass surveillance in human history.
Snowden Archive
One of the NSA's most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse.
Computer security experts worry that BitLocker may be compromised by the government. Microsoft addressed some of those concerns for <em>The Intercept</em> — and left some unanswered.
If you want to encrypt your hard disk, you should know the basics of what disk encryption protects, what it doesn't protect, and how to avoid common mistakes.
The new setup helps assure leakers they are connecting with the authentic <em>Intercept</em> SecureDrop and not an impostor.
Now that it's known NSA and GCHQ stole encryption keys for millions of phones, Signal offers a secure way to call and text — one that's easier to understand than many alternatives.
What <em>not</em> to do, what to worry about, and how to contact us without leaving a digital trail back to your real-world identity. Because PGP alone is not enough.
Snowden Archive
Britain and Canada spied on the location, apps, and device identifiers of smartphone users by piggybacking on ad and analytics software.
This is not a paywall.
By signing up, I agree to receive emails from The Intercept and to the Privacy Policy and Terms of Use.