Donate
You can donate by clicking here
We need your help
Category: Cyber Security
Pennsylvania Rabbit Hole Part III
What does the law say about Voter Registration data? And why is Pennsylvania ignoring it?
Pennsylvania Rabbit Hole Part II
Hacking Voter Registration Databases—it’s easier than you think!
Pennsylvania Rabbit Hole Part I
Everyone should know what Voter Registration Files do. Why they are so critical. Why we are so worried.
Trump Sub-Domains Part III
Part III: We dig further into the 250+ Trump Organization sub-domains communicating with Russia to see if it’s possible to attribute them to Shadowgate.
The Trump Organization Sub-domains. Hacked? Compromised? Or Complicit?
Part II: Is it possible that the Trump sub-domains communicating with Russia were a result of a domain registry hack by a third party? Or, is something else going on?
Over 250 Trump Organization Sub-domains are in Communication with Computers in Russia
Part I: Our team did a traceroute on some oddly named Trump sub-domains. What we found was shocking.
Fake Social Media Accounts, Real World Impact
With fake social media accounts at the heart of the cyber-war against us, why haven’t we stopped them?
How Social Media Breeds Hate
Here’s how just one person can run dozens of fake, extremist accounts on many social media platforms.
Americans Should Be Alarmed by the UK Report on Cambridge Analytica and Big Data
Th UK Information Commission’s “Investigation into the use of data analytics in political campaigns” leaves us many clues about how U.S. citizen data was likely used and abused.
The Mystery of Twitter’s Free Pass
Mysteriously, Twitter has avoided much of the scrutiny Facebook has faced—even though Twitter has committed similar data-privacy abuses.
Donate
Your generosity is everything.
Please consider donating to help us do our work.