Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Russia appears to have used Austin’s network as infrastructure to stage additional cyberattacks. → Read More
The Intercept’s security director shows how to safeguard a secondary Android phone for an anti-police protest. → Read More
The Trump DOJ is exploiting animosity toward Assange to launch a thinly disguised effort to criminalize core functions of investigative journalism. → Read More
The danger of China compromising hardware supply chains is very real, judging from classified intelligence documents, even if a Bloomberg story on the matter is highly disputed. → Read More
A security researcher discovered private data lurking on 60 Trello boards belonging to the United Nations. Sensitive information was also found in public Google documents. → Read More
The indictment contains a surprising amount of technical information about alleged Russian cyberattacks during the 2016 elections — by far the most detailed and plausible picture yet of what exactly occurred, → Read More
Video obtained by The Intercept shows police officers pointing their guns as they searched Chelsea Manning's empty apartment. → Read More
Turning off remote content loading is supposed to mitigate against an attack known as EFAIL, which can steal encrypted messages. But the attack can still happen even if you do this. → Read More
I spent two years trying to get someone to tamper with my laptop, so I could then detect it. Somewhere along the way, I realized this might never happen. → Read More
The documents, from an internal NSA newsletter, also reveal problems recruiting Arabic speakers to the spy agency and evidence of election fraud in Egypt. → Read More
"Haven" guards against so-called "evil maid" attacks, in which your boot software is surreptitiously modified to defeat encryption. → Read More
A trick called "phishing" was used to snare emails from the Hillary Clinton campaign and other Democrats. Here's how to protect yourself. → Read More
Last week, engineers at Freedom of the Press Foundation discovered a three-year-old vulnerability in the whistleblower submission system. → Read More
A step-by-step guide to protecting your private phone number while enjoying the security of encrypted texting app Signal. → Read More
Campaigns to spy on internet cafes and tap Iraqi communications, as well as an intimate NSA examination of Czech spying, are detailed in NSA newsletters. → Read More
The spy agency didn’t care about copyright violations; it was trying to determine if it could find valuable intelligence. → Read More
Leaked chat logs reveal a campaign to dig up personal information on "antifa" and other leftist activists. → Read More
A comprehensive video and text guide to ensuring that your private conversations are actually private. → Read More
The latest batch of SIDtoday articles published by The Intercept covers the second half of 2004 and the beginning of 2005. → Read More
Watch this video for tips on how to prepare your phone before you go to a protest and on how to safely communicate with your friends. → Read More