Image for post
Image for post

The amount of personal information Google collects about its users can be staggering, and quite possibly, it’s more than people realize. If you have an account, you are essentially saying it’s ok for Google to spy on all your searches, read all of your emails and know your exact location at all times.

While this might be the price of “free” services today, you still have some options on what data Google collects and how long they can keep it.

Google and privacy


Image for post
Image for post

The popular definition of a hacker is someone who uses their technical abilities to gain unauthorized access to computers. In reality hackers are as diverse as people in general, having expert technical abilities does not have to make you a criminal; it can make you a hero.

Types of hackers

As with people, there are many different types of hackers with wildly different world views and motivations. The term “Hats” comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively.


Image for post
Image for post

A good password is usually the first and only line of defense for your important web-services. Choosing a strong and memorable password can be a hassle since those two criteria don’t always go hand in hand. It’s tempting to reuse an old password, slightly modifying it, or even write it down on a text-file in the computer.

In this guide, we will show you how to choose a good password, how to remember it and just how easily bad passwords can get hacked.

10 rules for good password safety:

Use long passwords

Hackers use special programs to guess passwords; the technique is called “brute force attack,”…


Image for post
Image for post

Many PC users have become accustomed to paying for antivirus software, and for a good reason, Microsoft’s antivirus offered minimal protection and the free third-party alternatives were not up to the task. Back in 2013, Microsoft Defender was so bad that antivirus testing agencies used it as the baseline for junk-lever performance.

But in the years that passed, Microsoft ramped up its efforts in endpoint security, and in 2019 Windows Defender was built-in with Windows 10. Since then, Windows Defender has been the gold standard for antivirus programs, often outperforming paid services.

How do they compare?

Two of the biggest testing houses, AV-comparatives and…


Image for post
Image for post

O n today’s internet, around 80% of all websites are tracking and selling personal data about you and your browsing habits. It’s at the very core of the modern internet; services like Google search, Gmail or social networks like Facebook or Twitter are not free; you pay with your data.

The worrisome part is how little control the end-user has over the information collected about them, the whole filed of data collection is still largely unregulated.

When your information is collected, it’s instantly sold to data brokers who then resell that data to the highest bidder. It might end up…


Image for post
Image for post

So, you are probably wondering:
“Can I help solve the COVID-19 crisis by playing a game in my underwear?”

The answer to that question is yes, yes you can!

The good people over at the University of Washington have created a new puzzle game that challenges scientists and the public to build a protein that could block the virus. The game is on the Foldit platform; a free and open-source experimental research project developed to take advantage of humans puzzle-solving intuitions.

Do you part, Human!


Image for post
Image for post

A 70-inch 4k Smart TV stacked with the latest technology for under $500, ever wonder why it’s so cheap? Most companies do not cover their costs from the sale of the TV; they cover it from the sale of the information they collect about you and your behavior.

Smart TV’s collect significant amounts of personal data about the user, and so does many of the third-party apps running on them. It’s all but impossible to know where this data ends up since it’s often sold to a third-party or even resold to a fourth.

Since Smart TV’s are constantly connected…


Image for post
Image for post

Windows 10 collects more information about the user than any previous version of Windows, and it’s impossible to turn off completely. After the initial release in 2015, Microsoft faced over two years of harsh criticism about what data it covertly collects from both the EU and private entities. After the initial backlash they overhauled the privacy settings, introduced new tools and disclosed some of the data they gathered in a blog post.

European Union data protection watchdogs warned that Microsoft didn’t go far enough to protect user data, while France has ordered Microsoft to stop tracking it’s Windows 10 users…

Bitidentify

We research and develop our own patented anti-hacking technology to safeguard our customer’s data from data breaches and theft.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store