We all want a future where our families, friends, and communities can thrive — one rooted in justice, democracy, with social and political stability. But instead of heading toward that future, we’re ...
Today we learned the UK has issued a new secret order forcing Apple to undermine iCloud’s advanced encryption again, but this ...
First published in 2017, PI’s Guide to International Law and Surveillance is an attempt to collate relevant excerpts from these judgments and reports into a single principled guide that will be ...
Freedom of Information (FOI) requests have revealed the rapidly increasing scale of UK police mass facial recognition searches against the passport and immigration databases. The Government has ...
Yesterday the Investigatory Powers Tribunal announced next steps in Apple’s and PI’s challenges to the purported UK order undermining iCloud’s security. The Tribunal declared that it will aim to hear ...
Flo, headquartered in London, UK, is one of the most popular period-tracking apps on the market with over 380 million downloads. Flo also launched in 2022 an open-source 'Anonymous Mode' version of ...
The security of our devices, applications and infrastructure is paramount to the safe functioning of our digital lives. Good security enables trust in our systems, it is fundamental to protecting the ...
On 13 March 2025, we filed a complaint against the UK government challenging their use of dangerous, disproportionate and intrusive surveillance powers to undermine the privacy and security of people ...
Educational spaces are increasingly being subjected to intrusive monitoring, and the education technologies (EdTech) being deployed is being used as a form of surveillance that undermines students’ ...
Private companies, including Big Tech, are responsible for a large number of digital health tools. While there may be benefits to health, there are also potential threats to your privacy from these ...
PI's analysis of the Council of Europe's Guidelines on processing of personal data for voter registration and authentication, which complement a previous set of recommendations outlining the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results