-
12 votes
-
DuckDuckGo will use Apple Maps in search results
27 votes -
Pew study: 74% of Facebook users did not know Facebook was maintaining a list of their interests/traits, 51% were uncomfortable with it, and 27% felt the list was inaccurate
21 votes -
Transparency-seeking OPEN Government Data Act signed into law
7 votes -
Amazon unveiled Key for Garage—a system that allows Amazon drivers to unlock garage doors to make secure deliveries.
15 votes -
For owners of Amazon’s Ring security cameras, strangers may have been watching too
10 votes -
(Don't) return to sender: How to protect yourself from email tracking
13 votes -
T-Mobile, Sprint, and AT&T Are Selling Customers' Real-Time Location Data, And It's Falling Into the Wrong Hands
29 votes -
How Facebook tracks you on Android
18 votes -
Hey Google! When did I ask you to access my Purchase details?
5 votes -
Roger Dingledine - Next Generation Tor Onion Services
5 votes -
Chinese schools monitor students activities, targeting truancy with 'intelligent uniforms'
Straight from the horse's mouth - China's own Global Times: Chinese schools monitor students activities, targeting truancy with 'intelligent uniforms' A different view - the Australian...
Straight from the horse's mouth - China's own Global Times: Chinese schools monitor students activities, targeting truancy with 'intelligent uniforms'
A different view - the Australian Broadcasting Commission: Chinese schools enforce 'smart uniforms' with GPS tracking system to monitor students
11 votes -
How Google tracks your personal information
7 votes -
At Blind, a security lapse revealed private complaints from Silicon Valley employees
13 votes -
Should I be using a VPN constantly?
Do you? What do you recommend?
16 votes -
Advocating for privacy in Australia
9 votes -
Amazon sends 1,700 Alexa voice recordings to a random person
17 votes -
Potential impact of two IoT security and privacy laws on tech industry
6 votes -
Internal documents show that Facebook gave Microsoft, Amazon, Spotify and others far greater access to people’s data than it has disclosed
25 votes -
Google’s secret China project “effectively ended” after internal confrontation
12 votes -
Australia passes controversial encryption-busting law
23 votes -
Facebook says new bug allowed apps access to private photos of up to 6.8m users
33 votes -
'You bunch of idiots': Australia's tech industry savages Labor for backing bill
26 votes -
Google CEO Sundar Pichai testifies before the House Judiciary Committee on Data Collection
15 votes -
Your apps know where you were last night, and they’re not keeping it secret
23 votes -
Google+ shutdown speeds up, new privacy bug affected 52.5 million users
16 votes -
Australia data encryption laws explained
8 votes -
Mark Zuckerberg's biggest problem: Internal tensions at Facebook are boiling over
12 votes -
Marriott admits hackers stole data on 500 million guests; passports and credit card info included
21 votes -
The Snowden Legacy, part one: What’s changed, really?
11 votes -
Amazon admits it exposed customer email addresses, but refuses to give details
14 votes -
“He Doesn’t Believe in It”: Mark Zuckerberg Has Never Cared About Your Privacy, and He’s Not Going to Change
23 votes -
Private by design: How we built Firefox Sync
39 votes -
DeepMind’s move to transfer health unit to Google stirs data fears
11 votes -
SpeedReader: Fast and Private Reader Mode for the Web
8 votes -
Delay, deny and deflect: How Facebook’s leaders fought through crisis
16 votes -
Personal Panopticons - A key product of ubiquitous surveillance is people who are comfortable with it
12 votes -
Using Wi-Fi to “see” behind closed doors is easier than anyone thought
12 votes -
Apple's latest anti-tracking feature in Safari takes toll on digital advertising
28 votes -
New South Wales police and crime agencies are preparing to use a new national facial recognition system
3 votes -
Google Chrome’s users take a back seat to its bottom line
16 votes -
Sailfish 3 is here!
13 votes -
Signal technology preview: sealed sender
21 votes -
Google Home (in)security
11 votes -
Ban on Chinese mobile giants for 5G 'needed to protect critical Australian infrastructure'
6 votes -
How a 19th-century teenager sparked a battle over who owns our faces
7 votes -
Facebook can't find anyone left at Cambridge Analytica
7 votes -
Tim Cook's keynote address at the 40th International Conference of Data Protection and Privacy Commissioners
8 votes -
China blocks website that revealed spyware and "re-education" camp monitoring
9 votes -
What are the best practices regarding personal files and encryption?
Over the past year I have done a lot to shore up my digital privacy and security. One of the last tasks I have to tackle is locking down the many personal files I have on my computer that have...
Over the past year I have done a lot to shore up my digital privacy and security. One of the last tasks I have to tackle is locking down the many personal files I have on my computer that have potentially compromising information in them (e.g. bank statements). Right now they are simply sitting on my hard drive, unencrypted. Theft of my device or a breach in access through the network would allow a frightening level of access to many of my records.
As such, what are my options for keeping certain files behind an encryption "shield"? Also, what are the potential tradeoffs for doing so? In researching the topic online I've read plenty of horror stories about people losing archives or whole drives due to encryption-related errors/mistakes. How can I protect against this scenario? Losing the files would be almost as bad as having them compromised!
I'm running Linux, but I'm far from tech-savvy, so I would either need a solution to be straightforward or I'd have to learn a lot to make sense of a more complicated solution. I'm willing to learn mainly because it's not an option for me to continue with my current, insecure setup. I do use a cloud-based password manager that allows for uploading of files, and I trust it enough with my passwords that I would trust it with my files, though I would like to avoid that situation if possible.
With all this in mind, what's a good solution for me to protect my personal files?
26 votes