Under California’s data privacy law, consumers can ask companies for data that has been collected about them. However, this Duo Labs research reveals how the complex web of data sharing and partnerships makes it very difficult for consumers to know who has their data, let alone what is being collected.
Apple’s T2 chip on the new Macs perform a wide array of tasks to secure the machine from various hardware- and software-based attacks. The fact that the T2 chip can do so much is also potentially its weakness, as it opens up the machine’s attack surface.
Personal VPNs have a lot of expectations, and they aren't suited for all of them. But there are some scenarios that are ideal for personal VPNs.
The main point of using a personal VPN is to surf the interwebs in privacy, away from prying eyes. Lock down the browser before starting up the personal VPN for maximum benefits.
People expect the personal VPN to hide or otherwise obscure what they are doing on the Internet. Some are better than others, but it is difficult to evaluate them on technical merits. Duo Labs provides guidelines on how to pick a personal VPN that matches your threat model.