Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Advanced Search
Content Type:
News & Analysis
Privacy and the Body: Privacy International’s response to the U.S. Supreme Court’s attack on reproductive rights
Friday, July 22, 2022
Content Type:
Video
Talking to People about Privacy
Friday, June 10, 2022
Content Type:
Video
Teaching about Data 5: Creating educational resources
Thursday, May 26, 2022
Content Type:
Video
Teaching about Data 4: How to find online critical data literacy resources
Thursday, May 26, 2022
Content Type:
Video
Teaching about Data 3: What is a ‘good’ educational resource about data?
Thursday, May 26, 2022
Content Type:
Video
Teaching about Data 2: Good practices for teaching about data
Thursday, May 26, 2022
Content Type:
Video
Teaching about Data 1: People's knowledge gap
Thursday, May 26, 2022
Content Type:
Video
Teaching about Data: Why we created this resource
Thursday, May 26, 2022
Content Type:
Report
Briefing: Controlling the UK's Private Intelligence Industry
Thursday, May 5, 2022
Content Type:
Explainer
Covid-19: a tech post-mortem
Thursday, March 31, 2022
Content Type:
Explainer
Electronic monitoring using GPS tags: a tech primer
Wednesday, February 9, 2022
Content Type:
Long Read
How Privacy and Data Protection Law Can Help Defend Migrants' Rights
Thursday, February 3, 2022
Content Type:
Explainer
Free to Protest (Palestine edition)
Wednesday, April 27, 2022
Content Type:
Video
Video: How to use the Data Interception Environment
Friday, December 17, 2021
Content Type:
Long Read
Digital National ID systems: Ways, shapes and forms
Tuesday, October 26, 2021
Content Type:
Explainer
An introduction to software updates (and why they matter)
Friday, October 29, 2021
Content Type:
News & Analysis
Taming Pegasus: A Way Forward on Surveillance Tech Proliferation
Tuesday, July 27, 2021
Content Type:
News & Analysis
Space: The Final Frontier of Europe’s Migrant Surveillance
Monday, July 26, 2021
Content Type:
Examples
IBM claims its i2 software can identify terrorists
Friday, December 1, 2017
Content Type:
Examples
Secret Uber "Greyball" programme undermines regulators
Friday, December 1, 2017
Content Type:
Examples
Hong Kong computes images from DNA samples to publicly shame litterbugs
Friday, December 1, 2017
Content Type:
Examples
Uber breaks Apple's iPhone rules
Friday, December 1, 2017
Content Type:
Explainer
What Is Privacy?
Monday, October 23, 2017
Content Type:
Explainer
Social Media Intelligence
Monday, October 23, 2017
Content Type:
Long Read
Enter the Fediverse
Tuesday, May 13, 2025
Content Type:
Long Read
Your future AI Assistant still needs to earn your trust
Thursday, April 10, 2025
Content Type:
Long Read
CrowdStrike: What the 2024 outage reveals about security
Tuesday, December 17, 2024
Content Type:
Long Read
Privacy and autonomy: Redefining boundaries for Indigenous communities
Monday, December 16, 2024
Content Type:
Examples
Facial recognition fails at forensic reliability
Sunday, December 3, 2017
Content Type:
Examples
Personalised online ads enables invisible - and illegal - discrimination
Sunday, December 3, 2017
Pagination
Current page
1
Page
2
Page
3
Page
4
Page
5
Page
6
Page
7
Page
8
Page
9
…
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join