Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Advanced Search
Content Type:
Advocacy
Best Before date policy brief: Device sustainability through long-term software support
Friday, October 29, 2021
Content Type:
Long Read
How one TECNO phone is putting users' privacy and security at risk
Tuesday, August 10, 2021
Content Type:
Advocacy
Joint Civil Society Declaration at the International Labour Conference 2025
Tuesday, June 3, 2025
Content Type:
Advocacy
PI statement during informal consultations on autonomous weapons systems in New York
Thursday, May 22, 2025
Content Type:
Long Read
The hidden threat: Privacy and security risks in chips
Tuesday, April 29, 2025
Content Type:
Long Read
Your future AI Assistant still needs to earn your trust
Thursday, April 10, 2025
Content Type:
Press release
PRESS RELEASE: Privacy International and Liberty complaint against Government’s ‘backdoor’ access to Apple data to be heard by Tribunal
Monday, April 7, 2025
Content Type:
News & Analysis
The US border surveillance expansion has global implications
Friday, April 4, 2025
Content Type:
Advocacy
Privacy International’s letter to the UK Home Office demanding transparency on Technical Capability Notices
Friday, March 7, 2025
Content Type:
Explainer
How the UK Government is making security harder for everyone
Saturday, February 22, 2025
Content Type:
Press release
PRESS RELEASE: United Kingdom goes after Apple’s encrypted data
Friday, February 7, 2025
Content Type:
News & Analysis
UK data regulator takes enforcement action to rein in data brokers' use of people's personal data
Tuesday, October 27, 2020
Content Type:
News & Analysis
The cost of privacy: 3 years support for high-end Samsung phones, but what about the rest?
Thursday, August 20, 2020
Content Type:
Long Read
The UK government's controversial proposal to expand surveillance powers: What you need to know
Thursday, August 10, 2023
Content Type:
Advocacy
PI response to UK Government consultation on Technical Capabilities Notices
Friday, July 28, 2023
Content Type:
Advocacy
Our position on the EU Cyber Resilience Act (CRA)
Tuesday, May 2, 2023
Content Type:
Report
Securing Privacy: PI on End-to-End Encryption
Thursday, September 15, 2022
Content Type:
Video
A letter from the Russian government: Defending encryption in Court
Thursday, April 25, 2024
Content Type:
News & Analysis
Zoom is not the worst, just getting the attention software deserves
Tuesday, April 21, 2020
Content Type:
Examples
Design flaw leaves Bluetooth devices vulnerable
Wednesday, April 1, 2020
Content Type:
Examples
Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag
Wednesday, April 1, 2020
Content Type:
Examples
Key Negotiation of Bluetooth attack
Wednesday, April 1, 2020
Content Type:
Case Study
…it protects our property
Monday, March 30, 2020
Content Type:
Examples
Pregnancy persists on the internet despite miscarriage in real life
Saturday, May 5, 2018
Content Type:
Examples
New police technologies assign individual "threat scores"
Thursday, May 3, 2018
Content Type:
Examples
Banks turn to smartphone metadata to assess lending risk
Thursday, May 3, 2018
Content Type:
Examples
The new way police are surveilling you: Calculating your threat ‘score’
Thursday, May 3, 2018
Content Type:
Examples
Governments adopt social media as tool for surveillance and propaganda
Thursday, May 3, 2018
Content Type:
Examples
MIT device uses wireless signals to identify emotions
Thursday, May 3, 2018
Content Type:
Examples
How China uses mass surveillance and big data to deal with social unrest
Wednesday, May 2, 2018
Pagination
Current page
1
Page
2
Page
3
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join