• Skip to main content
  • Skip to header right navigation
  • Skip to after header navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Your online privacy resource center

  • Home

General

Home

News

About

Contact

Privacy Tools

  • Secure Browsers
  • Secure Email
  • Private Search Engine
  • Best VPN Services
  • Data Removal Services
  • Best Password Managers
  • Secure Messaging Apps
  • Ad Blockers
  • Identity Theft Protection

Newsletter

Coming soon.

No spam, ever.

  • Home
  • News
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Identity Theft
    • Identity Theft Protection
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Tools
    • Secure Browser
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Info
    • Mission and Site Guidelines
    • Press
    • Contact

Heinrich Long

Brightly software breach

Brightly Discloses Data Breach Impacting Almost 3 Million Clients

May 12, 2023 by Heinrich Long

Brightly Software has informed users of the SchoolDude app that hackers have gained access to its user database and stole sensitive information. …

Twitter Finally Brings End-to-End Encryption on Direct Messages

Twitter Finally Brings End-to-End Encryption on Direct Messages

May 11, 2023 by Heinrich Long

Twitter introduced a new layer of privacy and security on user communications, named Encrypted Direct Messages. This new feature is Twitter’s …

TunnelBear Adds ECH Support on Android App to Beat Censorship

TunnelBear Adds ECH Support on Android App to Beat Censorship

May 10, 2023 by Heinrich Long

The TunnelBear team has announced the support of the ECH (Encrypted Client Hello) protocol in their Android app to empower the tool’s censorship …

CyberGhost VPN for Windows Vulnerable to Command Injection

CyberGhost VPN for Windows Vulnerable to Command Injection

May 9, 2023 by Heinrich Long

The Windows client of CyberGhost VPN older than version 8.3.10.10015 is vulnerable to a flaw that could allow attackers to perform command line …

The Metropolitan Opera Admits Data Breach After Snatch Extortion

The Metropolitan Opera Admits Data Breach After Snatch Extortion

May 4, 2023 by Heinrich Long

The Metropolitan Opera (Met) has admitted that threat actors have stolen the financial and personal details of thousands of employees and visitors, …

Apple and Google Propose Specification to Stop Bluetooth Tracking

Apple and Google Propose Specification to Stop Bluetooth Tracking

May 2, 2023 by Heinrich Long

Google and Apple have jointly submitted a proposed industry specification to prevent the misuse of Bluetooth location-tracking devices for unwanted …

Google Authenticator's Cloud Sync Security Not Up to the Task

Google Authenticator’s Cloud Sync Security Not Up to the Task

April 28, 2023 by Heinrich Long

Security researchers warn users of Google Authenticator not to turn on the cloud sync feature that Google made available to Android and iOS users …

Qualcomm Denies Unlawful User Location Data Collection on Phones

Qualcomm Denies Unlawful User Location Data Collection on Phones

April 25, 2023 by Heinrich Long

Qualcomm has denied the allegations about collecting the personal data of Android phone users illegally and without acquiring user consent. The …

Trojanized Psiphon App Infects Android Phones with Ransomware

Trojanized Psiphon App Infects Android Phones with Ransomware

April 21, 2023 by Heinrich Long

A trojanized version of the Psiphon application for Android has been circulating online, stealing data from breached devices and deploying a …

Mullvad VPN Says Customer Data Is Safe Following Police Raid

Mullvad VPN Says Customer Data Is Safe Following Police Raid

April 21, 2023 by Heinrich Long

Mullvad VPN has informed its users that the Swedish Police raided its office with a search warrant, but the company told them it hosts no user data. …

Optimizations in WireGuard Achieve Record 10Gbit/sec Throughput Speed

Optimizations in WireGuard Achieve Record 10Gbit/sec Throughput Speed

April 14, 2023 by Heinrich Long

WireGuard expert Tailscale has achieved a breakthrough in the performance of WireGuard-based VPNs, resulting in significant improvements in …

Kodi data breach

Kodi Informs Forum Users of Data Breach Impacting Credentials

April 11, 2023 by Heinrich Long

Media streaming software vendor Kodi has informed its forum users that hackers using the account of an inactive administrator have exfiltrated user …

  • Previous
  • Page 1
  • Interim pages omitted …
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Interim pages omitted …
  • Page 18
  • Next

Sidebar

Follow Us:

  • X
  • Mastodon
  • Facebook

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

About

RestorePrivacy is a digital privacy advocacy group committed to helping you stay safe, secure, and private online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), or sharing this information with others. See our mission here.

  • X
  • Facebook
  • Mastodon

And for cybersecurity news, check out CyberInsider.

Digital privacy Checklist:

  1. Secure browser: Brave or Modified Firefox
  2. VPN: NordVPN (74% off coupon)
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure messaging: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden
  8. Identity theft protection: Aura
  9. Data removal service: Incogni

Copyright © 2025 Restore Privacy, LLC · Privacy Policy · Terms of Use · Contact · Sitemap · All Rights Reserved