While an encrypted login doesn't guarantee a secure site, it's an essential starting point.
As part of the work of the Privacy Evaluation Initiative, we are publishing a list of vendors and websites that both support and require encryption on login -- that is, they enforce secure interactions ... Read more
Our follow-up survey on encrypting logins shows moderate improvements.
In early March of 2017, we ran some basic tests that measure support for encryption on 1,215 logins used by 1,121 vendors for technology used in schools and by youth. This was a follow-up from work we ... Read more
Being proactive and taking precautions now can help minimize risk. Learn some initial steps.
Yesterday, Cloudflare disclosed a fairly serious bug that had been leaking user data since September 2016. While there are no known cases of this data being exploited, people using affected sites ... Read more
Use our open-source tools to check whether or not data is encrypted in transit.
In the fall of 2016, we conducted a survey of over 1,100 tech products used in schools or by youth. We tested login locations because that's where sensitive information gets handled. A more comprehensive ... Read more
If you're attending EduCon in Philadelphia, please stop by and say hello!
Over the weekend, I'll be part of two conversations at EduCon 2017. In the first, I will be part of a group that includes Hugh Culik, Chris Gilliard, and several of their students from Macomb Community ... Read more
In 2016, the Privacy Evaluation Initiative was busy. But we are just getting started, and more is on its way.
The Privacy Evaluation Initiative is an effort led by over 100 schools and districts. The central deliverables of the work are the individual app evaluations, but the foundation of the work rests on communication ... Read more
While today is the final day of our Five Days of Privacy, the strategies we discuss in this series of posts can and should be used year-round. In describing different ways to protect our privacy and security, ... Read more
As we head into Day Four of the Five Days of Privacy, we have already covered topics that include in-person privacy protections, filter bubbles and online tracking, and strategic use of email, file storage, ... Read more
When we protect ourselves from tracking, we gain necessary tools to extend our information literacy.
In this post, and in this series, we describe steps we can take to regain an element of privacy as we browse the web and find information. The steps we define here stop many types of tracking; however, ... Read more