· April, 2016

Stories about Privacy from April, 2016

Two-Step Verification in Egypt: Strength or Weakness for Online Security?

  7 April 2016

Independent researchers in Egypt have identified what appears to be a new technical avenue for state surveillance: manipulation of the two-step verification process. Many activists, journalists and regular citizens throughout the world use two-step verification (see below) on social media and email services in order to bring a new layer...

About our Privacy coverage

Stories about laws/policies/practices (by governments or companies) that affect the universal right to privacy in any way, negative or positive. Some of these stories may overlap with the surveillance category, but others will not.