· April, 2016

Stories about Threatened Voices from April, 2016

Two-Step Verification in Egypt: Strength or Weakness for Online Security?

  7 April 2016

Independent researchers in Egypt have identified what appears to be a new technical avenue for state surveillance: manipulation of the two-step verification process. Many activists, journalists and regular citizens throughout the world use two-step verification (see below) on social media and email services in order to bring a new layer...