16 Feb 2019
overcoming the fear-induced habit of querying for your stolen personal information.
19 Jan 2019
privacy considerations when evaluating vendor facial recognition offerings.
9 Jan 2019
how your regularly updated photos & videos are used to train government and commercial facial recognition systems over time.
add information about a photographer into their own photos, as they are taken.
share details about a photograph that was taken with anyone else who has the photograph
analyze photos that you find on social media, photo sharing sites, e-mail, SMS messages, to reveal pictures of the original photographer
decentralized storage immunizes your protected files against theft and reverse engineering, when your baggage is unattended, you're snoozing in an airport or on a plane, or you lose your storage media.
provides highly effective protection for your sensitive documents, such as finance and tax documents, data files, photos, movies, e-mail archives, and many other types of data files
the best file protection uses your existing, trusted storage habits, instead of forcing you to use the cloud.