Top Stories encryption
- Wickr: The Covert App Used By Politicians For Secret Discussions
- The NSA Has The Master Key To Unlock Your Phone's Secure Messages
- Tor Is Still Safe
- How Heartbleed Works: The Code Behind The Internet's Security Nightmare
- Why You Can't Blame Bitcoin For Silk Road Shadiness
- Three Steps You Can Take To Protect Yourself From Online Spying
Gizmodo's Weekly Australian Internet Update
This week in internet.
Free Games Friday
Free games for a lazy weekend.
Netflix Movie Night
Ockers, ozploitation, the outback and other authentic Australiana.
Get all the trailers you need in one place!
Galaxy Trucker on Android, Geometry Wars 3 on iOS and more.
Periscope on Android, Battle of Gods: Ascension on iOS and more.
Plucky Rush on Android, Korg iM1 on iOS and more.
All The News You Missed Overnight
Google's 2015 Nexus devices, Sony Z3+ and more.
Wednesday's Biggest Stories
Music Maniac on Android, Orby Widget on iOS and more.
Most of the time we discuss encryption as a way to protect ourselves online, but an increasingly popular form of digital attack uses it as an extortion tool. Criminals are stealing personal files, encrypting them, and hold them hostage until their targets pay for the decryption key.
New details have emerged about exactly how Hillary Clinton secured the homebrew private email servers she used as Secretary of State. The punchline? Clinton didn’t encrypt her emails or use a certificate for her first three months running the State Department.