Our 15 Favorite Privacy-Themed FilmsEthan F Grant, CEO
Spy Phone: Hands On With The Punkt MP-02

At first glance, the latest "dumb" phone from Punkt Tronics AG is an attractive option for consumers seeking privacy and simplicity in the smartphone era. But beneath the adorable polycarbonate casing and backlit keys lies a privacy nightmare.

The Institution Of Privacy Isn't Going Anywhere

Privacy is no more vulnerable than the production or consumption of goods. It is an idea which has survived global war, economic depression, and erosion by governments and corporations.

Unpacking The Carpenter v. United States Decision

The Supreme Court found that law enforcement and US government agencies must obtain a warrant before requesting an individual's cell-site location information (CSLI). But there are caveats.

We Cannot Ignore Children In Cages

As a country, we have kidnapped children from their parents and imprisoned them. Our tax dollars pay our government to carry out these actions, our corporations directly contribute, and we are all culpable.

Put A Fork In Caddy; It's Done

Caddy was supposed to be great: a modern web server configured for TLS and HTTP2 out of the box. But its only developer announced it will soon collect telemetry from its users by default.

Now Is The Perfect Time For An RSS Renaissance

As privacy and security breaches make headlines, we clamor for a decentralized internet. RSS doesn't offer perfect privacy, but it's one step back and two steps forward in the right direction.

Switzerland's "NSA" Comes Online In Two Weeks

Wide-sweeping laws will affect internet access, email, and "other telecommunications services", including messaging services, social networking communications, cloud platforms, and proxy services.

This Apple Core Is Rotten

What was once the champion of user experience is now a corporation led by sales and marketing executives making unilateral and arbitrary decisions. I'm calling it. Apple is dead.

Border Patrol's Warrantless Searches Inside U.S.

Under a new directive, Customs and Border Protection (CBP) agents have broad, unchecked authority to search, seize, and share electronic devices and data within 100 miles of United States borders.

Without AES Over Port 443, VPN Is Compromised

VPN services are a vital tool for protecting free speech. Following the death of net neutrality, their business model is more vulnerable than ever. If they don't adapt to protect themselves from ISPs, they'll become obsolete.

Why We Left MassTLC (And You Should Too)

The Massachusetts Technology Leadership Council has a laudable mission, but the "most powerful technology association in the region" appears more concerned with political maneuvering than with innovation.

KGB Continues to Target U.S. Journalists

Traditional approaches are failing to protect journalists against an evolving digital threat from state-sponsored hacking groups. With Russia under the microscope, the potential fallout is greater than ever.

Net Neutrality Is Going To Die Next Week

The Federal Communications Commission is a pawn in the hands of corrupt officials and a telecommunications oligopoly, and next week's vote will curtail freedom of speech online and usher in an era of information asymmetry.

The Corrupted State Of Shared Hosting

From media consolidation and shady fine print to decades-old security risks, shared hosting companies are raking in massive profits while leaving consumers holding a virtual stick of dynamite.


This document is designed to help you understand how I think and work, and to accelerate our working relationship. This is a living document; it will change over time.