Open in app

Sign In

Write

Sign In

Cloaked Community
Cloaked Community

83 Followers

Home

About

Sep 29, 2022

Privacy-Friendly Social Media Alternatives

Whether it be Facebook, Twitter, Instagram or TikTok, almost everyone has either experienced or come across the effects of misinformation, privacy violations, and online harassment. In a research study published in the journal Nature Human Behavior, researchers analyzed 30.8 million Twitter messages from 13,905 Twitter accounts to test how feasible…

Privacy

4 min read

Privacy-Friendly Social Media Alternatives
Privacy-Friendly Social Media Alternatives
Privacy

4 min read


Aug 12, 2022

Safeguarding Your Personal Information

In 2021, more than 5-billion people were impacted by a reported 1,243 data breaches. Take a moment to really think about that. Between 1,243 sources, the data of 5-billion people was exposed. …

Data Privacy

5 min read

Safeguarding Your Personal Information
Safeguarding Your Personal Information
Data Privacy

5 min read


Jun 14, 2022

State modeling with algebraic data types

By Nathaniel Cox I recently had the task of implementing a one-time-password input view. We’ve all seen this before; You want to verify your identity, so some website or app sends you a six-digit code via text message or email. You then go to your inbox, copy the code, paste…

Programming

10 min read

State modeling with algebraic data types
State modeling with algebraic data types
Programming

10 min read


Jun 10, 2022

How to Remove Your Data from the Internet

More than 5.2 billion people are online, and we’re generating an unfathomable amount of data every day. Once collected, the data funnels into the data exchange, where it’s handled by data brokers (among others) and distributed for wider use. …

Big Data

4 min read

How to Remove Your Data from the Internet
How to Remove Your Data from the Internet
Big Data

4 min read


Jun 1, 2022

Testing Kotlin Flows on Coroutines 1.6

Get expert tech advice straight from our team of developers and engineers. Recently, I’ve had to refresh some of my knowledge as well after updating to Coroutines 1.6 and switching to the new test APIs, i.e. using runTest instead of runBlockingTestand all that comes along with that. …

Developer Tools

5 min read

Testing Kotlin Flows on Coroutines 1.6
Testing Kotlin Flows on Coroutines 1.6
Developer Tools

5 min read


May 23, 2022

Your Data — Their Profit: How Your Online Data is Being Used

Fun Fact: In 1663, John Graunt ran one of the first substantial data collection projects in an effort to track the behavior of the black plague. In doing so, he founded the first public health records and established a global place for statistical analysis. Sure, data was around long before…

Privacy

7 min read

Your Data — Their Profit: How Your Online Data is Being Used
Your Data — Their Profit: How Your Online Data is Being Used
Privacy

7 min read


Apr 15, 2022

Is it just Spam, or Something Worse?

Learn how to check your emails for malware or phishing attempts with the experts at cloaked… We’ve talked about data breaches, and how to fortify your passwords, but there’s another topic that’s hitting pretty close to home — email attacks. Ninety-six percent of malware attacks are delivered via email, which…

Malware

5 min read

Is it just Spam, or Something Worse?
Is it just Spam, or Something Worse?
Malware

5 min read


Apr 8, 2022

Data Breaches: Privacy in the Digital Age

Get the latest in privacy tips and news with Cloaked’s team of tech experts, engineers, and security professionals. Once upon a time, in the digital stone-age, we were content to navigate our “state of the art” DOS systems without considering the implications of a possible data breach. In fact, data…

Privacy

5 min read

Data Breaches: Privacy in the Digital Age
Data Breaches: Privacy in the Digital Age
Privacy

5 min read


Mar 18, 2022

The Problem with Password Managers

Get the latest in privacy tips and news with Cloaked’s team of tech experts, engineers, and security professionals. In 1961, the first computer passwords were created by Fernando Corbato to moderate the use of MIT computer systems. By 1962, a researcher by the name of Allen Scheer, fed up with…

Password Management

5 min read

The Problem with Password Managers
The Problem with Password Managers
Password Management

5 min read


Oct 5, 2021

Malvertising Poses Threat to the U.S. Intelligence Community

In a recent letter to Federal Chief Information Officer Clare Martorana, Senator Ron Wyden voiced his concern over the current state of privacy amongst federal offices, saying: “I write to urge the Office of Management and Budget (OMB) to protect federal networks from foreign spies and criminals who misuse online…

Digital Privacy

3 min read

Malvertising Poses Threat to the U.S. Intelligence Community
Malvertising Poses Threat to the U.S. Intelligence Community
Digital Privacy

3 min read

Cloaked Community

Cloaked Community

83 Followers

Join our Discord: https://cloaked.community

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech