The Blatantly Unethical Existence of Data Brokers

An examination of how data brokers operate without consent, creating privacy violations and physical safety risks while profiting from personal information.

June 9, 2025 · 4 min · Skyler Lemay
A laptop, book, mouse, and cellphone are wrapped up in a thick chain that is secured with a padlock.

A Beginner's Guide to Hardware Security Keys

Essential guide to hardware security keys: what they are, why you need them, and how to choose the right one.

May 27, 2025 · 13 min · Skyler Lemay