#VPNs help people to stay private and safe online. However, the Government, wants to force us to verify our age when we buy a VPN effectively deterring many people from using them.
Sign the petition to protect #VPN use in the UK https://action.openrightsgroup.org/tell-government-protect-vpn-use-uk #security #OnlineSecurity

Tell the Government: Protect VPN use in the UK
Take action! Protect VPN use in the UK VPNs help people to stay private and safe online. Young people use them to avoid harassment, or protect location data. Companies use them to make sure remote log-in to their networks are secure. Journalists, campaigners and whistle blowers use them to protect their work and themselves. But the Government wants to force people to verify their age when they buy a VPN. This will deter people from using VPNs to stay safe and secure online. Why are the government proposing restrictions to accessing VPNs?
Open Rights Group
The women of the phreaking era - Negative PID
Long before the internet existed, hackers explored a different kind of network, the global phone system. These early explorers, known as phreakers, learned
Negative PID
Autism, Asperger traits, and hacking - Negative PID
The hacking world has always attracted people with a strong interest in systems, logic, and digital problem solving. Several well known figures, such as Gary
Negative PID
Neurodiversity in cybersecurity work - Negative PID
Cybersecurity relies on a wide range of cognitive skills. Threat hunting, OSINT investigation, incident response, red team operations, and policy design all
Negative PID
Breaking into offensive security - Negative PID
Offensive security roles attract people who enjoy thinking creatively, solving puzzles, and understanding systems from the inside out. Whether you want to
Negative PID
Steganography, the art of digital hiding - Negative PID
Have you ever thought that the digital files you usually handle might carry more than they were intended to? It might be a picture you share on social media,
Negative PID
A beginner’s guide to Blockchain - Negative PID
Everybody talks about Bitcoin and Blockchain. In recent years, they have become a common topic in tech, finance, cybersecurity, and even politics. But what do
Negative PID
How to become a bug bounty hunter - Negative PID
Many people entering the cybersecurity field believe that the only way to demonstrate their skills to a prospective employer is to hack into their systems.
Negative PID
An Introduction to ZTA - Negative PID
Once upon a time, the network perimeter was considered a solid defence against external threats. However, the evolution of attack vectors over the last twenty
Negative PID
What is cybercrime? - Negative PID
Every day, you hear about cybercrime. More and more, it is presented as a problem to society: hacking, fraud, obscene behaviour, hate speech, fake news,
Negative PID