Smart Appliance Spying

Smart Appliance Spying

We are so often concerned with—and building for the purposes of—online privacy, that we have been less focused on a different type of privacy invasion. Privacy in your own home is under attack.

Can we can Spam?

Can we can Spam?

This deep-dive article explores the historical context of spam, reviews mitigations on relevant platforms, challenges in the context of Status principles and architecture, current countermeasures and future proposals with their pros and cons.

Spam Mitigation Efforts

Spam Mitigation Efforts

Mitigation efforts are in place with mid-term and long term solutions being explored for a spam attack that has happened in some Status public channels. Learn more about the efforts

Stop trusting companies, start trusting code

Stop trusting companies, start trusting code

One of the principal sources of the omnipresent data collection and surveillance we see today lies in the inherently secretive and centralized development of most applications. Status delivers security and trust through open source software

Privacy vs Convenience

Privacy vs Convenience

We reflect on the topic of ‘privacy versus convenience’ and how they often seem to conflict with each other. We explore this in the context of account identifiers on Status messenger and evaluate this choice in light of the recent debate around PIN-related features of the Signal messenger.

The Case for Pseudonymity

The Case for Pseudonymity

Pseudo-anonymity enables an open society. Pseudo anonymity enables the right to privacy for one’s real self while enabling the “right to access” and reputations as social currency.