Skip to main content

Posts

openSNP Shutters Over Privacy and Authoritarianism Concerns

OpenSNP, a long-running open-source genetic data platform, is shutting down after citing growing concerns over data privacy, the misuse of genetic information by law enforcement, and the rise of authoritarian governments. The decision comes as 23andMe, a major source of user-submitted genetic data for openSNP, faces bankruptcy and a potential selloff of user data . Founded in 2011, openSNP allowed users to upload genetic data from services like 23andMe to make it freely available for scientific research. Co-founder Bastian Greshake Tzovaras said the closure was triggered in part by the collapse of 23andMe and the broader political climate. Speaking to TechCrunch, he stated : “The risk/benefit calculus of providing free and open access to individual genetic data in 2025 is very different compared to 14 years ago.” The database has collected roughly 7,500 genomes and supported academic work across biomedical research, information security, and more. But its founder now questions the ...
Recent posts

What Does a VPN Do on an iPhone? Best App Settings (2025)

Apple’s built-in privacy features are great, but they don’t shield your iPhone from everything. Your internet provider can still track your online activity, and public WiFi networks will continue to pose serious security risks. This means your sensitive information could be exposed to hackers and snoops — right this very second. What does a VPN do on my iPhone? A VPN encrypts your internet connection and hides your real location, keeping your personal data safe from cyber threats. In fact, 69% of internet users rely on a VPN for extra security on their mobile devices 1 . My team and I tested over 40 VPNs for iPhones, analyzing their security features, speeds, and how well they integrate with iOS. ExpressVPN is my top recommendation for iPhones thanks to its Lightway protocol, which maximizes security without draining your battery. Its iOS app is user-friendly and includes the Advanced Protection feature, which blocks trackers and ads. Plus, first-timers can try ExpressVPN risk-free...

How to Turn Off a VPN on Android: Phone, Tablet, & More (2025)

A VPN is a great way to secure your internet connection and protect your personal data on Android phones and tablets. With ISPs, online trackers (users will be run into an average of 177 trackers per week 1 ), and hackers all after your data, using a good VPN on Android is incredibly important. But sometimes, you might need to turn your VPN off. Maybe it’s slowing down your connection, or certain apps and services aren’t working properly. Whatever the reason, turning off a VPN on Android is quick and easy. How can I turn off a VPN on my Android phone? You can usually do so through the VPN app or your phone’s settings. In this guide, I’ll walk you through five simple ways to disable a VPN . Let’s get started. Quick Guide: How to Turn Off a VPN on Android in 3 Easy Steps Open the VPN app. Locate and open the VPN app you’re using on your Android device. Find the disconnect option. Look for a Disconnect , Turn Off , or Power button — they are usually prominently displayed on th...

US Cracks Down on $8.2M “Romance Baiting” Scam

The United States Department of Justice has frozen $8.2 million in cryptocurrency tied to a romance baiting scam that defrauded dozens of Americans. In the scheme, scammers established a friendship or romance with the victim online. They then pushed them into making investments on counterfeit crypto platforms. The victims believed they were earning huge returns, prompting them to invest more money. But when they attempted to withdraw their money, they were met with fake charges, delays, and threats — later discovering the platforms were fraudulent. The FBI managed to trace the pilfered money . Federal wire fraud (18 U.S.C. 981(a)(1)(C)) and money laundering laws (18 U.S.C. § 981(a)(1)(A)) allowed for total seizure of assets. Tether Limited froze the USDT tokens in June 2024 and remitted them to wallets controlled by law enforcement in November. Court documents name five Ohio, California, Michigan, Utah, and North Carolina victims who collectively lost more than $1.6 million. Combine...

Hackers Access 9,000 Domestic Violence Court Documents

A leak of 9,000 sensitive New South Wales court documents may expose the details of domestic violence incidents, including some affecting children. The New South Wales Attorney-General has warned potential victims to take extra precautions in the aftermath as police and forensic experts continue to investigate the incident. According to The Sydney Morning Herald , the NSW Attorney-General Michael Daley assured the public that “When we work out exactly whose accounts were compromised, the DCJ (Department of Communities and Justice) will proactively contact those account holders and advise them of what has happened and what the next steps should be.” He also confirmed that the DoC does not yet know what the hackers have done with the data, but that “there’s 9000 files that appear somehow to have been accessed.” Daley stated that “experts have been looking through the dark web and employing other techniques ... to work out what may have happened with the data,” but that it would take “...

Thousands of AI & DeepFake Images Exposed on Nudify Service Data Breach

Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to vpnMentor about a non-password-protected database that contained just under 100k records belonging to GenNomis by AI-NOMIS — an AI company based in South Korea that provides face swapping and “Nudify” adult content as well as a marketplace where images can be bought or sold. The publicly exposed database was not password-protected or encrypted. It contained 93,485 images and .Json files with a total size of 47.8 GB. The name of the database and its internal files indicated they belonged to South Korean AI company GenNomis by AI-NOMIS. In a limited sample of the exposed records, I saw numerous pornographic images, including what appeared to be disturbing AI-generated portrayals of very young people. The database also included .Json files that logged command prompts and links to the images they generated. Although I did not see any PII or user data, this was my first look behind the scenes of an AI image generator....