Privacy at the Border: A Technical Guide to Securing Your Data and Devices

How deceptive design is used to compromise your privacy and how to fight back