Latest Posts


US Intelligence Agencies Gain Access to NSA Data

One of Obama’s last Executive Orders leaves data susceptible to retention by US Intelligence Agencies.


Avoid Phishy Activity Online

New phishing techniques target Gmail users. Here's how to spot them before you become a victim.

email privacy act

Help Us Take Private Browsing to the Next Level - Become a Beta Tester

Private browsing mode isn't as private as it should be. We think we can make it better but we need your help. Join Tenta's opt-in beta program on Google Play and help us test our latest privacy features, such as Device Wide VPN and Tenta Secure DNS.

email privacy act

Update to Communications Law from 1986 Reintroduced to the House

Under current law (which was passed in 1986), the government can access your cloud storage without a warrant. Scary — but a bill named the Email Privacy Act recently reintroduced in the House is trying to change that.

signal encrypted messaging app

Egypt Blocks Encrypted Messaging App, Signal

Following a trend of increased internet censorship in the Middle East, the Egyptian government blocked the secure messaging app Signal at the end of last year.

protect your smartphone

8 Best Ways to Protect Your Smartphone

Take a second to think about just how important — and personal — the data on your phone is. Now ask yourself, Am I protecting it properly? If you’re even a little bit unsure, follow these eight tips for protecting your smartphone.

built in VPN

Protect Your Entire Device with Tenta's Device Wide Built In VPN

We've expanded Tenta Browser's built in VPN to provide even more protection. Opt-in beta testers can now use Device Wide VPN and Per Zone VPN free for a limited time.

private browsing

Websites Know More About You Than You Think

You might know that websites are tracking the sites you're using, but did you know they're also tracking your exact location? That's just the start, though, because the websites you're visiting know much more about you than you think.


How to Protect Yourself from Ransomware

The concept of holding someone for ransom is a familiar part of our cultural lexicon at this point. We've all seen the movies - someone gets kidnapped, the kidnappers call with a demand, the hero raises to rescue the victim before it's too late. But these days, a more realistic storyline would be not about holding a person for ransom but instead about holding someone's data for ransom. It's called ransomware, and here's how to protect yourself from it.

Privacy news and Tenta updates delivered weekly to your inbox.