1

How To Use a VPN in China

Chinese Internet censors have become more proactive in recent years about blocking VPN usage through the Great Firewall. But it’s still possible to use a VPN in China. Here are tips on how to work around VPN blocking. This isn’t an article about how to use a VPN in general. We assume you already have VPN software configured on your …

A Review of the Best VPNs for Gaming

Using a VPN while playing games online is one of the best ways to prevent DDoS attacks and other disruptions. But with so many VPN companies out there, what are the best VPNs for gaming? Here’s a guide. Why Use a VPN for Gaming? If you use a VPN to circumvent censorship or provide privacy, it may not be obvious …

2

Private Alternatives to Adobe’s PDF Reader

By default, most people use software from Adobe to open and edit PDFs. Unfortunately, Adobe has a bad privacy policy. Here’s why you shouldn’t use Adobe apps for PDFs, along with suggestions for alternatives. Adobe’s privacy policy makes clear that the company collects a fair amount of information about users. Even if you don’t register with Adobe, it still collects …

Windows 10 May Monitor the Apps You Use

It’s no secret that Windows 10 collects lots of data about users. But a recent blog post by the company suggests that it might be tracking more information than previously thought, including which apps you have open. There are a number of settings you can change in Windows 10 to make it more private (or you can use a privacy …

Pros and Cons of Tor, VPNs, Proxies and More

Tor, VPNs, Web proxies and other strategies for circumventing censorship all come with pros and cons. Here’s a list of the advantages and disadvantages of various methods for accessing blocked websites. Tor Pros: Free of cost. Difficult for censorship authorities to block. Relatively easy to install if using the Tor browser. Cons: Usually only works for Web browser, not other …

3

How To: Access Facebook from China

Visiting Facebook in China is hard because the site is blocked by government censorship. But it’s still possible to visit facebook.com while in China. Here’s how to do it on any major operating system. There are a few different ways to access Facebook from China. Each has pros and cons. These are the main methods: Use a VPN. A VPN …

1

PrivaTegrity Promises Better, Faster Online Privacy than Tor

What if there were an online privacy solution that was much faster than Tor and, unlike VPNs, allowed no single third party to read encrypted information? That’s what David Chaum, an Internet security and privacy veteran, aims to implement through a new type of mixed network called PrivaTegrity. PrivaTegrity is designed to work somewhat like Tor in that it would …

3

How To: Protect Your Privacy on Usenet

When you access Usenet, you probably don’t want your true identity to be revealed. Nor do you want your ISP or another party to be able to monitor what you upload and download. Here are tips for using Usenet privately. Connect with SSL encryption. SSL is the best way to protect your activity from snooping because it encrypts all of …

Netflix Everywhere: What It Means for VPN Users

Now that Netflix is available in almost every country worldwide, there is one less reason for many people to use a VPN — or is there? More generally, what does “Netflix everywhere” mean for VPN services? Thanks to the Netflix everywhere initiative, which the company announced last week, Netflix streaming content will now be available in almost all countries around …

4

The Best VPN For The UK For 2016

As you may know, British travellers and expats are blocked from connecting to services on Netflix, BBC iPlayer, 4oD, ITV on Demand and so on. These UK websites prevent visitors outside the UK from viewing British content. However, VPN services with servers in the UK allow you to bypass location-based IP blocking and access British websites securely from anywhere in …

SLOTH Attacks Weaken HTTPS Privacy

Security vulnerabilities based on the MD5 hashing function make it possible to decrypt network data or impersonate servers in order to steal private information, according to researchers from the INRIA institute in France. MD5 is a cryptographic hash function. That means it translates data into a “hash,” or jumbled piece of information. In theory, the jumbled data cannot be reverse-translated …

Does Tor over VPN Really Increase Privacy?

Some VPN providers offer Tor over VPN services, which let you use Tor and a VPN at the same time. In other cases you can simply log in to a VPN and then use the Tor browser. Do such configurations actually increase your privacy? Here are some considerations. Let’s start with the advantages of running Tor over VPN. (We’re assuming …

3

How To Get Better VPN Speeds and Performance

Using a VPN to increase your privacy or access blocked websites doesn’t have to come at the cost of a fast Internet connection. Here’s how to get the best speeds when using a VPN. It goes without saying that the best way to get good VPN speed is to pick a provider with solid service. But even with a great …

How To: Use Your Ubuntu Computer as a VPN Router

Want a VPN router but don’t have the cash to buy new hardware? Here’s an easy and free way to create a wireless VPN router for all the devices on your network using the Ubuntu Linux operating system. First, a little background on VPN routers. A VPN router is a router that is connected to a VPN service and routes …

How To: Choose a Privacy-Focused Linux OS

Using a Linux-based operating system can help you avoid many of the privacy pitfalls of Windows and Mac OS X. Here’s a guide to some of the most popular Linux distributions available, with notes on how they compare regarding ease of use and privacy. If you’ve never used Linux before, you may not understand that there is no single Linux …

A Review Of NordVPN

NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks.

VPN Traffic Can Be Decrypted through Juniper Bug

Juniper Networks, a popular provider of network firewalls, has disclosed a bug in its software that could have allowed third parties to decrypt VPN traffic. The bug, which Juniper reported on Dec. 17, involves networking hardware devices running the company’s ScreenOS. These are the type of devices used in major datacenters or by ISPs to route and control network traffic. …

Two Free Privacy-Focused Mobile Operating Systems

Making Android-based mobile devices more private and secure can be a challenge. Here’s a look at two custom-built versions of Android that aim to provide comprehensive out-of-the-box privacy and security, with little work on the part of the user. Privacy gaps on Android exist at several levels. There’s the operating system itself, which could have bugs that allow third parties …