Mouse Movements Could Identify Tor Users’ Real IP Address

The latest threat to Tor, the online anonymity tool, is simple but serious: Mouse movements may be used to identify users online. Tor is designed to hide your identity on the Internet by making it impossible for websites, or people eavesdropping on network traffic, to determine your true IP address. It does a pretty good job of that by routing …

3

How to Secure Wireless Routers for Data Privacy

A poorly secured home wireless network is one of the easiest ways for an attacker to steal private data. Here are tips for understanding how to keep your wifi secure and private, including which wifi encryption methods are best. If you think that simply enabling security features on your wireless router means people can’t steal your personal information, think again. …

1

Five Privacy Challenges Posed by the Internet of Things (IoT)

The Internet of Things (IoT) is poised to make life more convenient in many ways. For the privacy-conscious, however, IoT devices also present all manner of new challenges. Here’s an overview of the five main ways in which IoT adoption will create new privacy threats. For now, IoT devices have yet to see massive adoption. Some Internet-connected appliances and sensor …

1

IronSocket VPN Review: Features, Price and Performance

IronSocket VPN in a Nutshell IronSocket VPN is a good compromise between a small VPN company that offers great customer service and a big one with a large network. The company’s performance is solid, the price is very fair for what you get and — most notably — the privacy policy is excellent. IronSocket VPN also includes a DNS proxy …

4

The Best Web Browsers for Privacy and Security

Which Web browser should you use if you are concerned about privacy? From Tor Browser to commercial offerings like Comodo Dragon to a DIY approach, there are lots of options to choose from. Keep reading for an overview and tips on finding the best browser for privacy and security. There is no one-size-fits all solution for private Web browsing. Instead, …

2

How To: Choose a Usenet Provider

If you’re trying to find the best Usenet provider, you should understand some basics about the differences between different Usenet providers, and what makes one more private or secure than another. Keep reading for a quick overview of Usenet features. For a longer guide to Usenet providers, see our article “Best Usenet Provider of 2016.” But here’s the short version …

FBI Used U.S. University to Attack Tor Privacy

The U.S. government and Carnegie Mellon University have collaborated to undermine Tor privacy technology. That’s according to a court document that became public a few days ago. As Motherboard first reported, information surfaced back in November that a university had provided information to the FBI that enabled it to identify specific Tor users. At first, however, the name of the …

How To: Secure Your Smart Thermostat for Added Privacy

Smart thermostats — the kind that connect to your home’s wireless network so that they can be controlled over the Internet — are increasingly popular. But their rapid rate of adoption has far outpaced discussion of the security and privacy risks they pose. Here’s an overview of these privacy challenges, and tips for addressing them. The biggest privacy threat from …

1

How to Increase Privacy on iPhones

These days, iPhones offer many more privacy features out-of-the-box than they used to. But that doesn’t mean there’s nothing you can do to make Apple iOS more secure and private than it already is. Here are additional steps you can take to increase iPhone privacy. Disable browser cookies. Turn off cookies in the Safari browser. This may be inconvenient, but …

How To: Set Up a Tails Virtual Machine for Private Browsing

If you want the privacy advantages of using a secure Linux-based OS like Tails but don’t want to use Linux all the time, an easy (and free) solution is to run Tails inside a virtual machine. Here’s how. These instructions should work for pretty much any Linux-based OS. But we have written them for Tails, since that is one of …

How to Get Around the Netflix VPN Ban

Netflix has begun aggressively increasing its efforts to ban users of VPNs and other proxies from accessing its content. But there are still some strategies that will allow you to get around this ban. Here are some potential solutions. First, a little background. In January, Netflix started making it much harder for people who use VPNs to connect to its …

Amazon Disables Data Encryption in Fire OS Tablets

If you thought Apple’s battle against government encryption backdoors would lead to more privacy and security on mobile devices, think again. Amazon has just announced plans to make its Fire HDX tablets less private by ceasing to support full device data encryption. Fire OS, Amazon’s operating system for Fire tablets, used to support full device encryption. Following recent updates to …

Hotspot Shield VPN Review: How Good is this Free VPN?

In a Nutshell Hotspot Shield VPN is one of the most popular free VPN services. That alone is a big selling point for many users. The company also offers a low-priced paid service called Hotspot Shield Elite. Both versions of Hotspot Shield VPN — free and paid — lack many of the features available from other providers. Still, they provide …

How Does ICLOAK Plug-and-Play Privacy Work?

ICLOAK recently launched its plug-and-play online privacy solution, which is based on a custom Linux distribution that boots from a USB stick. We contacted the company to get a better sense of how exactly its privacy features work, including Tor integration, VPN availability and more. This is what ICLOAK founder Eric Delisle said in response to questions about the product’s …

Two Ways to Make Anonymous Phone Calls

Want to make a phone call without revealing your real identity? There are several ways you can do this, ranging from using a throw-away phone to restricting caller ID settings permanently on your smartphone. But what if you just want to make private, anonymous calls occasionally, without purchasing a special phone for it? Here are two solutions. Use a Caller …

Tor Darkweb Servers Could Leak Private Data through Apache

A configuration issue on some darkweb Web servers can reveal the true IP address of a website even if it is set up to use Tor to hide its identity. That’s according to reports that began circulating a few days ago. The issue is not new. It has been known for a long time among experienced website administrators. But it …

How To: Use Email Privately without Being Tracked

Virtually everyone needs an email account. Yet keeping emails private and secure is challenging because, by design, email identifies the sender. You also can’t protect emails from tracking with privacy tools like Tor or VPN. But that doesn’t mean there aren’t things you can do to protect your email privacy. Here are our tips for secure email: If possible, use …

How to Use Encryption Effectively on Android Phones

Android phones and tablets have come with built-in encryption support for several years. Since the Android Lollipop release in 2014 encryption has even been turned on by default. But that doesn’t necessarily mean your Android personal data is secure. There are additional steps you should take to prevent access to your data in case your device is stolen. Here’s what …