4

The Best VPN For The UK For 2016

As you may know, British travellers and expats are blocked from connecting to services on Netflix, BBC iPlayer, 4oD, ITV on Demand and so on. These UK websites prevent visitors outside the UK from viewing British content. However, VPN services with servers in the UK allow you to bypass location-based IP blocking and access British websites securely from anywhere in …

SLOTH Attacks Weaken HTTPS Privacy

Security vulnerabilities based on the MD5 hashing function make it possible to decrypt network data or impersonate servers in order to steal private information, according to researchers from the INRIA institute in France. MD5 is a cryptographic hash function. That means it translates data into a “hash,” or jumbled piece of information. In theory, the jumbled data cannot be reverse-translated …

Does Tor over VPN Really Increase Privacy?

Some VPN providers offer Tor over VPN services, which let you use Tor and a VPN at the same time. In other cases you can simply log in to a VPN and then use the Tor browser. Do such configurations actually increase your privacy? Here are some considerations. Let’s start with the advantages of running Tor over VPN. (We’re assuming …

3

How To Get Better VPN Speeds and Performance

Using a VPN to increase your privacy or access blocked websites doesn’t have to come at the cost of a fast Internet connection. Here’s how to get the best speeds when using a VPN. It goes without saying that the best way to get good VPN speed is to pick a provider with solid service. But even with a great …

How To: Use Your Ubuntu Computer as a VPN Router

Want a VPN router but don’t have the cash to buy new hardware? Here’s an easy and free way to create a wireless VPN router for all the devices on your network using the Ubuntu Linux operating system. First, a little background on VPN routers. A VPN router is a router that is connected to a VPN service and routes …

How To: Choose a Privacy-Focused Linux OS

Using a Linux-based operating system can help you avoid many of the privacy pitfalls of Windows and Mac OS X. Here’s a guide to some of the most popular Linux distributions available, with notes on how they compare regarding ease of use and privacy. If you’ve never used Linux before, you may not understand that there is no single Linux …

A Review Of NordVPN

NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks.

VPN Traffic Can Be Decrypted through Juniper Bug

Juniper Networks, a popular provider of network firewalls, has disclosed a bug in its software that could have allowed third parties to decrypt VPN traffic. The bug, which Juniper reported on Dec. 17, involves networking hardware devices running the company’s ScreenOS. These are the type of devices used in major datacenters or by ISPs to route and control network traffic. …

1

Two Free Privacy-Focused Mobile Operating Systems

Making Android-based mobile devices more private and secure can be a challenge. Here’s a look at two custom-built versions of Android that aim to provide comprehensive out-of-the-box privacy and security, with little work on the part of the user. Privacy gaps on Android exist at several levels. There’s the operating system itself, which could have bugs that allow third parties …

How North Korea’s “Red Star OS” Implements Censorship

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is based on Fedora Linux but …

2

How To: Maximize Cloud Storage Data Privacy

Cloud storage services offer convenient and inexpensive solutions for backing up data and syncing it across multiple devices. But if you’re worried about privacy, there are steps you should take to keep your cloud data private. The best cloud storage solution depends on your needs. How much data do you have to store? How many devices need access to it? …

How To: Configure Windows 10 Privacy Settings

Privacy concerns in Windows 10 have spawned a number of apps designed to improve privacy in Microsoft’s operating system. Here’s a list of several apps you can use to help stop Windows 10 from collecting private information about you and sending it to Microsoft. You can, of course, configure privacy settings on Windows 10 manually. But the following apps aim …

Which VPN Protocol Should You Use? PPTP vs. OpenVPN vs. IPsec

All VPNs encrypt traffic, but the underlying encryption schemes are not always the same. There are three main types of encryption and data transfer protocols that VPNs can use: PPTP, OpenVPN and IPsec. Many VPN services let you choose which protocol to use. Read on for an overview of each option. PPTP PPTP is one of the oldest forms of …

VPN vs. Tor Comparison Chart

If you want to stay private online or beat Internet censorship, should you use a VPN, Tor or both? Keep reading for a comparison of VPN services and Tor. VPNs and Tor are different types of services. But their feature sets overlap in certain areas. They can both be useful for circumventing censorship and for increasing privacy. The following tables …

New 451 HTTP Code Identifies Censored Websites

Identifying sites that have been blocked due to Internet censorship has become easier thanks to a new HTTP status code, 451. Here are the details. HTTP status codes are used to classify different types of transactions between Web servers and browsers. In most cases users never see them, although some common codes — like the 404 “page not found” error …

7

How To: Make Your Android Device More Private

Here’s a simple guide to increasing privacy and security on your Android-based mobile phone or tablet. Android comes with some privacy tools built-in. However, depending on your device and its manufacturer, Android’s privacy features may not be enabled by default. Plus, there are additional tools you can install to make your device more secure and private. These actions will help …