The Pros and Cons of Using Tor for Online Privacy

Tor lets you browse the Internet anonymously. But to use it effectively, you should understand what it does and what it doesn’t do. Here’s a concise summary of things to know about Tor. As an online privacy solution, Tor offers lots of advantages. These include: It’s free. It’s relatively easy to set up and use. For most people, downloading and …

How To: Use HTTPS Everywhere for Browser Privacy

HTTPS Everywhere is a browser extension that automatically encrypts Web traffic with SSL protection whenever it is available. Here’s how to use it, and what you should know about its limitations. About HTTPS Everywhere Under the HTTPS protocol, data is encrypted so that people monitoring your network connection cannot read what you send or receive through the browser. HTTPS is …

How To: Check That Your VPN is Working

How do you make sure your VPN is actually running — and not leaking data — after you log in? Here are quick and simple steps for checking. Most people probably assume that their VPN “just works” once they launch it. But in certain cases, it may not be. Just because the client program that your VPN provider gives you …

5

The Best Blocklists To Use When Torrenting

Block list for torrents are actually quite difficult to find. Luckily, John Tyree, a user from quora.com, created a GitHub project which combines all those iBlocklist lists in to a single one and he hosted the result here: http://john.bitsurge.net/public/biglist.p2p.gz The Details A blocklist is simply a list of IP addresses to block when torrenting. Typically, these lists consist of the IP addresses of …

6

A Guide To Being Private Online

The services below will increase your security and reduce your surveillance by governments and advertisers. Here are my tips for maintaining on-line privacy: Use A Search Engine That Doesn’t Track You Many popular search engines like Google and Bing save your search history. Typically, your searches are saved along with some information about your computer (e.g. your IP address, User …

2

The Site With The Largest E-Book Index

This site — Library Genesis — contains the largest index of e-books I’ve come across. It includes many out-of-print books, textbooks, magazines and comics. It’s actually kind of amazing. I have no idea who built it, but it is hosted in Ecuador. If you find yourself making use of this index, please use responsibly. I support purchasing media directly from …

The “Read-Only” Culture That Is Being Cultivated Is A Huge Mistake

Various media corporations have twisted copyright laws into malevolent beasts that actively thwart their original purpose. The laws are ruining the creativity they were originally intended to foster. They criminalize acts that have been prevalent in human culture for thousands of years. The public is being hoodwinked into a set of ideas that only benefit the largest and most greedy …

7

How To Ensure Your DNS Isn’t Leaking While Using A VPN

Here are some tips for using VPNs more effectively: Perform A DNS Leak Test DNS is the “domain name service” that is required to use internet. It translates a domain name (e.g. “Amazon.Com”) into a IP address (e.g. “72.21.211.176”). When using a VPN, do a DNS leak test to make sure that you are not revealing your ISP name servers (your ISP …

How To Remove Advertising From Your Online Life

Here’s my formula for removing advertising from your life online: Step 1: Use The Right Browser And Plugins Block advertising on your browser: Use Firefox with these plugins: uBlock Origin and Disconnect. These plugins make web browsing tolerable. Step 2: Use The Usenet Find your all your media on the Usenet. Step 3: Search With Advertising For a search engine, …

7

The Fake Name Generator: Create A Name, Address, Telephone Number & Email Address

The Fake Name Generator is tool that instantly creates a set of fake credentials, for dealing with companies that request unnecessary personal information. The Generator will create a completely fictitious identity that includes a fake name, telephone number, email address, street address and credit card number. All of the information generated will match correctly — for example the telephone number will …

2

How To Share Files Privately Using BitTorrent and Usenet

In this article, I’ll summarize how to share files privately, without being spied upon. I’ll cover two file sharing networks — Bittorrent and the Usenet. The Usenet tends to have faster downloads, until you get a good download/upload ratio on Bittorrent (if you don’t know what the Usenet is, please see this article). Using BitTorrent To Share Files Privately Download …

Linux Distributions Built For Anonymity

If you are serious about using the internet privately, you should probably be using an anonymous operating system. Listed below are privacy and security enhanced Linux distributions that can allow anonymous web surfing, encryption and advanced security measures. Most of them use the Tor network for anonymous internet connections.

4

How to Avoid NSA Surveillance

Now that the news of PRISM, the electronic surveillance program run by the United States National Security Agency (NSA), has leaked, many people are interested in avoiding the surveillance. At GreyCoder, we show how you can easily transition to secure services that are encrypted and make it more difficult for eavesdroppers to monitor your activities. Here is a quick run-down …

Top 5 Ways To Make Your Online Accounts More Secure

Here are some tips for making your online accounts more secure: Use A Password Manager To Generate Unique Passwords If you use the same password for all your online accounts, you are making it simple for hackers to own all your accounts. Create a unique, 14 character password for each online account you use. The best way to do this …

11

How To Delete Your Personal Info From The Internet

Today, there are numerous databases and search engines being filled with our personal data, and it’s now common for people to look up this information online. Here are some tips for getting your personal information deleted from the internet and other databases:

28

How to Buy Things Anonymously Using A Credit Card

In A Nutshell The paid service Blur allows you to create disposable credit cards (U.S. only) Entropay allows you to create virtual credit cards — I have not tested this service This anonymous credit card is issued from a European bank: AnonDebitCard Using Bitcoins is another good option — however be aware that Bitcoin transactions are only quasi-anonymous. Blur: Create …