Privacy-Respecting Services

How to Use Encryption Effectively on Android Phones

Android phones and tablets have come with built-in encryption support for several years. Since the Android Lollipop release in 2014 encryption has even been turned on by default. But that doesn’t necessarily mean your Android personal data is secure. There are additional steps you should take to prevent access to your data in case your […]

How to Use Encryption Effectively on Android Phones Read More »

New Tails OS 2.0 Release Updates Privacy Features

Tails OS 2.0, the latest version of the privacy-focused Linux-based operating system, is out this week. It features a new interface and many application updates, including version 5.5 of the Tor browser. Tails 2.0 is designed to provide comprehensive, out-of-the-box privacy features. It comes with built-in Tor encryption for all network connections (not just the

New Tails OS 2.0 Release Updates Privacy Features Read More »

How To Use a VPN in China

Chinese Internet censors have become more proactive in recent years about blocking VPN usage through the Great Firewall. But it’s still possible to use a VPN in China. Here are tips on how to work around VPN blocking. This isn’t an article about how to use a VPN in general. We assume you already have

How To Use a VPN in China Read More »

Private Alternatives to Adobe’s PDF Reader

By default, most people use software from Adobe to open and edit PDFs. Unfortunately, Adobe has a bad privacy policy. Here’s why you shouldn’t use Adobe apps for PDFs, along with suggestions for alternatives. Adobe’s privacy policy makes clear that the company collects a fair amount of information about users. Even if you don’t register

Private Alternatives to Adobe’s PDF Reader Read More »

Pros and Cons of Tor, VPNs, Proxies and More

Tor, VPNs, Web proxies and other strategies for circumventing censorship all come with pros and cons. Here’s a list of the advantages and disadvantages of various methods for accessing blocked websites. Tor Pros: Free of cost. Difficult for censorship authorities to block. Relatively easy to install if using the Tor browser. Cons: Usually only works

Pros and Cons of Tor, VPNs, Proxies and More Read More »

Scroll to Top