315

The Best VPN Service Providers Of 2019

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy. I also research actual customer feedback posted in online forums. These providers are the best VPN providers overall — these providers offer fast servers around …

Streisand Makes Installing Your Own VPN Easier

One of the easiest way to install your own VPN is to use a piece of free software called Streisand. It is a remarkable open-source project that allows you to set-up and deploy your own VPN server with the minimum possible fuss.

Ivacy: A VPN Provider Based In Singapore

Ivacy is a VPN provider founded in 2007 and based in Singapore. This provider is active on social media and readily responds to support questions (via email, live chat and a ticketing system).

1

How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

Tresorit: Cloud File Storage With End-To-End Encryption

Tresorit is a new encrypted cloud stroage provider, based in Switzerland. I’ve been testing their service for a few months, and it has performed well. Tresorit works in a familar Dropbox-type fashion. However, the difference is that Tresorit encrypts your files before they are uploaded to the cloud. This is what is called “end-to-end encryption”. It means your files are …

1

Monero: A Private & Untraceable Cryptocurrency

Created in 2014, Monero is a cryptocurrency that allows for private, untraceable payments. Monero is designed have a complete obfuscated blockchain. This means that all Monero transactions are private and not publicly accessible.

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

How to Use Encryption Effectively on Android Phones

Android phones and tablets have come with built-in encryption support for several years. Since the Android Lollipop release in 2014 encryption has even been turned on by default. But that doesn’t necessarily mean your Android personal data is secure. There are additional steps you should take to prevent access to your data in case your device is stolen. Here’s what …

South Korea Revises Law Affecting Online Censorship

South Korea’s modification of a law that regulates online content could lead to more Internet censorship in the country, critics say. Korea Times reports that the Korea Communications Standards Commission, or KCSC, has revised a law that allows people to dispute online content that may be defamatory in nature. In its previous form, the law only granted the alleged victims …

Firefox is Now Available on iOS

Firefox for iOS is now finally available in the App Store worldwide. Previously, Mozilla held back on offering an iOS version of Firefox due to Apple’s restrictive policies. Firefox for iOS allows for Private Browsing — giving you the ability to browse the web without saving history or sharing existing cookies with the sites you visit. Firefox also allows you …