8

Bitwarden: A Faster Alternative To Lastpass

Bitwarden is now my recommended password manager. This free, open source application is a replacement for properitary password managers like Lastpass and 1Password.

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

Proxy.sh Anonymous VPN: A Review

Proxy.sh is one of the most feature-rich VPN services. It’s also extremely BitTorrent-friendly and makes an emphatic promise not to log user data. It supports all the major operating systems for desktop and mobile. Pricing is competitive but a little confusing, so you should pay close attention to which features come with which plans. These are the major selling points …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

Best Windows 10 VPN: Our Recommendations

Which company offers the best VPN for Windows 10? What features should you look for when selecting a Windows 10 VPN? Here are our recommendations based on speed, usability, reliability and privacy testing. Why Use a VPN on Windows 10? If you just want to see our recommendations, skip to the bottom of this page. Keep reading here, though, for …

Best VPN for Android: Choosing the Right App and Provider

If you use an Android phone or tablet, you have dozens of options for VPN services and apps. With so many choices it can be tough to identify the best VPN for Android. But we’ve done that work for you. Read on for VPN recommendations for Android mobile devices. The Best VPN Apps for Android Keep reading below this section …

How To: Manage Passwords Securely

Passwords are often the only thing standing between your private data and people who would like to steal it. Creating and managing secure passwords can be difficult, but password management tools make it much simpler. Here’s how to use them to keep your data private. The best way to make sure all of your passwords are strong and secure is …

1

How To Use a VPN in China

Chinese Internet censors have become more proactive in recent years about blocking VPN usage through the Great Firewall. But it’s still possible to use a VPN in China. Here are tips on how to work around VPN blocking. This isn’t an article about how to use a VPN in general. We assume you already have VPN software configured on your …

2

Private Alternatives to Adobe’s PDF Reader

By default, most people use software from Adobe to open and edit PDFs. Unfortunately, Adobe has a bad privacy policy. Here’s why you shouldn’t use Adobe apps for PDFs, along with suggestions for alternatives. Adobe’s privacy policy makes clear that the company collects a fair amount of information about users. Even if you don’t register with Adobe, it still collects …

Windows 10 May Monitor the Apps You Use

It’s no secret that Windows 10 collects lots of data about users. But a recent blog post by the company suggests that it might be tracking more information than previously thought, including which apps you have open. There are a number of settings you can change in Windows 10 to make it more private (or you can use a privacy …

3

How To: Access Facebook from China

Visiting Facebook in China is hard because the site is blocked by government censorship. But it’s still possible to visit facebook.com while in China. Here’s how to do it on any major operating system. There are a few different ways to access Facebook from China. Each has pros and cons. These are the main methods: Use a VPN. A VPN …

SLOTH Attacks Weaken HTTPS Privacy

Security vulnerabilities based on the MD5 hashing function make it possible to decrypt network data or impersonate servers in order to steal private information, according to researchers from the INRIA institute in France. MD5 is a cryptographic hash function. That means it translates data into a “hash,” or jumbled piece of information. In theory, the jumbled data cannot be reverse-translated …