327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

The Best Seedboxes With VPNs 2020

A seedbox is a dedicated, high-speed server for downloading and uploading files. Most people rent seedboxes to achieve very fast torrent or Usenet transfers.

360

The Best VPN For China In 2020

In China, VPNs have been blocked at the protocol level (including corporate VPNs). However, the VPN providers listed in this article use stealth techniques to hide their VPN traffic.

Ivacy: A VPN Provider Based In Singapore

Ivacy is a VPN provider founded in 2007 and based in Singapore. This provider is active on social media and readily responds to support questions (via email, live chat and a ticketing system).

Tresorit: Cloud File Storage With End-To-End Encryption

Tresorit is a new encrypted cloud stroage provider, based in Switzerland. I’ve been testing their service for a few months, and it has performed well. Tresorit works in a familar Dropbox-type fashion. However, the difference is that Tresorit encrypts your files before they are uploaded to the cloud. This is what is called “end-to-end encryption”. It means your files are …

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

UsenetBucket Now Accepts WebMoney, Alipay, UnionPay & Dotpay

UsenetBucket is a Usenet provider from Netherlands that is sourced from XSNews (an independent Usenet feed). The service has integrated 70 new payment methods — to better support international customers. You can use these payment methods by selecting “Other local payment methods” during the order process. You’ll be redirected to the payment page and the local payment methods for you …

Two Ways to Make Anonymous Phone Calls

Want to make a phone call without revealing your real identity? There are several ways you can do this, ranging from using a throw-away phone to restricting caller ID settings permanently on your smartphone. But what if you just want to make private, anonymous calls occasionally, without purchasing a special phone for it? Here are two solutions. Use a Caller …

How To Opt Out Of Unwanted Catalogs and Other Mailers

If you receive any kind of postal mail, you will have noticed that unwanted catalogs, coupons, credit card offers and other junk mail arrives daily. Most of this mail comes from companies that bought your information from data brokers. Unfortunately you have to track down these companies if you want to get off their lists. Thankfully, there are a couple …

Whonix: An Operating System Where IP & DNS Leaks Are Impossible

Whonix is an operating system focused on anonymity and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. In Whonix, DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP. Whonix consists of two virtual machines on a separate, isolated virtual network. One virtual machine (VM) is …

7

The Fake Name Generator: Create A Name, Address, Telephone Number & Email Address

The Fake Name Generator is tool that instantly creates a set of fake credentials, for dealing with companies that request unnecessary personal information. The Generator will create a completely fictitious identity that includes a fake name, telephone number, email address, street address and credit card number. All of the information generated will match correctly — for example the telephone number will …

5

The 3 Minute Guide To Online Privacy

I want to browse websites anonymously. Use the anonymous Tor web browser — it’s free and available for Linux, Mac, Windows, Android and iOS.