2

How To: Maximize Cloud Storage Data Privacy

Cloud storage services offer convenient and inexpensive solutions for backing up data and syncing it across multiple devices. But if you’re worried about privacy, there are steps you should take to keep your cloud data private. The best cloud storage solution depends on your needs. How much data do you have to store? How many devices need access to it? …

How To: Configure Windows 10 Privacy Settings

Privacy concerns in Windows 10 have spawned a number of apps designed to improve privacy in Microsoft’s operating system. Here’s a list of several apps you can use to help stop Windows 10 from collecting private information about you and sending it to Microsoft. You can, of course, configure privacy settings on Windows 10 manually. But the following apps aim …

Report: Russia Is Building an Internet “Off Switch”

Could Russia be pursuing a policy of “Internet sovereignty” that would allow the government to isolate the country’s Internet users from the rest of the world at will? That’s what Newsweek suggests in a recent report on Russian online censorship. As the article notes, Internet censorship in Russia has increased steadily in recent years as the government has moved to …

Ukraine’s Cyberpolice Plan Registry of Censored Websites

Ukraine became the latest country to introduce systematic online censorship this month with the government’s announcement of a “cyberpolice” force. According to the government, the main purpose of Ukraine’s cyberpolice is to combat criminal activity on the Internet, such as identity theft, phishing, money laundering and digital piracy. The force’s creation is part of a broader effort to reform the …

Apple Censors iPhone and iPad News App in China

The latest example of Internet censorship in China involves a news app in Apple’s iOS 9 for iPhones and iPads, which the company has begun blocking for people travelling through China. Reports of Apple blocking its News app — which delivers, well, news to mobile device users — first appeared earlier this month. A few days ago, the New York …

FireTweet Provides Easy Twitter Access in Censored Countries

Want a quick and easy way around Internet censorship so you can access Twitter? FireTweet might be just the solution you’re looking for. FireTweet is an Android app that uses peer-to-peer networking to circumvent firewalls that block Twitter. It’s free, has no ads and requires no special setup. Once launched, FireTweet looks like a standard Twitter app for an Android …

Bush and Other Politicians Challenge Open Internet in the U.S.

Jeb Bush’s campaign lashed out against the Federal Communications Commission’s “Net Neutrality” policy recently, placing the principle of an open, anonymous Internet in the United States in question. Bush’s campaign website posted a page on Sept. 22 titled “The Regulatory Crisis in Washington.” As an example of what Bush’s supporters see as the need to rein in government regulation, the …

Thai Government Proposes A “Great Firewall” For Internet Censorship

Thailand may soon introduce Internet censorship on a grand scale and make online privacy very difficult. That’s according to a statement from the military government calling for a single Internet gateway. The statement orders the Ministry of Information and Communication, along with other government agencies, to establish a single gateway for Internet connections in Thailand. The gateway is to be …

2

Using SSH To Encrypt And Hide Your Web Activity

The SSH protocol is normally used to log in remotely to computers. In a pinch, however, it can also serve as an excellent privacy tool by providing the same encryption and security protections as a VPN service. Here’s how to use SSH to encrypt your Web browsing session. VPN vs. SSH First, though, we should make clear that encrypting Web …

2

How To Make Windows 10 More Private

Microsoft has never won any awards for protecting users’ privacy. But Windows 10 — the OS that “is spying on almost everything you do,” to quote from one article in the IT press — makes staying private harder than ever. Fortunately, there are steps you can take to mitigate the problem and improve security in Windows 10. To detail everything …

1

How to Set Your MAC Address Randomly Using Linux

In theory, every networking device has a unique media access control, or MAC, address. In practice, using a simple tool called macchanger, it’s easy to “spoof” your computer’s MAC address on Linux by setting a random value for it each time you connect to a network, which helps protect your privacy. Here’s how and why. How MAC Addresses Work Because …

Wallabag: A Free And Open Source Replacement For Instapaper

  Wallabag is a “a self hostable application for saving web pages”. Basically, it’s a free, secure, and open source alternative to services like Instapaper, Pocket and Readability. Beyond the Wallabag web interface, you can find Wallabag applications for iOS, Android and Windows Phone. There’s also add-ons available for Firefox and Chrome, as well as a bookmarklet. If you don’t have …

6

A Guide To Being Private Online

The services below will increase your security and reduce your surveillance by governments and advertisers. Here are my tips for maintaining on-line privacy: Use A Search Engine That Doesn’t Track You Many popular search engines like Google and Bing save your search history. Typically, your searches are saved along with some information about your computer (e.g. your IP address, User …

1

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine

A virtual machine makes it possible for your child to explore your computer freely without fears of configuration problems or lost files. If things do stop working, you can delete the virtual machine, restore from a backup, and the child is back with a working machine in just a few minutes You create a Virtual Machine by running another operating …

How To Opt Out Of Unwanted Catalogs and Other Mailers

If you receive any kind of postal mail, you will have noticed that unwanted catalogs, coupons, credit card offers and other junk mail arrives daily. Most of this mail comes from companies that bought your information from data brokers. Unfortunately you have to track down these companies if you want to get off their lists. Thankfully, there are a couple …

9

How To Ensure Your DNS Isn’t Leaking While Using A VPN

Here are some tips for using VPNs more effectively: Perform A DNS Leak Test DNS is the “domain name service” that is required to use internet. It translates a domain name (e.g. “Amazon.Com”) into a IP address (e.g. “72.21.211.176”). When using a VPN, do a DNS leak test to make sure that you are not revealing your ISP name servers (your ISP …

How To Make Your Linux and VPNs Installs Easier

If you want to get started with VPNs and Linux without a lot of hassle, here are some recommendations: Get A Pre-Configured VPN Router A pre-configured VPN router can provide all your computers and mobile devices with encrypted internet connections. You won’t have to install a VPN client on each device, and all your devices count as one connection with …