327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

3

How To Use A Disposable Email Address (For Signing Up To New Services)

These days, many companies ask for your email address. Often you end up with spam in your inbox, or, worse still your email is sold to various other mailing lists. It makes sense to use a disposable email address, at least until you trust a company enough to give them your real address. I recommend these free disposable mail services: …

Ivacy: A VPN Provider Based In Singapore

Ivacy is a VPN provider founded in 2007 and based in Singapore. This provider is active on social media and readily responds to support questions (via email, live chat and a ticketing system).

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

How To: Use Email Privately without Being Tracked

Virtually everyone needs an email account. Yet keeping emails private and secure is challenging because, by design, email identifies the sender. You also can’t protect emails from tracking with privacy tools like Tor or VPN. But that doesn’t mean there aren’t things you can do to protect your email privacy. Here are our tips for secure email: If possible, use …

New Tails OS 2.0 Release Updates Privacy Features

Tails OS 2.0, the latest version of the privacy-focused Linux-based operating system, is out this week. It features a new interface and many application updates, including version 5.5 of the Tor browser. Tails 2.0 is designed to provide comprehensive, out-of-the-box privacy features. It comes with built-in Tor encryption for all network connections (not just the browser), as well as extra …

A Review Of NordVPN

NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks.

Using Anonymous Remailers for Email Privacy

Want to send email anonymously? Anonymous remailers provide a solution. Here’s an overview of how they work and where to access them. You can gain some privacy in email by using a provider that doesn’t track you. But that’s different from hiding your identity from the recipient. Anonymous remailers make it possible to obfuscate your identity when sending email. They …

How Free Software Advocate Richard Stallman Stays Private Online

Richard Stallman, the founder of the Free Software Foundation, probably takes the cake as one of the most privacy-conscious Internet users around. For that reason, it’s worth taking a look at his strategy for staying private online, which he has described on his personal website. Privacy is not Stallman’s only reason for promoting free software. He has lots of other …

Could Email Provide Access to Censored Online Content?

Here’s a creative way to beat online censorship: transmit banned information via email. That’s what a little-known (and now defunct) project called Feed over Email tried to do. It never got off the ground, but it’s notable all the same for its creative approach to online privacy, which did not require VPNs or Tor. Feed over Email, or FOE, described …