emails

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

A Guide To Avoiding Ransomware (Part 1) Read More »

Linux Distributions Built For Anonymity

If you are serious about using the internet privately, you should probably be using an anonymous operating system. Listed below are privacy and security enhanced Linux distributions that can allow anonymous web surfing, encryption and advanced security measures. Most of them use the Tor network for anonymous internet connections.

Linux Distributions Built For Anonymity Read More »

How to Buy Things Anonymously Using A Credit Card

The paid service Blur allows you to create disposable credit cards (U.S. only) Similar to Blur, Privacy.Com allows you to create disposable credit cards (U.S. only) Using Bitcoins is another good option — however be aware that Bitcoin transactions are only quasi-anonymous. Blur: Create Masked Emails, Phone Numbers, Credit Cards Blur is a service run

How to Buy Things Anonymously Using A Credit Card Read More »