The Best Web Browsers for Privacy and Security

by Tracy Knauer •

Which Web browser should you use if you are concerned about privacy? From Tor Browser to commercial offerings like Comodo Dragon to a DIY approach, there are lots of options to choose from. Keep reading for an overview and tips on finding the best browser for privacy and security. There is no one-size-fits all solution for private Web browsing. Instead, …

How North Korea’s “Red Star OS” Implements Censorship

by Tracy Knauer •

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is based on Fedora Linux but …

VPN vs. Tor Comparison Chart

by Tracy Knauer •

If you want to stay private online or beat Internet censorship, should you use a VPN, Tor or both? Keep reading for a comparison of VPN services and Tor. VPNs and Tor are different types of services. But their feature sets overlap in certain areas. They can both be useful for circumventing censorship and for increasing privacy. The following tables …


How To: Perform Private Searches Online

by Tracy Knauer •

Performing online searches using major search engines is a big privacy risk. Here are a few alternative search engines that allow you to search without being tracked. Search engines like Google, Bing and Yahoo! track you in various ways. If you have an account with them, they can correlate your searches with other details you reveal about yourself. And even …