11

The Best Blocklists To Use When Torrenting

A blocklist is simply a list of IP addresses to block when torrenting. Typically, these lists consist of the IP addresses of known snoopers or malware providers. Most of the good bittorrent clients support blocklists – for example Transmission or uTorrent. Where To Find Blocklists Bitsurge Blocklist The Bitsurge list is a list of “anti-torrent” group. It was created for …

The Best Seedboxes With VPNs 2020

A seedbox is a dedicated, high-speed server for downloading and uploading files. Most people rent seedboxes to achieve very fast torrent or Usenet transfers.

327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

pCloud: A Cloud Provider That Offers Encrypted And Non-Encrypted Folders

pCloud is a secure cloud provider. The name is a bit unfortunate, but I’ve found their service to be reliable and well designed. pCloud is the first cloud storage provider to offer both encrypted and non-encrypted folders in the same account. The company explains why this makes sense: Although at first thought it is the most natural approach to just …

Tresorit: Cloud File Storage With End-To-End Encryption

Tresorit is a new encrypted cloud stroage provider, based in Switzerland. I’ve been testing their service for a few months, and it has performed well. Tresorit works in a familar Dropbox-type fashion. However, the difference is that Tresorit encrypts your files before they are uploaded to the cloud. This is what is called “end-to-end encryption”. It means your files are …

8

Bitwarden: A Faster Alternative To Lastpass

Bitwarden is now my recommended password manager. This free, open source application is a replacement for properitary password managers like Lastpass and 1Password.

3

Self-Destructing Cookies — Silently Dispose Of All Those Unwanted Cookies

Self Destructing Cookies is a Firefox add-on that automatically removes cookies when they are no longer used by open browser tabs. I’ve found this to be an excellent solution that works silently in the background. Websites will only be permitted to identify you while you actually use them and can not stalk you across the entire web. This is the …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

How North Korea’s “Red Star OS” Implements Censorship

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is based on Fedora Linux but …

South Korea Revises Law Affecting Online Censorship

South Korea’s modification of a law that regulates online content could lead to more Internet censorship in the country, critics say. Korea Times reports that the Korea Communications Standards Commission, or KCSC, has revised a law that allows people to dispute online content that may be defamatory in nature. In its previous form, the law only granted the alleged victims …

1

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine

A virtual machine makes it possible for your child to explore your computer freely without fears of configuration problems or lost files. If things do stop working, you can delete the virtual machine, restore from a backup, and the child is back with a working machine in just a few minutes You create a Virtual Machine by running another operating …

1

Two Projects Aim To Decentralize The Internet

Here are two ambitious projects that aim to create a decentralized internet: Bitcloud: A group of Bitcoin developers want to create a decentralized internet, where peers are compensated for their contributions MaidSafe: A Scottish company has been developing a decentralized file storage system for the last eight years

Decentralized & Transparent Tools

I’m currently researching technologies that are decentralized and/or transparent. They are not prone to censorship, and mostly free of the whims of profit. Some or all of these tools may be flawed, but what is important for me, is that they are working examples of decentralization and transparency. These tools are decentralized: Bitcoin (digital cash) Bittorrent (file transfers) Bittorrent Sync …