The Best Seedboxes With VPNs 2020

A seedbox is a dedicated, high-speed server for downloading and uploading files. Most people rent seedboxes to achieve very fast torrent or Usenet transfers.

pCloud: A Cloud Provider That Offers Encrypted And Non-Encrypted Folders

pCloud is a secure cloud provider. The name is a bit unfortunate, but I’ve found their service to be reliable and well designed. pCloud is the first cloud storage provider to offer both encrypted and non-encrypted folders in the same account. The company explains why this makes sense: Although at first thought it is the most natural approach to just …

5

A List Of Free Public Domain Name Services (DNS)

A domain name service (DNS) translates a human-friendly Internet address such as “yahoo.com” into an IP address, such as “98.139.183.24”. DNS blocking is often used to censor web sites because it relatively easily to implement. However, it is also easy to avoid. For example, you can use one of the public servers listed below. Here’s how to change your DNS: …

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

Tor Project Will Pay Developers to Find Privacy Flaws

Tor developers have acknowledged security vulnerabilities in the platform, but also started a major effort to fix them, by launching a program that will pay people who find bugs in the Tor code. The new Tor initiative is a bug bounty program. That means programmers who review Tor code and find bugs will receive cash for their efforts. They don’t …

2

How To: Make A Strong Master Password

As we’ve already noted, password manager apps are a great way to make sure your passwords are as robust as possible. But to use a password manager you need a single master password. And you need it to be very strong. Here’s how to create an excellent master password. Password Myths Most people think that the best way to make …

How To: Configure Windows 10 Privacy Settings

Privacy concerns in Windows 10 have spawned a number of apps designed to improve privacy in Microsoft’s operating system. Here’s a list of several apps you can use to help stop Windows 10 from collecting private information about you and sending it to Microsoft. You can, of course, configure privacy settings on Windows 10 manually. But the following apps aim …

1

Tor Unveils Hardened Browser for Extra Security

The Tor project recently released the first version of its “hardened” Tor browser package. This release comes with extra security features designed to provide more privacy and protection against attacks. The Tor browser is a special Web browser package that makes it easy to connect to the Tor network. It is designed to be portable and self-contained, meaning you can …

How To: Check That Your VPN is Working

How do you make sure your VPN is actually running — and not leaking data — after you log in? Here are quick and simple steps for checking. Most people probably assume that their VPN “just works” once they launch it. But in certain cases, it may not be. Just because the client program that your VPN provider gives you …

Symantec Reports New Internet Monitoring in Iran

An American security company says Iranian hackers have been engaged in a program to track potential political dissidents for at least the last year. The monitoring program uses malware to spy on computer users and may be targeting people using Tor or VPNs. According to Symantec, the American online security company, the spying has been the work of two different …

Australia’s New Internet Censorship Law Will Be Tested

A legal demand is testing Internet censorship policies for the first time in Australia, where an Internet service provider, or ISP, has been threatened with a lawsuit if it does not block online content. The case centers on a website owned by an Australian construction company. Another construction company says the site infringes its copyright. It hired a legal firm …

DOPPA Law Aims to Protect Online Privacy in Delaware

Delaware will become one of the first states in the U.S. to enforce strong online privacy policies through a new law called DOPPA, which takes effect on January 1, 2016. DOPPA, which is short for the Delaware Online Privacy and Protection Act, has three main purposes: Preventing marketing of specific types of online content to anyone under the age of …

2

Three Free Anti-Keylogging Apps For Windows

Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system. Keyloggers come in two forms — those that are software-based and those that are embedded in hardware.  The latter can only be installed by someone who has physical access to your computer, but the …

XYZ.com CEO Clarifies Policy on Chinese Censorship of Internet Domains

Is XYZ.com working with Chinese authorities to censor certain Internet domains for people across the world? That’s what some recent reports have said. Here’s what XYZ.com told us in response to questions about the issue. A couple of weeks ago, reports began circulating on outlets like the EFF and the Wall Street Journal that XYZ.com had written a proposal to …

Houthi-Controlled Yemen Extends Internet Censorship

Add Houthi-controlled Yemen to the list of places currently subject to government-sponsored Internet censorship. With the help of a Canadian company, Houthi rebels in Yemen’s civil war are blocking online content. The Houthis are an ethnic group that effectively seized control of Yemen over the last year. They weren’t the first to introduce Internet censorship to the country — it …