10

How To Pay Anonymously Online

Many websites and online apps require you to pay for certain services. Normally, that would mean using a credit card and giving away your real identity.

40

The Best VPN Routers Of 2020

A VPN-capable router is a convenient device — it can provide VPN connections to your computers and mobile devices via Wi-Fi. You won’t have to install a VPN client on each device. Instead, all your devices are routed via one connection to your VPN provider.

Streisand Makes Installing Your Own VPN Easier

One of the easiest way to install your own VPN is to use a piece of free software called Streisand. It is a remarkable open-source project that allows you to set-up and deploy your own VPN server with the minimum possible fuss.

How to Find the Fastest VPNs

In A Nutshell These are the fastest VPNs that I recommend: Cyberghost Buffered ExpressVPN If you are going to purchase a VPN service, you probably want to get the best download and upload speeds possible. But finding the fastest VPN can seem difficult. However, it’s easy if you understand how to measure VPN performance. Here’s our guide to the fastest …

5

A List Of Free Public Domain Name Services (DNS)

A domain name service (DNS) translates a human-friendly Internet address such as “yahoo.com” into an IP address, such as “98.139.183.24”. DNS blocking is often used to censor web sites because it relatively easily to implement. However, it is also easy to avoid. For example, you can use one of the public servers listed below. Here’s how to change your DNS: …

14

How To Hide OpenVPN Connections In China

If you are using OpenVPN in China, even on port 443, you may find that your connections are unstable. The problem is that Chinese government can detect the difference between “normal” SSL encryption and VPN encryption.

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

Proxy.sh Anonymous VPN: A Review

Proxy.sh is one of the most feature-rich VPN services. It’s also extremely BitTorrent-friendly and makes an emphatic promise not to log user data. It supports all the major operating systems for desktop and mobile. Pricing is competitive but a little confusing, so you should pay close attention to which features come with which plans. These are the major selling points …

1

Two New Privacy-Friendly Services

Trezor is a safe for storing bitcoins. This USB device creates an isolated environment for offline Bitcoin transaction signing.

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

New Encryption Attack Can Steal Android and iOS Data

The newest threat to data privacy on mobile devices enables attackers to break the encryption keys of data stored on Android phones and tablets and iPhones. That’s according to recently published academic research. As the Register reports, the attack involves using a probe to collect a phone or tablet’s electromagnetic emissions while it is encrypting or decrypting data. The probe …