11

The Best Blocklists To Use When Torrenting

A blocklist is simply a list of IP addresses to block when torrenting. Typically, these lists consist of the IP addresses of known snoopers or malware providers. Most of the good bittorrent clients support blocklists – for example Transmission or uTorrent. Where To Find Blocklists Bitsurge Blocklist The Bitsurge list is a list of “anti-torrent” group. It was created for …

327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

How To Install Free Ad-Blocking Using AdGuard DNS

AdGuard DNS is a free Domain Name System service provided the AdGuard company. You can use this DNS service to block advertising and trackers. It works like this: when a website sends a request to an ad network, the DNS sends back a “null” response. For example, when a web page looks up the domain name “ads.facebook.com” the DNS will …

1

How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

pCloud: A Cloud Provider That Offers Encrypted And Non-Encrypted Folders

pCloud is a secure cloud provider. The name is a bit unfortunate, but I’ve found their service to be reliable and well designed. pCloud is the first cloud storage provider to offer both encrypted and non-encrypted folders in the same account. The company explains why this makes sense: Although at first thought it is the most natural approach to just …

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

MPAA Report Criticizes Online Privacy Outside U.S.

The MPAA (Motion Picture Association of America) set online privacy tools and laws in its sights in a recent report to the U.S. government in which it contends that too much online privacy hurts the film industry. The report was submitted to the U.S. Trade Policy Staff Committee, which helps oversee U.S. trade with foreign countries. Its purpose is to …

XYZ.com CEO Clarifies Policy on Chinese Censorship of Internet Domains

Is XYZ.com working with Chinese authorities to censor certain Internet domains for people across the world? That’s what some recent reports have said. Here’s what XYZ.com told us in response to questions about the issue. A couple of weeks ago, reports began circulating on outlets like the EFF and the Wall Street Journal that XYZ.com had written a proposal to …

Tor .onion Domain Gets Security Enhancement with IETF Approval

The Internet Engineering Task Force (IETF) has made private and anonymous Internet browsing easier by officially granting special status to the .onion domain name. Now, Tor users can be more certain that their tracks are hidden when they visit sites that use the .onion domain. The change’s chief significance is that it makes it impossible to access sites using the …

How To Avoid Giving Out Your Personal Information

Here are some simple steps to avoid giving out your personal information: Give Out A Separate/Disposable Email Address Create a separate email address and give it to companies who needlessly request one. This really helps reduce spam. I use a disposal email address. Give Out A Fake/Disposable Phone Number Give out a fake phone number or use a disposable phone …

9

The Best VPNs To Use In Saudi Arabia

Saudi Arabia has very strong internet filtering and blocking. However, it is possible to bypass these blocks with a VPN or “virtual private network”. This is a service that encrypts and redirects all your internet connections.

7

The Fake Name Generator: Create A Name, Address, Telephone Number & Email Address

The Fake Name Generator is tool that instantly creates a set of fake credentials, for dealing with companies that request unnecessary personal information. The Generator will create a completely fictitious identity that includes a fake name, telephone number, email address, street address and credit card number. All of the information generated will match correctly — for example the telephone number will …