10

How To Pay Anonymously Online

Many websites and online apps require you to pay for certain services. Normally, that would mean using a credit card and giving away your real identity.

12

The Best VPN For P2P In 2020

The Best VPNs For P2P

Using a VPN with P2P is a straightforward way to conceal your IP address, and ensure your privacy. 

327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

8

The Best VPN For Torrenting 2020

Using a VPN while torrenting is one of the simplest ways to conceal your IP address, and ensure your privacy. However, only a limited number of VPN Services allow you to use BitTorrent. If want to torrent files without being monitored, it is essential that the VPN you use does not track your online connections. The VPNs listed below welcome …

4

The Best VPNs For Iran

To bypass the Internet restrictions in Iran, we recommend using the following VPNs (Virtual Private Networks):

3

How To Use A Disposable Email Address (For Signing Up To New Services)

These days, many companies ask for your email address. Often you end up with spam in your inbox, or, worse still your email is sold to various other mailing lists. It makes sense to use a disposable email address, at least until you trust a company enough to give them your real address. I recommend these free disposable mail services: …

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

2

Malware: The State Of The Threat In 2016

Most malware is acquired when users visit questionable web sites (e.g. adult sites) or when they click on questionable email (e.g. free offers or fake invoices). MS Windows is by far the most vulnerable operating system — but malware exists for Apple OS X and Linux also. You can significantly reduce your risk of a malware attack by keeping your OS, web browser and applications updated diligently.

2

Encryption 101: Which Encryption Type is Most Secure?

Apple’s recent revelation about a U.S. government order to create a “backdoor” for undermining iPhone encryption will leave lots of people wondering which encryption methods are reliable. Here’s a quick run-down of which encryption algorithms to trust, and which ones are flawed. First, you should understand that there are three basic ways that encryption can be broken: Keys can be …

Smart TV Privacy: How to Disable TV Data Collection

You knew that websites can track you. But did you know your smart TV is probably doing the same thing? Most modern TVs are designed to monitor what you watch and report that information to companies. Fortunately, you can protect your privacy while watching TV. Here’s how to disable monitoring software on smart TVs. The exact type of information that …