A List Of Companies That Accept Bitcoin
This is an updated list of places where you can spend Bitcoin:
This is an updated list of places where you can spend Bitcoin:
Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.
Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. Update 2021: I recommend the Ledger Nano X as a best hardware wallet now.
Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to …
Most malware is acquired when users visit questionable web sites (e.g. adult sites) or when they click on questionable email (e.g. free offers or fake invoices). MS Windows is by far the most vulnerable operating system — but malware exists for Apple OS X and Linux also. You can significantly reduce your risk of a malware attack by keeping your OS, web browser and applications updated diligently.
An easy way to avoid ransomware: only open unknown/unexpected files using Google Docs or Preview.
Apple’s recent revelation about a U.S. government order to create a “backdoor” for undermining iPhone encryption will leave lots of people wondering which encryption methods are reliable. Here’s a quick run-down of which encryption algorithms to trust, and which ones are flawed. First, you should understand that there are three basic ways that encryption can …
Encryption 101: Which Encryption Type is Most Secure? Read More »
You knew that websites can track you. But did you know your smart TV is probably doing the same thing? Most modern TVs are designed to monitor what you watch and report that information to companies. Fortunately, you can protect your privacy while watching TV. Here’s how to disable monitoring software on smart TVs. The …
Smart TV Privacy: How to Disable TV Data Collection Read More »
Recently, a string of attacks against SSL encryption have undercut HTTPS privacy on the Internet. Want to know if the sites you use frequently are vulnerable to these hacks? Here’s an easy way to find out. HTTPS encryption is a great way to make your online activity more private, but only if it actually works. …
How to Check Websites for HTTPS and SSL Privacy Problems Read More »
The latest threat to Tor, the online anonymity tool, is simple but serious: Mouse movements may be used to identify users online. Tor is designed to hide your identity on the Internet by making it impossible for websites, or people eavesdropping on network traffic, to determine your true IP address. It does a pretty good …
Mouse Movements Could Identify Tor Users’ Real IP Address Read More »