9

How To Pay Anonymously Online

Many websites and online apps require you to pay for certain services. Normally, that would mean using a credit card and giving away your real identity.

327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

Streisand Makes Installing Your Own VPN Easier

One of the easiest way to install your own VPN is to use a piece of free software called Streisand. It is a remarkable open-source project that allows you to set-up and deploy your own VPN server with the minimum possible fuss.

1

How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

How To: Use Email Privately without Being Tracked

Virtually everyone needs an email account. Yet keeping emails private and secure is challenging because, by design, email identifies the sender. You also can’t protect emails from tracking with privacy tools like Tor or VPN. But that doesn’t mean there aren’t things you can do to protect your email privacy. Here are our tips for secure email: If possible, use …

Tor Project Will Pay Developers to Find Privacy Flaws

Tor developers have acknowledged security vulnerabilities in the platform, but also started a major effort to fix them, by launching a program that will pay people who find bugs in the Tor code. The new Tor initiative is a bug bounty program. That means programmers who review Tor code and find bugs will receive cash for their efforts. They don’t …

PayPal Shuts Down Payments to UnoTelly Proxy Service

PayPal has blocked payments for a VPN provider, UnoTelly, in a move that could set a problematic precedent for other VPN and proxy services. UnoTelly reported on Feb. 4 that PayPal had begun blocking payments to the company. As a result, it said, customers can no longer use PayPal to purchase VPN access or other services from UnoTelly. UnoTelly, which …

2

How To: Make A Strong Master Password

As we’ve already noted, password manager apps are a great way to make sure your passwords are as robust as possible. But to use a password manager you need a single master password. And you need it to be very strong. Here’s how to create an excellent master password. Password Myths Most people think that the best way to make …

1

How To Use a VPN in China

Chinese Internet censors have become more proactive in recent years about blocking VPN usage through the Great Firewall. But it’s still possible to use a VPN in China. Here are tips on how to work around VPN blocking. This isn’t an article about how to use a VPN in general. We assume you already have VPN software configured on your …

3

How To: Access Facebook from China

Visiting Facebook in China is hard because the site is blocked by government censorship. But it’s still possible to visit facebook.com while in China. Here’s how to do it on any major operating system. There are a few different ways to access Facebook from China. Each has pros and cons. These are the main methods: Use a VPN. A VPN …

1

PrivaTegrity Promises Better, Faster Online Privacy than Tor

What if there were an online privacy solution that was much faster than Tor and, unlike VPNs, allowed no single third party to read encrypted information? That’s what David Chaum, an Internet security and privacy veteran, aims to implement through a new type of mixed network called PrivaTegrity. PrivaTegrity is designed to work somewhat like Tor in that it would …

SLOTH Attacks Weaken HTTPS Privacy

Security vulnerabilities based on the MD5 hashing function make it possible to decrypt network data or impersonate servers in order to steal private information, according to researchers from the INRIA institute in France. MD5 is a cryptographic hash function. That means it translates data into a “hash,” or jumbled piece of information. In theory, the jumbled data cannot be reverse-translated …

VPN Traffic Can Be Decrypted through Juniper Bug

Juniper Networks, a popular provider of network firewalls, has disclosed a bug in its software that could have allowed third parties to decrypt VPN traffic. The bug, which Juniper reported on Dec. 17, involves networking hardware devices running the company’s ScreenOS. These are the type of devices used in major datacenters or by ISPs to route and control network traffic. …

How North Korea’s “Red Star OS” Implements Censorship

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is based on Fedora Linux but …

South Korea Revises Law Affecting Online Censorship

South Korea’s modification of a law that regulates online content could lead to more Internet censorship in the country, critics say. Korea Times reports that the Korea Communications Standards Commission, or KCSC, has revised a law that allows people to dispute online content that may be defamatory in nature. In its previous form, the law only granted the alleged victims …

Using Anonymous Remailers for Email Privacy

Want to send email anonymously? Anonymous remailers provide a solution. Here’s an overview of how they work and where to access them. You can gain some privacy in email by using a provider that doesn’t track you. But that’s different from hiding your identity from the recipient. Anonymous remailers make it possible to obfuscate your identity when sending email. They …

1

Mobile Companies Still Track Users with Location Services Disabled

Most people think that turning off location services on iOS or Android phones will prevent tracking of their location. It doesn’t. Here’s how companies and hackers can still track you. Virtually all modern mobile phones provide settings that let users turn off location services. On Android, you can disable the location reporting and location history features. iPhones offer a similar …