Ivacy: A VPN Provider Based In Singapore

Ivacy is a VPN provider founded in 2007 and based in Singapore. This provider is active on social media and readily responds to support questions (via email, live chat and a ticketing system).

1

How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

Tresorit: Cloud File Storage With End-To-End Encryption

Tresorit is a new encrypted cloud stroage provider, based in Switzerland. I’ve been testing their service for a few months, and it has performed well. Tresorit works in a familar Dropbox-type fashion. However, the difference is that Tresorit encrypts your files before they are uploaded to the cloud. This is what is called “end-to-end encryption”. It means your files are …

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

1

NinjaStik: Boot To An Anonymous OS In 60 Seconds

The NinjaStik is a bootable USB 3.0 memory stick. It allows to you boot your computer into an anonymous operating system (via custom firmware and Linux-based OS). There are a host of privacy-related tools on the stick — including a Tor Browser, a Bitcoin Wallet and Thunderbird with Enigmail installed. According to the company the Ninjastik can be used  a …

9

The Best VPNs To Use In Saudi Arabia

Saudi Arabia has very strong internet filtering and blocking. However, it is possible to bypass these blocks with a VPN or “virtual private network”. This is a service that encrypts and redirects all your internet connections.

A Fully Open Source Laptop Is Under Construction

Two enthusiasts (Sean “xobs” Cross and bunnie) are building a completely open-source laptop. You can read an article about this project here. Here are the blueprints for the laptop.