9

How To Pay Anonymously Online

Many websites and online apps require you to pay for certain services. Normally, that would mean using a credit card and giving away your real identity.

327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

3

How To Use A Disposable Email Address (For Signing Up To New Services)

These days, many companies ask for your email address. Often you end up with spam in your inbox, or, worse still your email is sold to various other mailing lists. It makes sense to use a disposable email address, at least until you trust a company enough to give them your real address. I recommend these free disposable mail services: …

Two Ways to Make Anonymous Phone Calls

Want to make a phone call without revealing your real identity? There are several ways you can do this, ranging from using a throw-away phone to restricting caller ID settings permanently on your smartphone. But what if you just want to make private, anonymous calls occasionally, without purchasing a special phone for it? Here are two solutions. Use a Caller …

VPN vs. Tor Comparison Chart

If you want to stay private online or beat Internet censorship, should you use a VPN, Tor or both? Keep reading for a comparison of VPN services and Tor. VPNs and Tor are different types of services. But their feature sets overlap in certain areas. They can both be useful for circumventing censorship and for increasing privacy. The following tables …

1

How To: Perform Private Searches Online

Performing online searches using major search engines is a big privacy risk. Here are a few alternative search engines that allow you to search without being tracked. Search engines like Google, Bing and Yahoo! track you in various ways. If you have an account with them, they can correlate your searches with other details you reveal about yourself. And even …

MPAA Report Criticizes Online Privacy Outside U.S.

The MPAA (Motion Picture Association of America) set online privacy tools and laws in its sights in a recent report to the U.S. government in which it contends that too much online privacy hurts the film industry. The report was submitted to the U.S. Trade Policy Staff Committee, which helps oversee U.S. trade with foreign countries. Its purpose is to …

FCC Rejects “Do Not Track” Petition, and It’s a Good Thing

“Do Not Track” requests from Web users will continue to have little real meaning in the wake of a recent FCC ruling that does not require websites to respect the requests. The ruling was a response to a petition that the group Consumer Watchdog created. The petition called upon the FCC, which regulates Internet communications in the United States, to …

China and Iran at Bottom of Report on Government Censorship

How does Internet freedom compare between different countries? A report out this week from Freedom House aims to answer that question by ranking countries according to online censorship policies. The report, titled “Freedom on the Net 2015,” presents information about Internet censorship in 88 countries. It assigns each country a score while also providing reports on individual countries that detail …

Malaysian Officials Make Online Privacy Harder

malaysian internet censorship

“There is currently too much anonymity online.” That’s what government officials in Malaysia are saying in comments regarding plans to increase Internet censorship as the country’s prime minister, Najib Razak, faces allegations of corruption. The suggestion that the Internet is too anonymous came from Datuk Seri Nazri Aziz, Malaysia’s tourism minister. He went on to explain that the problem, in …

How To Make Flash More Private

Adobe Flash: It’s what makes YouTube videos, online games, interactive media and plenty of other stuff on the Internet work. Unfortunately, it’s also a tool that Web developers can use to track your activities even if you take other steps to protect your privacy while browsing, like disabling cookies. But with the help of certain tools — namely, BetterPrivacy and …

Tails OS 1.5 Offers Out-of-the-Box Privacy Protection

Wouldn’t it be nice if there were an OS designed from the ground-up for privacy and security?  If you’re willing to give a Linux-based platform a try, there is: The Amnesic Incognito Live System — better known as Tails OS. It aims to make private computing a plug-and-play affair. Most mainstream operating systems do little to help users stay private. …

2

Lead Linux Coder Warns Against Inevitable Security Flaws

From Heartbleed to Shellshock, the world of open-source computing has faced several high-profile security breaches in the last year. What are open-source developers – whose code powers many of the servers and websites that store millions of people’s personal information – doing about them? That’s the question Linus Torvalds, lead Linux kernel developer, helped answer a few days ago. Torvalds …

How To Avoid Giving Out Your Personal Information

Here are some simple steps to avoid giving out your personal information: Give Out A Separate/Disposable Email Address Create a separate email address and give it to companies who needlessly request one. This really helps reduce spam. I use a disposal email address. Give Out A Fake/Disposable Phone Number Give out a fake phone number or use a disposable phone …

Whonix: An Operating System Where IP & DNS Leaks Are Impossible

Whonix is an operating system focused on anonymity and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. In Whonix, DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP. Whonix consists of two virtual machines on a separate, isolated virtual network. One virtual machine (VM) is …

Books That Cover The Real Issues Of The Global Internet

Cognitive Surplus: How Technology Makes Consumers Into Collaborators by Clay Shirky With Cognitive Surplus, Clay Shirky reveals how new digital technology is unleashing a torrent of creative production that will transform our world. For the first time, people are embracing new media that allow them to pool their efforts at vanishingly low cost. The results of this aggregated effort range …

7

The Fake Name Generator: Create A Name, Address, Telephone Number & Email Address

The Fake Name Generator is tool that instantly creates a set of fake credentials, for dealing with companies that request unnecessary personal information. The Generator will create a completely fictitious identity that includes a fake name, telephone number, email address, street address and credit card number. All of the information generated will match correctly — for example the telephone number will …