328

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

4

The Best VPNs For Iran

To bypass the Internet restrictions in Iran, we recommend using the following VPNs (Virtual Private Networks):

Streisand Makes Installing Your Own VPN Easier

One of the easiest way to install your own VPN is to use a piece of free software called Streisand. It is a remarkable open-source project that allows you to set-up and deploy your own VPN server with the minimum possible fuss.

pCloud: A Cloud Provider That Offers Encrypted And Non-Encrypted Folders

pCloud is a secure cloud provider. The name is a bit unfortunate, but I’ve found their service to be reliable and well designed. pCloud is the first cloud storage provider to offer both encrypted and non-encrypted folders in the same account. The company explains why this makes sense: Although at first thought it is the most natural approach to just …

8

Bitwarden: A Faster Alternative To Lastpass

Bitwarden is now my recommended password manager. This free, open source application is a replacement for properitary password managers like Lastpass and 1Password.

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

4

The Best Web Browsers for Privacy and Security

Which Web browser should you use if you are concerned about privacy? From Tor Browser to commercial offerings like Comodo Dragon to a DIY approach, there are lots of options to choose from. Keep reading for an overview and tips on finding the best browser for privacy and security. There is no one-size-fits all solution for private Web browsing. Instead, …

How to Use Encryption Effectively on Android Phones

Android phones and tablets have come with built-in encryption support for several years. Since the Android Lollipop release in 2014 encryption has even been turned on by default. But that doesn’t necessarily mean your Android personal data is secure. There are additional steps you should take to prevent access to your data in case your device is stolen. Here’s what …

Tor Project Will Pay Developers to Find Privacy Flaws

Tor developers have acknowledged security vulnerabilities in the platform, but also started a major effort to fix them, by launching a program that will pay people who find bugs in the Tor code. The new Tor initiative is a bug bounty program. That means programmers who review Tor code and find bugs will receive cash for their efforts. They don’t …

New Tails OS 2.0 Release Updates Privacy Features

Tails OS 2.0, the latest version of the privacy-focused Linux-based operating system, is out this week. It features a new interface and many application updates, including version 5.5 of the Tor browser. Tails 2.0 is designed to provide comprehensive, out-of-the-box privacy features. It comes with built-in Tor encryption for all network connections (not just the browser), as well as extra …

A Review of the Best VPNs for Gaming

Using a VPN while playing games online is one of the best ways to prevent DDoS attacks and other disruptions. But with so many VPN companies out there, what are the best VPNs for gaming? Here’s a guide. Why Use a VPN for Gaming? If you use a VPN to circumvent censorship or provide privacy, it may not be obvious …

1

PrivaTegrity Promises Better, Faster Online Privacy than Tor

What if there were an online privacy solution that was much faster than Tor and, unlike VPNs, allowed no single third party to read encrypted information? That’s what David Chaum, an Internet security and privacy veteran, aims to implement through a new type of mixed network called PrivaTegrity. PrivaTegrity is designed to work somewhat like Tor in that it would …

SLOTH Attacks Weaken HTTPS Privacy

Security vulnerabilities based on the MD5 hashing function make it possible to decrypt network data or impersonate servers in order to steal private information, according to researchers from the INRIA institute in France. MD5 is a cryptographic hash function. That means it translates data into a “hash,” or jumbled piece of information. In theory, the jumbled data cannot be reverse-translated …

How To: Use Your Ubuntu Computer as a VPN Router

Want a VPN router but don’t have the cash to buy new hardware? Here’s an easy and free way to create a wireless VPN router for all the devices on your network using the Ubuntu Linux operating system. First, a little background on VPN routers. A VPN router is a router that is connected to a VPN service and routes …

1

Two Free Privacy-Focused Mobile Operating Systems

Making Android-based mobile devices more private and secure can be a challenge. Here’s a look at two custom-built versions of Android that aim to provide comprehensive out-of-the-box privacy and security, with little work on the part of the user. Privacy gaps on Android exist at several levels. There’s the operating system itself, which could have bugs that allow third parties …

How North Korea’s “Red Star OS” Implements Censorship

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is based on Fedora Linux but …

Which VPN Protocol Should You Use? PPTP vs. OpenVPN vs. IPsec

All VPNs encrypt traffic, but the underlying encryption schemes are not always the same. There are three main types of encryption and data transfer protocols that VPNs can use: PPTP, OpenVPN and IPsec. Many VPN services let you choose which protocol to use. Read on for an overview of each option. PPTP PPTP is one of the oldest forms of …

New 451 HTTP Code Identifies Censored Websites

Identifying sites that have been blocked due to Internet censorship has become easier thanks to a new HTTP status code, 451. Here are the details. HTTP status codes are used to classify different types of transactions between Web servers and browsers. In most cases users never see them, although some common codes — like the 404 “page not found” error …