The Best Seedboxes With VPNs 2020

A seedbox is a dedicated, high-speed server for downloading and uploading files. Most people rent seedboxes to achieve very fast torrent or Usenet transfers.

327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

Ivacy: A VPN Provider Based In Singapore

Ivacy is a VPN provider founded in 2007 and based in Singapore. This provider is active on social media and readily responds to support questions (via email, live chat and a ticketing system).

How To Install Free Ad-Blocking Using AdGuard DNS

AdGuard DNS is a free Domain Name System service provided the AdGuard company. You can use this DNS service to block advertising and trackers. It works like this: when a website sends a request to an ad network, the DNS sends back a “null” response. For example, when a web page looks up the domain name “ads.facebook.com” the DNS will …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

Best Windows 10 VPN: Our Recommendations

Which company offers the best VPN for Windows 10? What features should you look for when selecting a Windows 10 VPN? Here are our recommendations based on speed, usability, reliability and privacy testing. Why Use a VPN on Windows 10? If you just want to see our recommendations, skip to the bottom of this page. Keep reading here, though, for …

New Tails OS 2.0 Release Updates Privacy Features

Tails OS 2.0, the latest version of the privacy-focused Linux-based operating system, is out this week. It features a new interface and many application updates, including version 5.5 of the Tor browser. Tails 2.0 is designed to provide comprehensive, out-of-the-box privacy features. It comes with built-in Tor encryption for all network connections (not just the browser), as well as extra …

Windows 10 May Monitor the Apps You Use

It’s no secret that Windows 10 collects lots of data about users. But a recent blog post by the company suggests that it might be tracking more information than previously thought, including which apps you have open. There are a number of settings you can change in Windows 10 to make it more private (or you can use a privacy …

3

How To Get Better VPN Speeds and Performance

Using a VPN to increase your privacy or access blocked websites doesn’t have to come at the cost of a fast Internet connection. Here’s how to get the best speeds when using a VPN. It goes without saying that the best way to get good VPN speed is to pick a provider with solid service. But even with a great …

How To: Choose a Privacy-Focused Linux OS

Using a Linux-based operating system can help you avoid many of the privacy pitfalls of Windows and Mac OS X. Here’s a guide to some of the most popular Linux distributions available, with notes on how they compare regarding ease of use and privacy. If you’ve never used Linux before, you may not understand that there is no single Linux …

VPN Traffic Can Be Decrypted through Juniper Bug

Juniper Networks, a popular provider of network firewalls, has disclosed a bug in its software that could have allowed third parties to decrypt VPN traffic. The bug, which Juniper reported on Dec. 17, involves networking hardware devices running the company’s ScreenOS. These are the type of devices used in major datacenters or by ISPs to route and control network traffic. …

1

Two Free Privacy-Focused Mobile Operating Systems

Making Android-based mobile devices more private and secure can be a challenge. Here’s a look at two custom-built versions of Android that aim to provide comprehensive out-of-the-box privacy and security, with little work on the part of the user. Privacy gaps on Android exist at several levels. There’s the operating system itself, which could have bugs that allow third parties …

How North Korea’s “Red Star OS” Implements Censorship

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is based on Fedora Linux but …

How To: Configure Windows 10 Privacy Settings

Privacy concerns in Windows 10 have spawned a number of apps designed to improve privacy in Microsoft’s operating system. Here’s a list of several apps you can use to help stop Windows 10 from collecting private information about you and sending it to Microsoft. You can, of course, configure privacy settings on Windows 10 manually. But the following apps aim …