time

Pros and Cons of Tor, VPNs, Proxies and More

Tor, VPNs, Web proxies and other strategies for circumventing censorship all come with pros and cons. Here’s a list of the advantages and disadvantages of various methods for accessing blocked websites. Tor Pros: Free of cost. Difficult for censorship authorities to block. Relatively easy to install if using the Tor browser. Cons: Usually only works …

Pros and Cons of Tor, VPNs, Proxies and More Read More »

PrivaTegrity Promises Better, Faster Online Privacy than Tor

What if there were an online privacy solution that was much faster than Tor and, unlike VPNs, allowed no single third party to read encrypted information? That’s what David Chaum, an Internet security and privacy veteran, aims to implement through a new type of mixed network called PrivaTegrity. PrivaTegrity is designed to work somewhat like …

PrivaTegrity Promises Better, Faster Online Privacy than Tor Read More »

SLOTH Attacks Weaken HTTPS Privacy

Security vulnerabilities based on the MD5 hashing function make it possible to decrypt network data or impersonate servers in order to steal private information, according to researchers from the INRIA institute in France. MD5 is a cryptographic hash function. That means it translates data into a “hash,” or jumbled piece of information. In theory, the …

SLOTH Attacks Weaken HTTPS Privacy Read More »

How To: Configure Windows 10 Privacy Settings

Privacy concerns in Windows 10 have spawned a number of apps designed to improve privacy in Microsoft’s operating system. Here’s a list of several apps you can use to help stop Windows 10 from collecting private information about you and sending it to Microsoft. You can, of course, configure privacy settings on Windows 10 manually. …

How To: Configure Windows 10 Privacy Settings Read More »

Scroll to Top