327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

40

The Best VPN Routers Of 2020

A VPN-capable router is a convenient device — it can provide VPN connections to your computers and mobile devices via Wi-Fi. You won’t have to install a VPN client on each device. Instead, all your devices are routed via one connection to your VPN provider.

Ivacy: A VPN Provider Based In Singapore

Ivacy is a VPN provider founded in 2007 and based in Singapore. This provider is active on social media and readily responds to support questions (via email, live chat and a ticketing system).

1

How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

pCloud: A Cloud Provider That Offers Encrypted And Non-Encrypted Folders

pCloud is a secure cloud provider. The name is a bit unfortunate, but I’ve found their service to be reliable and well designed. pCloud is the first cloud storage provider to offer both encrypted and non-encrypted folders in the same account. The company explains why this makes sense: Although at first thought it is the most natural approach to just …

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

VPN News and Updates

ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations. NordVPN has added 11 new servers. This company has a stringent no-logs policy, great speeds and reliable service. It is based in Panama. See our full review. PandaPow has released …

How To: Use Email Privately without Being Tracked

Virtually everyone needs an email account. Yet keeping emails private and secure is challenging because, by design, email identifies the sender. You also can’t protect emails from tracking with privacy tools like Tor or VPN. But that doesn’t mean there aren’t things you can do to protect your email privacy. Here are our tips for secure email: If possible, use …

Which VPN Protocol Should You Use? PPTP vs. OpenVPN vs. IPsec

All VPNs encrypt traffic, but the underlying encryption schemes are not always the same. There are three main types of encryption and data transfer protocols that VPNs can use: PPTP, OpenVPN and IPsec. Many VPN services let you choose which protocol to use. Read on for an overview of each option. PPTP PPTP is one of the oldest forms of …

1

How To: Perform Private Searches Online

Performing online searches using major search engines is a big privacy risk. Here are a few alternative search engines that allow you to search without being tracked. Search engines like Google, Bing and Yahoo! track you in various ways. If you have an account with them, they can correlate your searches with other details you reveal about yourself. And even …

How To: Check That Your VPN is Working

How do you make sure your VPN is actually running — and not leaking data — after you log in? Here are quick and simple steps for checking. Most people probably assume that their VPN “just works” once they launch it. But in certain cases, it may not be. Just because the client program that your VPN provider gives you …

Using Anonymous Remailers for Email Privacy

Want to send email anonymously? Anonymous remailers provide a solution. Here’s an overview of how they work and where to access them. You can gain some privacy in email by using a provider that doesn’t track you. But that’s different from hiding your identity from the recipient. Anonymous remailers make it possible to obfuscate your identity when sending email. They …

CacheBrowser Offers New Method for Beating Internet Censorship

Two American professors say they have a new, virtually foolproof way to beat Internet censorship using a tool they call CacheBrowser, which they promise to be especially effective against censorship in China. The professors, John Holowczak and Amir Houmansadr, describe the tool in a paper published earlier this year. As they explain, their technique for circumventing censorship centers on leveraging …

Court Rejects Censorship of Pirate Bay BitTorrent Hosting Site

The Pirate Bay, one of the world’s most popular BitTorrent indexing sites, won’t be censored in its own country — at least for now — according to a recent decision by a Swedish court. The site, which launched in 2003, is based in Sweden. It is already censored in numerous other countries, primarily in response to allegations that it permits …