rgl7194 + vpn   128

Free VPN App Investigation
Over half of the most popular free VPN apps are run by secretive companies with hidden Chinese ownership. Very few do enough to earn the trust of the privacy-conscious.
After the big names like Facebook and Snapchat and games, VPNs are the most searched-for apps in the world. The most popular have amassed hundreds of millions of installs between them worldwide and yet there appears to be little vetting of the companies entrusted with the responsibility for redirecting all their users’ internet traffic through their servers.
A VPN or Virtual Private Network encrypts a user’s internet connection and diverts their traffic via a remote server in order to replace their IP address. They are primarily used to keep internet activity private, evade censorship and use public WiFi securely.
Free VPN apps are often the first port of call for users suffering from censorship or an internet shutdown. In these situations, it’s common for users to download the first VPN that appears in the search results, assuming that a large number of downloads or a place in the app store means the application is safe and legitimate. This is far from the truth.
vpn  top_ten  free  security  privacy  review 
4 weeks ago by rgl7194
Beware of the Free VPN — MacSparky
The Top10VPN website has an interesting examination of free VPN applications (via Josh Centers at Tidbits). I have never used a free VPN (Virtual Private Network) service because I always suspected they weren't quite on the up and up. It appears my instincts on this are good. When it comes to Internet security, nothing is free.
vpn  top_ten  free  security  privacy 
4 weeks ago by rgl7194
Introducing Guardian Firewall for iOS - Guardian Firewall
Team Guardian Firewall
2019-06-11
Guardian Firewall will be available in the App Store starting June 14 for those who pre-ordered, and will be available to the general public in July. The cost is $9.99/month (or $99.99 per year) for VPN + Firewall capabilities. VPN-only service will be available at no cost.
Follow @guardianiosapp on Twitter
Starting over 2 years ago, we embarked on an ambitious mission: Build a tool that allows any electronic device owner in the world to take back control of their digital privacy. This tool needed to be incredibly easy to use, straightforward, and must allow a user to “set it and forget it” if they did not want to apply any customizations.
We could have cut plenty of corners and shipped an acceptable tool. Instead we took our time and did things right, putting together the most powerful tool and dataset we were capable of building. Why? Because we are working towards a broader set of goals: Make surveillance capitalism an untenable business model. Degrade the quality of shadow profiles maintained on every user of an internet connected device. Methodically expose every bad actor we can find. The electronic devices you bought and own should not be snitching on you at regular intervals. Something has gone very wrong, and the course must be corrected to prevent pervasive data collection from becoming an acceptable norm. It’s time for war. No stone will be left unturned.
Thousands of hours and a 5 month back-and-forth with Apple’s App Review team later, this mission has resulted in our creation of the first real firewall for iOS devices. Managed by a unique dataset that is the result of our continuous and exhaustive in-house research, Guardian Firewall updates instantaneously as we discover new threats to ensure that you don’t have to do any work at all. We will find threats before they can find you.
For the lifetime of our company, Guardian Firewall will utilize a simple tried-and-true business model: Accepting currency for a product that people find valuable. Full stop. We will never track our users. We will never collect personal information about our users. We consider user data to be a liability. Each and every technical design decision is built around that concept.
privacy  security  firewall  ios  apps  vpn 
5 weeks ago by rgl7194
Apple says it’s banning Facebook’s research app that collects users’ personal information - Recode
Facebook will stop its “market research” program that was paying users in exchange for their mobile data.
Facebook is at the center of another privacy scandal — and this time it hasn’t just angered users. It has also angered Apple.
The short version: Apple says Facebook broke an agreement it made with Apple by publishing a “research” app for iPhone users that allowed the social giant to collect all kinds of personal data about those users, TechCrunch reported Tuesday. The app allowed Facebook to track users’ app history, their private messages, and their location data. Facebook’s research effort reportedly targeted users as young as 13 years old.
As of last summer, apps that collect that kind of data are against Apple’s privacy guidelines. That means Facebook couldn’t make this research app available through the App Store, which would have required Apple approval.
Instead, Facebook apparently took advantage of Apple’s “Developer Enterprise Program,” which lets approved Apple partners, like Facebook, test and distribute apps specifically for their own employees. In those cases, the employees can use third-party services to download beta versions of apps that aren’t available to the general public.
Apple doesn’t review and approve these apps the way it does for the App Store because they’re only supposed to be downloaded by employees who work for the app’s creator.
Facebook, though, used this program to pay non-employees as much as $20 per month to download the research app without Apple’s knowledge.
facebook  vpn  security  privacy  data  teenager  ios  location_services  apps  developer 
february 2019 by rgl7194
Daring Fireball: Apple Revoked Facebook's Enterprise Developer Certificates
Kurt Wagner, reporting for Recode:
Apple’s response, via a PR rep this morning: “We designed our Enterprise Developer Program solely for the internal distribution of apps within an organization. Facebook has been using their membership to distribute a data-collecting app to consumers, which is a clear breach of their agreement with Apple. Any developer using their enterprise certificates to distribute apps to consumers will have their certificates revoked, which is what we did in this case to protect our users and their data.”
Translation: Apple won’t let Facebook distribute the app anymore — a fact that Apple likely communicated to Facebook on Tuesday evening. Apple’s statement also mentions that Facebook’s “certificates” — plural — have been revoked. That implies Facebook cannot distribute other apps to employees through this developer program right now, not just the research app.
Alex Heath:
This is incredible: None of Facebook’s internal iOS apps/betas (used by thousands of employees) are working right now because Apple just revoked the company’s certificate. They won’t open.
For employees to use Facebook products on iOS they have to go download from the App Store.
Someone is (rightly) pissed.
facebook  vpn  security  privacy  data  teenager  ios  daring_fireball  location_services  apps  developer 
february 2019 by rgl7194
Apple bans Facebook’s Research app that paid users for data | TechCrunch
In the wake of TechCrunch’s investigation yesterday, Apple blocked Facebook’s Research VPN app before the social network could voluntarily shut it down. The Research app asked users for root network access to all data passing through their phone in exchange for $20 per month. Apple tells TechCrunch that yesterday evening it revoked the Enterprise Certificate that allows Facebook to distribute the Research app without going through the App Store. This not only breaks the Research app, but all of Facebook’s internal-use employee apps for collaboration and logistics too, from workplace chat to the lunch menu.
TechCrunch had reported that Facebook was breaking Apple’s policy that the Enterprise system is only for distributing internal corporate apps to employees, not paid external testers. That was actually before Facebook released a statement last night saying that it had shut down the iOS version of the Research program without mentioning that it was forced by Apple to do so.
facebook  vpn  security  privacy  data  teenager  ios  location_services  apps  developer 
february 2019 by rgl7194
Facebook pays teens to install VPN that spies on them | TechCrunch
Desperate for data on its competitors, Facebook has been secretly paying people to install a “Facebook Research” VPN that lets the company suck in all of a user’s phone and web activity, similar to Facebook’s Onavo Protect app that Apple banned in June and that was removed in August. Facebook sidesteps the App Store and rewards teenagers and adults to download the Research app and give it root access to network traffic in what may be a violation of Apple policy so the social network can decrypt and analyze their phone activity, a TechCrunch investigation confirms.
Facebook admitted to TechCrunch it was running the Research program to gather data on usage habits.
Since 2016, Facebook has been paying users ages 13 to 35 up to $20 per month plus referral fees to sell their privacy by installing the iOS or Android “Facebook Research” app. Facebook even asked users to screenshot their Amazon order history page. The program is administered through beta testing services Applause, BetaBound and uTest to cloak Facebook’s involvement, and is referred to in some documentation as “Project Atlas” — a fitting name for Facebook’s effort to map new trends and rivals around the globe.
Seven hours after this story was published, Facebook told TechCrunch it would shut down the iOS version of its Research app in the wake of our report. But on Wednesday morning, an Apple spokesperson confirmed that Facebook violated its policies, and it had blocked Facebook’s Research app on Tuesday before the social network seemingly pulled it voluntarily (without mentioning it was forced to do so). You can read our full report on the development here.
facebook  vpn  security  privacy  data  teenager  ios  location_services  apps  developer 
february 2019 by rgl7194
Daring Fireball: TechCrunch: Facebook Pays Teenagers to Install VPN That Spies on Them
...What apps you’re using, all of your network data, your location — Facebook takes all of it with this app. (Strafach is tweeting up a storm tonight on this story.)
Genuinely interested to see how Apple responds to this. To my eyes, this action constitutes Facebook declaring war on Apple’s iOS privacy protections. I don’t think it would be out of line for Apple to revoke Facebook’s developer certificate, maybe even pull their apps from the App Store. No regular developer would get away with this. Facebook is betting that their apps are too popular, that they can do what they want and Apple has to sit back and take it. I keep saying Facebook is a criminal enterprise, and I’m not exaggerating. Sometimes a bully needs to be punched in the face, not just told to knock it off.
facebook  vpn  security  privacy  data  teenager  ios  daring_fireball  location_services  apps  developer 
february 2019 by rgl7194
Security Checklist
About
This website provides a beginner’s checklist for staying safe on the internet. This website is the result of a conversation started during a recent episode of the Design Details Podcast and a subsequent tweet by Michael Knepprath.
The code that powers this website is open source. Please contribute if you’d like to see additional resources added to this checklist.
security  privacy  internet  passwords  2FA  encryption  credit_freeze  DNS  vpn  browser  search  email  camera  location_services  metadata  social_media  messaging  phishing 
january 2019 by rgl7194
Tips and Rumors About Avoiding The Chinese Firewall (January 2019) - GreyCoder
I’ve collected these tips and rumors about the Chinese Great Firewall.
A few things to remember overall:
Servers in Japan and the U.S. are most frequently blocked, Hong Kong is blocked less, and servers in Canada, Europe and Russia are almost never blocked
Firewall restrictions vary from region to region in China
Some restrictions vary from carrier to carrier, and from ISP to ISP
Methods of obfuscation that work last year will not always work this year
Advice on the Firewall from “Phoebe Cross”...
security  privacy  internet  china  censorship  vpn  anonymity 
january 2019 by rgl7194
iPhone Privacy: How to lock down and delete threats to your online information
'Privacy now is like security in the days of Windows XP. No one cared about it until everyone cared about it.'
Privacy, like security, is continuously at war with convenience. The internet and app stores are filled with "free" products that will do amazing things for your productivity and entertainment, all in exchange for as much of your private, personal data as they can convince you to give them. That includes scanning your messages, tracking your location, uploading your contacts, copying all your photos, mapping all your relationships, and otherwise building as complete a model for you and your life as possible.
You might think that's great. You have nothing to hide so if Facebook or Google or government agencies or even casual observers know everything about you, who cares? You're getting a ton of valuable stuff essentially at no cost to you. If that's you, just keep doing you.
Or, you might think, you can always make more money but you can never get your private messages and photos back, or restore your dignity in the age of privacy breaches, abuses, and continuous data grabs. Whether it's the Cambridge Analytica scandal or the ongoing Google tracking issues, if you want to lock down just how much these companies can look up on you, I've got some tips that can help.
Now, just to be clear, these aren't security tips. I'll cover those in another column. These are privacy tips. They're ways to make sure people and companies learn as little as possible about you, while you still get the most you can from them. Cool?
iphone  privacy  security  tracking  do_not_track  browser  vpn  google  facebook  prefs 
january 2019 by rgl7194
Checklist 108: Hotel Wi-Fi How-To - SecureMac
This week on The Checklist, we’re going on vacation! No, wait — it’s a business trip. Maybe… the house is being fumigated! Whatever the reason is, we have to check into a hotel, leaving our home network behind. Good news, though: the hotel has free Wi-Fi for us to use! The bad news: we weren’t the ones to set up the security for the hotel’s wireless network. We don’t know who’s staying in the room next door, or what they might be up to… and then to top it all off; we see a message on our computer saying that our current Wi-Fi network connection “exposes all traffic.” What’s a traveler to do?
A few weeks ago, we received an email from a listener, John, filled with questions and concerns about logging into hotel Wi-Fi. John raised a lot of interesting concerns, and it occurred to us that he was probably not the only person wondering these things. Sure, people who travel for business all the time might have these things perfectly understood, but for the rest of us, the occasional trip to a hotel can leave us with some concerns about safe browsing. This week, our checklist consists of John’s many questions — and our answers.
Let’s kick things off with some information about that scary-sounding message you might see on your Mac after you connect to not just a hotel’s Wi-Fi network, but any public Wi-Fi network.
wi-fi  security  privacy  travel  podcast  vpn 
january 2019 by rgl7194
My Must-Have Mac Apps, 2018 Edition – MacStories
Last year when I wrote about my must-have Mac apps, I was coming off a tumultuous year that started with a daily commute into Chicago for my old job and ended with me working from home. As the year came to a close, I was exploring what that meant for the way I work on the Mac.
That process continued into 2018. With the number of new things I took on in 2017 and the transition to indie life, I made the conscious decision to step back and settle into my new life. That wasn’t easy. There’s a natural tendency to take on everything that crosses your path when you go out on your own, but I’ve seen too many people fall into that trap in the past. Instead, I concluded that 2018 would be the year to improve the way I already work by refining existing workflows and reevaluating how I get things done, including on the Mac.
Three events led me to work on my Mac more in 2018. The first was the 27-inch LG 4K display I bought in January. It was a big step up from the 23-inch 1080p one I had before and, combined with a VESA arm, improved working at my Mac substantially.
The second factor was our MacStories coverage of the App Store’s tenth anniversary. For it, we produced seven extra episodes of AppStories that were released in the span of one week, which kept me in front of my Mac recording and editing for long periods of late May through June.
mac  apps  writing  research  RSS  productivity  grammar  messaging  audio  editing  calendar  mind_mapping  slack  email  twitter  emoji  photo  server  mkv  handbrake  plex  utilities  menubar  backup  statistics  vpn  1password  remote  dropbox 
december 2018 by rgl7194
Account takeover fraud: 7 tips to make you less vulnerable
Editor's note: Naples (Florida) Daily News columnist and professional organizer Marla Ottenstein has been through a harrowing, expensive and life-changing experience since she was "hacked" last summer. She's sharing some of her insights and the lessons she's learned.
Shame on me, one of the most organized and security-conscious people you’ll ever meet, for logging onto the unsecured Wi-Fi at Miami International Airport last summer. I knew it was the wrong thing to do, but feeling impervious to hackers and somewhat cavalier, I figured: What could happen in 15 minutes.
It turns out a lot can happen. The criminals hijacked my email and my mobile accounts and tried (unsuccessfully) to take over my Apple account, and that was just the beginning.
security  privacy  wi-fi  vpn  2FA  passwords  credit_freeze  USB  charger 
december 2018 by rgl7194
Bad Consumer Security Advice - Schneier on Security
There are lots of articles about there telling people how to better secure their computers and online accounts. While I agree with some of it, this article contains some particularly bad advice:
1. Never, ever, ever use public (unsecured) Wi-Fi such as the Wi-Fi in a café, hotel or airport. To remain anonymous and secure on the Internet, invest in a Virtual Private Network account, but remember, the bad guys are very smart, so by the time this column runs, they may have figured out a way to hack into a VPN.
I get that unsecured Wi-Fi is a risk, but does anyone actually follow this advice? I think twice about accessing my online bank account from a pubic Wi-Fi network, and I do use a VPN regularly. But I can't imagine offering this as advice to the general public.
security  privacy  wi-fi  vpn  2FA  passwords  credit_freeze  USB  charger 
december 2018 by rgl7194
WireGuard: fast, modern, secure VPN tunnel
WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. Initially released for the Linux kernel, it is now cross-platform and widely deployable. It is currently under heavy development, but already it might be regarded as the most secure, easiest to use, and simplest VPN solution in the industry.
security  vpn  linux  privacy  encryption 
august 2018 by rgl7194
WireGuard VPN review: A new type of VPN offers serious advantages | Ars Technica
Fewer lines of code, simpler setup, and better algorithms make a strong case.
WireGuard is a new type of VPN which aims to be simpler to set up and maintain than current VPNs and to offer a higher degree of security. The software is free and open source—it's licensed GPLv2, the same license as the Linux kernel—which is always a big plus in my book. It's also designed to be easily portable between operating systems. All of that might lead you to ask: in a world that already has IPSEC, PPTP, L2TP, OpenVPN, and a bewildering array of proprietary SSL VPNs, do we need yet another type of VPN?
OK, but why?
I've seen a few new VPN designs pop up in the last few years—ZeroTier and Tinc come to mind—and each time, I've thought, "I should really look into that." And then I haven't. I use OpenVPN heavily; I'm thoroughly familiar with it, and it scratches most of my VPN-related itches pretty well.
So how did WireGuard rattle my cage hard enough to get me to actually play with it? It had something you almost never see: a positive comment about its code from none other than Linus Torvalds.
Can I just once again state my love for [WireGuard] and hope it gets merged soon? Maybe the code isn't perfect, but I've skimmed it, and compared to the horrors that are OpenVPN and IPSec, it's a work of art.
Linus Torvalds, on the Linux Kernel Mailing List
That was enough to get me to sit up and pay attention. If you think "maybe it isn't perfect, but" is damning with faint praise, you clearly aren't familiar with Torvalds' acerbic writing style.
vpn  security  privacy  encryption  linux 
august 2018 by rgl7194
Privacy Now: How to lock down and delete threats to your online information | iMore
'Privacy now is like security in the days of Windows XP. No one cared about it until everyone cared about it.'
Privacy, like security, is continuously at war with convenience. The internet and app stores are filled with "free" products that will do amazing things for your productivity and entertainment, all in exchange for as much of your private, personal data as they can convince you to give them. That includes scanning your messages, tracking your location, uploading your contacts, copying all your photos, mapping all your relationships, and otherwise building as complete a model for you and your life as possible.
You might think that's great. You have nothing to hide so if Facebook or Google or government agencies or even casual observers know everything about you, who cares? You're getting a ton of valuable stuff essentially at no cost to you. If that's you, just keep doing you.
Or, you might think, you can always make more money but you can never get your private messages and photos back, or restore your dignity in the age of privacy breaches, abuses, and continuous data grabs. Whether it's the Cambridge Analytica scandal or the ongoing Google tracking issues, if you want to lock down just how much these companies can look up on you, I've got some tips that can help.
Now, just to be clear, these aren't security tips. I'll cover those in another column. These are privacy tips. They're ways to make sure people and companies learn as little as possible about you, while you still get the most you can from them. Cool?
privacy  security  homescreen  tracking  browser  vpn  google  facebook  prefs 
august 2018 by rgl7194
Uses This / Tiffany Taylor
Who are you, and what do you do?
My name is is Tiffany and I am product designer. As a multidisciplinary designer, I do a range of things like user experience design, user interface design, visual design, user research, and user testing. I currently work for Versus Systems in LA, but I also do a little bit of freelance design work when I can find exciting projects. I also had a past life as a front-end developer but I rarely code much now, outside of my personal site or side projects. And I like to do photography and illustrate on the side, mostly for fun.
setup  imac  MBP  google  smartphone  camera  games  vpn  photo  editing  instagram 
august 2018 by rgl7194
Do You Take Your VPN Security Seriously? - TorrentFreak
Millions of people use a VPN service to prevent outsiders from monitoring their browsing habits or other Internet traffic. Choosing a good and reliable VPN provider is a good start, but there is more to it than that. People have a responsibility of their own and should hold their VPNs accountable.
In recent years there has been a massive boom in VPN usage, spurred on by security breaches and privacy leaks.
While prospective VPN users pay a lot of attention to the various policies VPN providers have when it comes to logging or leak protection, the user’s own responsibility is often entirely ignored.
vpn  privacy  security  anonymity 
may 2018 by rgl7194
The Best VPN Service: Reviews by Wirecutter | A New York Times Company
We spent more than 130 hours over four months researching 32 VPN services, testing 12, interviewing the leadership of five, and consulting information security and legal experts about our results. We found that most people should prioritize other security tools and privacy practices first, but in the cases where a VPN makes sense—such as when you’re connecting to public Wi-Fi—IVPN is the most trustworthy provider that offers fast, secure connections with an easy setup process on both computers and mobile devices.
Our pick
IVPN
Security we trust
This is the most trustworthy VPN provider we found, with fast, secure connections, easy-to-use applications on every major platform, and helpful support.
$100 from IVPN
(per year)
IVPN excels at trust and transparency, the most important factors when you’re choosing a virtual private network. The company publicly displays information about its leadership team so you know who you’re trusting with your online activity. After interviewing IVPN’s CEO about the company’s internal procedures, we’re convinced that the team is dedicated to its promises not to monitor or log customer activity. But a trustworthy VPN is only as good as its connections, and in our tests IVPN was stable and fast, with very few exceptions. IVPN defaults to secure connections with the OpenVPN protocol on Windows, macOS, and Android, plus a few other platforms. Its apps are easy to set up and use, and they’re secure even if you use the default settings. (We don’t recommend any VPN service’s native app for iOS, but IVPN has options for Apple devices, too.) And you can make IVPN even better with two clicks: one to enable IVPN’s “firewall,” a kill switch to stop traffic when you aren’t protected, and one to auto-connect IVPN when you’re joining unsecured Wi-Fi networks. Even though IVPN is more expensive than some competitors, we found it to be worth the price for its combination of trust, security, and usability.
vpn  privacy  security  wirecutter  comparo  review 
april 2018 by rgl7194
Intego Mac Podcast: How to Not Get Scammed Online
We look at the ten most common online scams, and explain how to avoid them. And we mention the fact that Apple has updated everything this week.
Apple Issues New Security Updates, Patches APFS Volume Password Bug
Top 10 Online Scams: Watch Out For These Common Red Flags
Episode #12: What to Do if You’ve Been Hacked
How Apple and Amazon Security Flaws Led to My Epic Hacking
How to Choose and Answer Security Questions
Type a URL Wrong, and You Might End up with Malware on Your Mac
Episode #14: What's Up with My iPhone's Battery?
Episode #15: What's a VPN, and Why Should You Use One?
Why You Should Connect to a VPN on Mac and iOS — and How To
podcast  mac  security  privacy  scam  hack  vpn  URL  q&a 
april 2018 by rgl7194
Many VPN Providers Leak Customer's IP Address via WebRTC Bug
Around 20% of today's top VPN solutions are leaking the customer's IP address via a WebRTC bug known since January 2015, and which apparently some VPN providers have never heard of.
The discovery belongs to Paolo Stagno, a security researcher who goes by the pseudonym of VoidSec, and who recently audited 83 VPN apps on this old WebRTC IP leak.
Stagno says he found that 17 VPN clients were leaking the user's IP address while surfing the web via a browser.
The researcher published his results in a Google Docs spreadsheet. The audit list is incomplete because Stagno didn't have the financial resources to test all commercial VPN clients.
The researcher is now asking the community to test their own VPN clients and send him the results. For this, he set up a demo web page that users must access in their browser with their VPN client enabled. The code running on this page is also available on GitHub, if users want to test the leak locally, without exposing their IP on somebody else's server.
privacy  security  vpn  bug  test 
march 2018 by rgl7194
Uses This / Brodie Lancaster
Who are you, and what do you do?
I'm Brodie Lancaster, a writer and editor. On a good day I call myself a critic too.
I started my ~career~ at 20 as the managing editor of Portable TV, a culture website that no longer exists. I self-published and edited the zine Filmme Fatales for a few years. It was an unpretentious publication about women and film. I did interviews and ran comics and jokes and poems and short stories, but didn't do reviews. I like to think you'd get as much out of reading the first issue (written in 2012, released in 2013) now as you would've on its release. I made eight issues, and it's been a year since I put it on pause indefinitely.
setup  iphone  macbook  ipad  ipod  dropbox  productivity  google  facebook  web-dev  slack  vpn  netflix  audio  photo  video  editing  itunes  spotify  email  messaging  twitter  weather  banking  instagram  podcast  instapaper  health 
march 2018 by rgl7194
Centralised Place For Privacy Resources
Feel free to contact me on Twitter - David
Make sure the Applications, Services or Anything else listed below complies with your Local Laws before use. Thanks.
This’ll be a centralised place where I link to Privacy related Resources, I may provide a small description and Resources may range from VPN’s, to Password Managers to Bullet Proof Hosting.
privacy  vpn  email  messaging  encryption  malware  browser 
march 2018 by rgl7194
Encrypt.me blog: Private VPN Endpoints for Family & Teams
Finally, a VPN has been built for the professionals or the (justifiably) paranoid. The team at Encrypt.me is excited to introduce our Private VPN Endpoints for Family & Teams (and soon, all accounts!). Private Endpoints are hosted on AWS Compute instances and are available in most of the AWS regions worldwide. We’ve made much of the Private Endpoint code open-source, and you’re able to host your endpoint in your home, office, or datacenter. You will find the open-source code on GitHub.
Why did we build Private Endpoints?
We have always focused on privacy. Our goal is not only to provide anonymity and shield you from any criminal activity but also to offer you privacy when you are on public Wi-Fi. To achieve complete privacy, having your very own endpoint is a must. Encrypt.me private endpoints are based on our public endpoint code and have been adapted to be built on Docker images.
vpn  privacy  security  anonymity  wi-fi  encryption 
february 2018 by rgl7194
Your DNS settings may be giving up your privacy | iMore
Make certain you're not leaking private info via your DNS. Here's how!
We've spoken about the merits of having a VPN (virtual private network) to protect your privacy and secure your connections when online. If you have a VPN service running on your local device, all of the data (so long as you're routing all of the data through the VPN) is encrypted from your device to the VPN server. Depending on the VPN provider, your data afterwards can be anonymized, since anyone "listening" to the traffic coming in and out of the VPN server would see a din of data with the origin and destination being the IP of the VPN server. Not your true IP.
What is DNS?
DNS stands for Domain Name Service. The nutshell explanation is that it performs the translation from human-friendly URL names (like www.imore.com) to internet service computer destinations called IP (internet protocol) addresses. Think of it like your phone contacts. When you enter contact information for Sally, you add her name, address, and phone number. You needn't memorize the number any longer. You can now tell Siri to phone Sally, and Siri will know the proper phone number to call. Although simplified vastly, DNS in effect works the same way. You don't need to know imore.com's IP address when you visit. You just need to type in the name and off you go.
DNS  security  privacy  vpn 
november 2017 by rgl7194
PureVPN Explains How it Helped the FBI Catch a Cyberstalker - TorrentFreak
After several days of radio silence, VPN provider PureVPN has responded to criticism that it provided information which helped the FBI catch a cyberstalker. In a fairly lengthy post, the company reiterates that it never logs user activity. What it does do, however, is log the IP addresses of users accessing its service.
Early October, Ryan S. Lin, 24, of Newton, Massachusetts, was arrested on suspicion of conducting “an extensive cyberstalking campaign” against a 24-year-old Massachusetts woman, as well as her family members and friends.
The Department of Justice described Lin’s offenses as a “multi-faceted” computer hacking and cyberstalking campaign. Launched in April 2016 when he began hacking into the victim’s online accounts, Lin allegedly obtained personal photographs and sensitive information about her medical and sexual histories and distributed that information to hundreds of other people.
vpn  privacy  security  FBI  anonymity  crime 
october 2017 by rgl7194
The Best VPN Service Providers Of 2017 - GreyCoder
There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy. I also research actual customer feedback posted in online forums.
These providers are the best VPN providers overall — these providers offer fast servers around the world, reliable apps, and a dedication to privacy:
ExpressVPN (based in the British Virgin Islands)
IPVanish (based in the USA)
vpn  security  privacy  anonymity  comparo  review 
october 2017 by rgl7194
What is a VPN and why should I get one for my NAS? – NAS Compares
What is a VPN and why should I get one for my Synology or QNAP NAS?
The internet is not the place it once was! Thanks to the likes of the Net Neutrality bill and Internet service providers (ISPs) now having free access to your searches and online behaviour (worth a fortune in it’s marketing and trend analysis alone), the internet is no longer a place where you just surf the web, care free. Don’t think that just using Incognito mode will protect you, that is just a local disguise and one that limits cookies, browser history and search lists. Everything you do and every website you visit from your home internet, Coffee shop WiFi and 4G Mobile phone provider is visible, trackable and most importantly if all, controllable by both your ISP and the website owners. In this way your online behaviour can be controlled and monitored in these ways...
NAS  storage  vpn  privacy  security  anonymity 
august 2017 by rgl7194
Home Screens - Sal Soghoian — MacSparky
This week I’ll be up in San Jose speaking at the CMD-D: Masters of Automation conference. The reason this remarkable conference is happening at all is because of the hard work of Sal Soghoian (website), former head of automation at Apple. The conference is all about automating the Mac and iOS and tickets are still available. Now that Sal is no longer with the giant fruit company, I asked him to share his home screen and he agreed. So Sal, show us your home screen.
homescreen  iphone  privacy  vpn  signal  workflow  games  news 
august 2017 by rgl7194
All My Recommendations (Updated August 2017) - GreyCoder
I recommend these VPNs for speed & reliability: ExpressVPN, IPVanish
If you are in a censored country like China I recommend: ExpressVPN or VPN.AC
For enhanced privacy or to avoid censorship: AirVPN
This is a reliable DNS leak test: IPX.AC
I recommend these cryptocurrencies: Bitcoin, Monero (untraceable)
For purchasing cryptocurrencies with USD: Coinbase
For coin-to-coin exchange: Shapeshift (instant) or Bitfinex (full exchange)
I recommend this cryptocurrency hardware wallet: Trezor
recommendations  privacy  security  vpn  usenet  bittorrent 
august 2017 by rgl7194
A Guide To Being Private Online - GreyCoder
Privacy on the internet is something we should all seek. Even if you feel you have “nothing to hide” you probably still value having curtain on your windows, and you would probably prefer that your credit card statement not be broadcast to everyone each month.
Here are my tips for maintaining privacy...
security  privacy  search  email  browser  passwords  vpn  forum  messaging  encryption  tracking  networking 
august 2017 by rgl7194
Safer Downloading
Any time you connect to the Internet, you’re running the risk of staying safe. The Internet world is full of hackers, malware, viruses, and other nasty harmful processes that can hurt you and your family. Hackers can steal your identity. Malware and viruses are hidden, undetectable to the naked eye. And downloads are scary.
Especially if you’re downloading on a torrent network.
A torrent network is a file-sharing service where anyone can use the service for free. This peer-to-peer downloading service, or P2P, is great for those wanting faster and easier downloads. Yet, there’s zero anonymity involved. All users can see your IP address, which is like your Social Security number of your Internet connection. That IP address is your unique online identifier, letting others know that you’re online and downloading off the torrent network.
So how do you stay safe when downloading? What are the steps you should take before you download malicious content?
bittorrent  download  safety  security  privacy  malware  anonymity  vpn  tor 
august 2017 by rgl7194
Question about security and safety of using usenet ?
Secure and anonymous Usenet and Newsgroups?
More and more frequently people ask us about the security level of exchanges within newsgroups. And about Usenet anonymity: is it guaranteed? In fact for several years now, this desire for anonymity, for confidentiality and security has increased to match the growing legislation and impression of control over the internet (see the proposed laws ACTA -SOPA - PIPA, DPI, QOS....)
Therefore anonymity and secure exchanges are clearly important factors in deciding on a network. Usenet is by nature well protected and has been for a long time, Newsgroups are generally seen as secure since the only people who know what you're downloading are you. This implies a decentralised network and so a total absence of central an primary servers, the status of providers to usenet access (common carrier service provider) and the existence of SSL.
usenet  security  privacy  vpn  anonymity 
august 2017 by rgl7194
Mac Power Users #386: Must Have Utilities - Relay FM
Katie and David share some of their favorite utilities for Mac users.
Links and Show Notes
Membership - Relay FM
Facebook: What Utilities are "must have"?
Amphetamine on the Mac App Store
Amazon.com: Wemo Mini Smart Plu
CleanMyMac 3: The Best Mac Cleanup App for OS X
Bartender 2 | Mac Menu Bar Item Control
Default Folder X
Cloak VPN - Cloak - Super-simple VPN
iStat Menus
Reflector 2 Mac Features | Mirror, stream, record and more.
Aptonic - Dropzone 3
The Best Unlimited Online Backup and Cloud Storage Services
Gemini 2: The Best Duplicate File Finder for Mac. Smart selection and fast scan.
FruitJuice -- battery maintenance app for Apple Mac laptop computers. —
Copied - A Full Featured Clipboard Manager for iOS and macOS
EasyEnvelopes | Ambrosia Software, Inc.
PopClip for Mac
Contacts Cleaner on the Mac App Store
Renamer - batch file renamer for Mac
Grammarly
Screens for Mac
Unclutter - Files, Notes and Clipboard Manager for Mac
Cocoatech – Makers of Path Finder
Mac Backup Software | Carbon Copy Cloner | Bombich Software
Forecast Bar - Weather, Radar and Alerts on the Mac App Store
Setapp | Your shortcut to get the best apps for Mac
Titanium Software - OnyX
Interact Scratchpad - Convert Text to Contacts! on the Mac App Store
Home | TripMode | Your mobile data savior.
HoudahSpot — Powerful File Search Tool for Mac
ChronoSync Overview | Mac Sync | Mac Backup | Bootable | Clone | Cloud Storage | Econ Technologies
TextSoap - Automate Your Text Cleanup
1Password
Photo Privacy on the Mac App Store
WiFi Explorer on the Mac App Store
Marked 2 - Smarter tools for smarter writers
CMD-D|Masters of Automation
MPU  podcast  utilities  review  menubar  vpn  backup  1password 
july 2017 by rgl7194
Brian Hendrix's Mac setup – The Sweet Setup
Who are you and what do you do?
My name is Brian Hendrix, and I’m a U.S. Air Force veteran having served for eight years in the medical field in Radiology and Nuclear Medicine. My father also served for 20 years. I also met my wife while serving — she was in the U.S. Army in military intelligence.
Being raised in the military and serving has definitely defined a lot of how I work and think. I am now a Senior Technical Engineer for Ascension Health (largest not-for-profit healthcare system in the U.S.). I work on a national team so I’m 100% “work-from-home” and coffee house!
What is your current setup?
My day starts Windows 7 in Parallels on my left 27-inch screen, and I will work 10-12 hours taking care of emails, tickets, and servers for my out-of-state sites. The Windows 7 VM is a very basic setup using Office.
setup  mac  windows  email  backup  security  macbook  iphone7  passwords  vpn 
july 2017 by rgl7194
Here’s How to Protect Your Privacy From Your Internet Service Provider | Electronic Frontier Foundation
We pay our monthly Internet bill to be able to access the Internet. We don’t pay it to give our Internet service provider (ISP) a chance to collect and sell our private data to make more money. This was apparently lost on congressional Republicans as they voted to strip their constituents of their privacy. Even though our elected representatives have failed us, there are technical measures we can take to protect our privacy from ISPs.
Bear in mind that these measures aren’t a replacement for the privacy rules that were repealed or would protect our privacy completely, but they will certainly help.
security  privacy  vpn  internet  ISP  do_not_track  cookies  HTTP/S  tor 
june 2017 by rgl7194
How to connect to a VPN on your Mac | iMore
How do I use a VPN on my Mac? Let's go over the basics.
You've gone ahead and have decided to get a VPN (Virtual Private Network) service and have chosen a VPN provider that suits your needs. Now what? You connect to it, that's what! And here's how you do it on your Mac.
How does your VPN provider require you to connect to their servers?
There are two main ways of connecting to your VPN service provider. Either by using the macOS built-in networking framework, or by using the VPN provider's own connection application.
vpn  mac  security  privacy 
june 2017 by rgl7194
VPN for dummies ... Or Dads ... Or why it's time to finally take the plunge | iMore
A good VPN isn't as complicated as it used to be, but it's still a pretty big step for a "regular" user to take. It's time to get my family used to it. Their data may depend on it.
Over the past year I've been slowly moving my family to more secure options for their phones and computers. Password managers — to promote the usage of longer and stronger passwords — was the first step. Then we all moved to more secure messaging.
Now it's time for the big one. The one I'd been dreading. VPNs.
I've been using Virtual Private Networks for years, almost exclusively for work, but I was plenty familiar with the principle. While I'm certainly no expert in networking, I wasn't looking forward to trying to explain all this to my wife and kids. And, actually, it's still a work in progress.
101  anonymity  privacy  security  vpn 
may 2017 by rgl7194
How to build your own VPN if you’re (rightfully) wary of commercial options | Ars Technica
While not perfect, either, cloud hosting providers have a better customer data record.
In the wake of this spring's Senate ruling nixing FCC privacy regulations imposed on ISPs, you may be (even more) worried about how your data is used, misused, and abused. There have been a lot of opinions on this topic since, ranging from "the sky is falling" to "move along, citizen, nothing to see here." The fact is, ISPs tend to be pretty unscrupulous, sometimes even ruthless, about how they gather and use their customers' data. You may not be sure how it's a problem if your ISP gives advertisers more info to serve ads you'd like to see—but what about when your ISP literally edits your HTTP traffic, inserting more ads and possibly breaking webpages?
With a Congress that has demonstrated its lack of interest in protecting you from your ISP, and ISPs that have repeatedly demonstrated a "whatever-we-can-get-away-with" attitude toward customers' data privacy and integrity, it may be time to look into how to get your data out from under your ISP's prying eyes and grubby fingers intact. To do that, you'll need a VPN.
security  privacy  vpn 
may 2017 by rgl7194
What to look for when choosing a VPN provider | iMore
How do I go about choosing a Virtual Private Network (VPN) service?
So you've decided that you should start using a Virtual Private Network (VPN) but aren't certain what aspects of a service are important or if it will fit your needs. Here are some things you may want to consider.
security  privacy  vpn  encryption 
may 2017 by rgl7194
Opera Reborn “rethinks” the browser… with integrated WhatsApp and Facebook | Ars Technica
Opera Reborn gets new design, VPN, and ad-blocking (except for Google's ads).
Opera is Reborn! No, literally, the new version of Opera is called Reborn.
The Norwegian browser maker, which was acquired by a Chinese tech company in 2016, has decided that Opera Reborn should focus on an intriguing new feature: the ability to pin Facebook, WhatsApp, and Telegram messaging apps to the left side of the browser. So, instead of tabbing to another browser window to respond to a friend or colleague, the chat window is right there in front of you. There are keyboard shortcuts to switch between multiple chat apps, too.
browser  facebook  whatsapp  design  vpn  adblock 
may 2017 by rgl7194
Network Attached N00bs — Liss is More
I was given, for free, a network attached storage device in 2013. When I got it, frankly, I wasn’t too sure what to do with it, nor what problem in my life was really being solved by it. Nonetheless, I was excited to get a very expensive piece of equipment for free, and figured I’d do something with it.
Nearly four years on, I can’t imagine my computing life without this little box.
A friend asked recently if anyone had any resources for weighing the pros and cons of buying a NAS, and further, how one should set up said NAS. This post is not a definitive guide, but rather, an exploration of what I’ve done. Some of that may work for you. Some may not, and that’s okay.
As with any advice you get on the internet, take it with a copious amount of salt.
NAS  101  backup  archive  photo  storage  video  vpn  download 
may 2017 by rgl7194
Fast, Automatic VPN Generator | Tinfoil Security
What is a VPN?
Read our letter to our friends at Sochi and what pushed us to create this. That was two years ago, but the same concerns apply to the Rio Olympics this year: it's always worth protecting yourself.
We've created a super simple way to install and run a Virtual Private Network (also called a VPN). VPNs are a technique to allow you to securely access the Internet even if you don't trust the connection you're using, whether you're using wireless at a coffee shop, or reading your email from a country which monitors them. VPNs are widely used by security-conscious corporations and government, but they're too painful to set up for everyone else.
We wanted to make it easy, so we created a way to get up and running with a leading open source VPN. It's the ease of use expected by the iPhone generation combined with security which would pass muster at your bank.
vpn  privacy  security 
april 2017 by rgl7194
It's "National Get a VPN Day" in Australia - TorrentFreak
Australia's mandatory data retention scheme comes into effect today, with telecoms providers expected to retain and store their customers' Internet usage metadata. In response, privacy group Digital Rights Watch has declared this event National Get a VPN Day, vowing to equip citizens with the tools they need to avoid surveillance.
For so many years, citizens have believed that what they do online is largely a private matter. Some continue to labor under the misconception that online events are somewhat transient but in many respects the Internet is becoming the network that never forgets.
australia  privacy  security  vpn  gov2.0  digital_rights 
april 2017 by rgl7194
Rolling your own VPN server - Six Colors
With the news that internet service providers may soon start scanning all your personal data and using it to target ads, I decided it was time to investigate setting up a virtual private network (VPN) server. I’ve mentioned this in a couple places, including recently on Clockwise, and had more than a few people asking if I’d document my experience.
Why VPN?
There’s been a lot of talk about VPNs in the wake of this recent news, everything from which provider you should pick to why a VPN doesn’t necessarily solve the problem.
Overall, though it’s true that VPNs can help by encrypting the traffic that flows through your ISP (or whatever network you’re on), they are hardly a panacea. For one thing, VPN traffic is not end-to-end encrypted: it eventually emerges, decrypted, somewhere else. That means a third party—in this case, the company providing your VPN—may still be able to keep an eye on your traffic. Those companies may keep logs that can in turn be sold to or accessed by third parties (including the government), depending on their own privacy policies. In effect, you’re moving the problem downstream.
anonymity  privacy  security  server  vpn  mac 
april 2017 by rgl7194
The Slippery Slope of Internet Privacy — MacSparky
The U.S. Senate has now voted to remove prior regulations prohibiting Internet Service Providers (ISPs)–the folks you pay for your home Internet pipe–from selling your browsing and Internet data to others for fun and profit. This is pretty terrible news if you care at all about your Internet privacy. For a long time now ISP's have been storing and saving your Internet history data. They know where you go and how long you spend there. This new regulation, assuming it also passes the house and gets signed into law (it will) lets them sell your data.
I hate this.
fcc  gov2.0  internet  ISP  politics  privacy  vpn 
april 2017 by rgl7194
Cloak's super-simple VPN blog: Congress, ISPs, and You
Today we’d like to share a little story about the United States Congress, broadband service providers, and your personal privacy.
Last week, the Senate voted to repeal regulations that protect the privacy of customers of broadband services, including your home ISP. Today, the House of Representatives followed suit, voting to repeal the regulations by a narrow margin of 215 to 205.
What happened, what does it mean, and what can you do about it? Read on.
fcc  gov2.0  internet  ISP  politics  privacy  vpn 
april 2017 by rgl7194
Post-FCC Privacy Rules, Should You VPN? — Krebs on Security
Many readers are understandably concerned about recent moves by the U.S. Congress that would roll back privacy rules barring broadband Internet service providers (ISPs) from sharing or selling customer browsing history, among other personal data. Some are concerned enough by this development that they’re looking at obfuscating all of their online browsing by paying for a subscription to a virtual private networking (VPN) service. This piece is intended to serve as a guidepost for those contemplating such a move.
security  privacy  vpn  krebs  politics  gov2.0  ISP  fcc  internet 
april 2017 by rgl7194
Meet Algo, the VPN that works | Trail of Bits Blog
I think you’ll agree when I say: there’s no VPN option on the market designed with equal emphasis on security and ease of use.
That changes now.
Today we’re introducing Algo, a self-hosted personal VPN server designed for ease of deployment and security. Algo automatically deploys an on-demand VPN service in the cloud that is not shared with other users, relies on only modern protocols and ciphers, and includes only the minimal software you need.
And it’s free.
For anyone who is privacy conscious, travels for work frequently, or can’t afford a dedicated IT department, this one’s for you.
vpn  privacy  security  mac 
april 2017 by rgl7194
trailofbits/algo: Set up a personal IPSEC VPN in the cloud
Algo VPN is a set of Ansible scripts that simplify the setup of a personal IPSEC VPN. It uses the most secure defaults available, works with common cloud providers, and does not require client software on most devices. See our release announcement for more information.
Features
Supports only IKEv2, with a single cipher suite: AES-GCM, HMAC-SHA2, and P-256 DH
Generates Apple profiles to auto-configure iOS and macOS devices
Includes helper scripts to add and remove users
Blocks ads with a local DNS resolver and HTTP proxy (optional)
Sets up limited SSH users for tunneling traffic (optional)
Based on current versions of Ubuntu and strongSwan
Installs to DigitalOcean, Amazon EC2, Google Compute Engine, Microsoft Azure, or your own server
vpn  privacy  security  mac 
april 2017 by rgl7194
How I made my own VPN server in 15 minutes | TechCrunch
People are (rightfully) freaking out about their privacy as the Senate voted to let internet providers share your private data with advertisers. While it’s important to protect your privacy, it doesn’t mean that you should sign up to a VPN service and tunnel all your internet traffic through VPN servers.
A VPN doesn’t make you anonymous
What the hell is a VPN? I already wrote an article explaining VPNs using simple concepts, even comparing VPNs to movie car chases.
But if you want a brief recap, when you connect your computer or phone to a VPN server, you establish an encrypted tunnel between your device and that server. Nobody can see what’s happening in the middle of this tunnel, not even your ISP.
And yet, it doesn’t make you magically anonymous. You’re just moving the risk down the VPN tunnel as the VPN company can see all your internet traffic. In fact, many of them sell your data to scammers and advertisers already.
That’s why I don’t recommend signing up to a VPN service. You can’t trust them.
vpn  privacy  security  anonymity  server  mac 
april 2017 by rgl7194
WTF is a VPN? | TechCrunch
You’re watching a movie. A criminal is trying to evade a crime scene in a sports car on the highway. A helicopter is following the car from above. The car enters a tunnel with multiple exits and the helicopter loses track of the car.
A VPN works just like the tunnel in this movie scene — it connects different roads and turns them into one, and a helicopter can’t see what’s happening inside the tunnel.
I’m sure many people around you have recommended you a VPN service. They usually tell you that a VPN is great, it lets you watch geo-blocked content, avoid the Great Firewall of China or browse the internet securely. VPNs are great, sometimes. But using a VPN can be as dangerous as not using one if you don’t know what you’re doing.
vpn  privacy  security  101 
april 2017 by rgl7194
WWW Inventor Prefers Public Protest Over VPN Uptake - TorrentFreak
Tim Berners-Lee, the man who invented the world wide web, has been speaking about online privacy. Branding the recent repeal of browsing history legislation as "disgusting", he spoke about the role of VPNs and Tor, and how he would prefer people to protest in the streets rather than take technical measures.
From being viewed as a somewhat niche interest product, VPNs were thrust into the mainstream in recent weeks. Long the go-to tools of privacy advocates and file-sharing enthusiasts alike, VPNs are now on the lips of countless non-tech savvy individuals.
privacy  politics  gov2.0  ISP  fcc  internet  protest  vpn  berners-lee 
april 2017 by rgl7194
VPN Searches Soar as Congress Votes to Repeal Broadband Privacy Rules - TorrentFreak
Last week the US Senate voted to do away with broadband privacy rules that prevent ISPs from selling subscribers' internet browsing histories to third parties. Congress followed suit yesterday, with a 215-205 vote in favor of repeal. But as the news sinks in, US citizens are apparently considering counter-measures, with searches for VPNs quickly going skywards.
In a blow to privacy advocates across the United States, the House of Representatives voted Tuesday to grant Internet service providers permission to sell subscribers’ browsing histories to third parties.
privacy  politics  gov2.0  ISP  fcc  vpn  internet 
april 2017 by rgl7194
How to configure VPN access on your iPhone or iPad | iMore
How do I configure a VPN on my iPhone? With the built-in network configuration tool!
Apple makes it easy to set up a VPN client that supports L2TP, PPTP, and IPSec. If your company has a private intranet that you need access to while on the road, or if you travel the globe and want your iPhone to think it's still in your home country (or a different country), a VPN will help you out. Here's how.
security  privacy  vpn  iphone  howto 
march 2017 by rgl7194
Three Myths the Telecom Industry is Using to Convince Congress to Repeal the FCC’s Privacy Rules, Busted | Electronic Frontier Foundation
Back in October of 2016, the FCC passed some pretty awesome rules that would bar your internet service provider (ISP) from invading your privacy. The rules would keep ISPs like Comcast and Time Warner Cable from doing things like selling your personal information to marketers, inserting undetectable tracking headers into your traffic, or recording your browsing history to build up a behavioral advertising profile on you—unless they can get your consent. They were a huge victory for everyday Internet users in the U.S. who value their privacy.
But since the restrictions also limit the ability of ISPs and advertisers alike to profit from the treasure trove of data ISPs have about their subscribers, powerful interests have come out in force to strip those protections away. Lobbyists in DC are pulling out all the stops trying to convince Congress that these straightforward, no-nonsense privacy rules are unnecessary, unfair, overly burdensome, or all of the above. EFF wrote a memo for congressional staffers that busts these myths.
And we’re sharing the content of that memo with you, Team Internet, so you can see the type of FUD  ISPs and their allies are pushing in order to take away your privacy.
(Fair warning: some of these are fairly wonky, so if you’re not the type that gets excited by telecom law, you can always skip to the part where you call your senators and representative and tell them not to repeal the FCC’s ISP privacy rules—because if we raise our voices together, we can stop Congress before it’s too late.)
EFF  fcc  gov2.0  politics  ISP  privacy  security  data  vpn 
march 2017 by rgl7194
11 tips for protecting your privacy and digital security in the age of Trump
As of January 20, Donald Trump is the president of the United States, which has prompted deep concerns from many over the constraints his administration may place on our ability to connect, express, and spread information safely.
Trump, a longstanding adversary of the free press, has expressed support for expanded surveillance powers, insulted and blacklisted both individual journalists and entire news organizations, selected an Attorney General appointee who actively eschews commitments to protecting a free press, and has called for leak investigations that would ensnare both sources and journalists. If these comments and actions are any indication, both the press and ordinary citizens may be forced more than ever before to use technology to keep their communications safe.
privacy  security  digital  gov2.0  trump  politics  software  passwords  1password  2FA  signal  encryption  messaging  browser  HTTP/S  vpn  phishing 
march 2017 by rgl7194
You Can Easily Use Encryption: Here's How
SAN FRANCISCO — Strong encryption is easy and available for all, security researcher Jessy Irwin told attendees at the RSA Conference here yesterday (March 3).
"Most people think, 'Security is really hard, and I want to learn more, but I have no idea where to start,'" Irwin said. "But that's not true."
You need to do only a few things to drastically improve your security posture, Irwin said: Use a password manager; fully encrypt your computers and smartphones; and use end-to-end-encrypted communication services.
privacy  security  encryption  mac  ios  passwords  1password  vpn  email  HTTP/S  messaging  tor 
march 2017 by rgl7194
Mac Power Users #368: Living in a Tin Foil Hat World - Relay FM
Security and data privacy is a growing concern in our society. David and Katie put on our tin foil hats for this episode and discuss some of the best practices that can be implemented today for protecting your data from prying eyes.
Note: This episode was recorded before the recent "Vault 7" leak. We will cover that topic in the MPU+ show in two weeks.
Two Factor Auth List
Install Google Authenticator - Accounts Help
Two-Factor Authentication • Authy
Use 1Password as an authenticator for sites with two-factor authentication - 1Password Support
How Apple and Amazon Security Flaws Led to My Epic Hacking | WIRED
Security - 1Password
AgileBits Blog | Three layers of encryption keeps you safe when SSL/TLS fails
Secure email: ProtonMail is free encrypted email.
Mail for Mac: Sign or encrypt messages for increased security
How to encrypt your email | Macworld
Encrypting Email on the Mac Is Surprisingly Easy - The Mac Observer
Secure Messaging Scorecard | Electronic Frontier Foundation
Apple logs every iPhone user’s text message contacts, new leak claims – BGR
Slack alters privacy policy to let bosses read your messages - The Verge
Cloak VPN - Cloak - Super-simple VPN
TunnelBear: Secure VPN Service
How to set up macOS Server’s VPN service | Macworld
Setting up a VPN on your Synology — Liss is More
IP Vanish - VPN Service Provider with Fast, Secure VPN Access
Amazon.com: Synology RT2600AC Wi-Fi AC 2600 Gigabit route
Home - Ghostery
AdBlock. Block ads. Browse faster.
Adblock Plus - Surf the web without annoying ads!
Tor Project: Anonymity Online
DuckDuckGo
A guide to your rights at the border - CNN.com
What could happen if you refuse to unlock your phone at the US border? | Ars Technica
How to encrypt your entire life in less than an hour
Security for Living Under the American Regime
Wikleaks "Vault7": CIA developed hacks for iPhones, iPads, Apple products - Business Insider
MPU  podcast  security  privacy  authentication  2FA  passwords  1password  email  messaging  vpn  adblock  do_not_track  search 
march 2017 by rgl7194
Rishi Mohan's Mac and iPhone setup – The Sweet Setup
Who are you and what do you do?
Hola! My name is Rishi Mohan. I work at BigBinary as a UI Engineer by day, and I’m the founder of ZINX, a blog where I write about tech, design, and apps. Apart from that, I am a maker, reader, gamer, and learner. I also love taking photos and I have recently started sharing my photos on Unsplash.
What is your current setup?
My primary machine is a 13″ mid-2012 MacBook Pro. It’s at the stock configuration right now, but I can see the need to upgrade the RAM and add an SSD. I don’t like to have a secondary machine or an external monitor as I believe in getting used to one machine and becoming efficient with it rather than being not so efficient in a setup that involves multiple machines. I have an iPhone 6 and it comes with me everywhere I go.
setup  macbook  iphone  productivity  1password  email  safari  google  journal  dropbox  notes_app  writing  twitter  menubar  RSS  spotify  vpn  soundcloud  IFTTT  photo  editing  google_photos  instapaper  scanning  adblock  facebook  lyrics  messaging 
march 2017 by rgl7194
Which VPN Services Keep You Anonymous in 2017? - TorrentFreak
VPN services have become an important tool to counter the growing threat of Internet surveillance. Encrypting one's traffic through a VPN connection helps to keep online communications private, but is your VPN truly anonymous? We take a look at the logging policies of dozens of top VPN providers.
Millions of Internet users around the world use a VPN to protect their privacy online.
Unfortunately, however, not all VPN services are as private as you might think. In fact, some are known to keep extensive logs that can easily identify specific users on their network.
vpn  review  comparo 
march 2017 by rgl7194
How to Stay Safe on Public Wi-Fi
If you take a trip today, you’re bound to come across more free public wi-fi spots than ever before. They can be great for getting work done, managing your social media empire, and generally staying connected—but these public networks can also be a major security risk. Here’s what you need to know about using free public wi-fi and how you can keep yourself safe.
Read the terms and conditions carefully
In your eagerness to get an internet connection, it can be tempting to click through whatever welcome screens appear, but you should be very careful to check what you’re signing up for. A big chunk of wi-fi networks are set up in public places by marketing firms who are willing to give you some bandwidth in return for an email address and phone number, for example.
wi-fi  free  public  privacy  security  safety  vpn 
february 2017 by rgl7194
Bodo Tasche's Mac and iPhone setup – The Sweet Setup
Who are you and what do you do?
My name is Bodo Tasche. At the end of last year, I quit my job as a CTO to work on a passion project of mine called SignDict. The goal of the project is to create a crowd-sourced sign language dictionary. Luckily, my project was chosen by the prototype fund and I’m able to spend the better part of this year on it. Besides that, I’m a host of a podcast called Bits Of Berlin.
What is your current setup?
My current MacBook Pro is an mid-2014 model with 16 GB RAM and a 1 TB SSD. For working at home I am using a WASD V2 88-Key keyboard with custom keycaps. For my trackpad I am using a wristee for a more ergonomic hand position.
setup  macbook  productivity  slack  whatsapp  twitter  calendar  1password  firefox  vpn  menubar  iphone  RSS  tracking  mapping  tv 
february 2017 by rgl7194
Home Screens – Dan Fenner — MacSparky
Dan Fenner pays for his shoes as a data specialist. At night, he teaches English to adult immigrants. Dan is pretty passionate about travel and blogs about it at MuchoSpanish.com. Throughout it all, Dan’s relies on his trusty iPhone and iPad. He even uses his iPad as his primary computer. So Dan, show us your home screen.
homescreen  iphone  ipad  podcast  audiobooks  music  vpn  instagram  PDF  youtube  email 
january 2017 by rgl7194
Matt McManus' Mac and iPhone setup – The Sweet Setup
Who are you and what do you do?
My name is Matt McManus. I’m currently working full-time as a Senior Software Engineer at Yapp and (when I can) as co-founder of OwnersUp. Right now, I spend most of my time doing Ember.js and Rails development, but in the not-too-distant past have done product and interface design.
What is your current setup?
I’m running a late-2013 13″ MacBook Pro with Core i7 and 16 GB of RAM. I love this machine. When I’m at my desk, it sits snuggly in the Twelve South BookArc and connects to a 27in Dell monitor that is attached to a monitor arm. My keyboard is the Microsoft Sculpt, and it’s the most comfortable keyboard I’ve used (I’ve got some serious tendonitis in my hands, so this is critical). My mouse is the Anker Vertical Ergonomic Mouse. This cheap mouse is surprisingly comfortable.
setup  macbook  productivity  evernote  journal  email  twitter  backup  menubar  vpn  iphone  books  instapaper  podcast  RSS  siri 
january 2017 by rgl7194
I Know What You Downloaded on BitTorrent.... - TorrentFreak
Most people know that BitTorrent is far from anonymous, but seeing all your recent downloads listed on a public website is still quite a shock. 'I Know What You Download' says it does exactly that, and also helps people to uncover the torrenting habits of friends with a nifty spy tool.
So what have you downloaded lately?
If you’re using BitTorrent without a VPN, proxy or seedbox, there’s a good chance that the rest of the world can see without asking.
privacy  security  vpn  bittorrent  download  tracking  proxy 
december 2016 by rgl7194
Home Screens – Rishabh Dassani — MacSparky
Rishabh R. Dassani (Twitter) is a creative nonfiction writer and a management consultant at Dazné. He writes short essays on personal effectiveness for design and business leaders. You can find them at right here and also sign up for his weekly Newsflash. So Rishabh, show us your home screen.
iphone  homescreen  watch  productivity  twitter  wikipedia  contacts  calendar  evernote  podcast  movies  vpn  1password  youtube  music  3D_touch 
december 2016 by rgl7194
A beginner’s guide to beefing up your privacy and security online | Ars Technica
Want to protect your security and privacy? Here are some places to start.
With Thanksgiving behind us, the holiday season in the US is officially underway. If you're reading Ars, that can only mean one thing: you'll be answering technical questions that your relatives have been saving since the last time you visited home.
This year in addition to doing the regular hardware upgrades, virus scans, and printer troubleshooting, consider trying to advise the people in your life about better safeguarding their security and privacy. Keeping your data safe from attackers is one of the most important things you can do, and keeping your communications and browsing habits private can keep that data from being used to track your activities.
security  privacy  101  passwords  encryption  2FA  1password  signal  vpn  email  EFF  HTTP/S  tor 
december 2016 by rgl7194
How to secure your Mac when using public Wi-Fi networks | iMore
Keep your Mac secure by using a VPN service while you browse the internet on public Wi-Fi.
When you are at your local coffee shop or airport, using the Wi-Fi network can keep you connected so you can work and play on the go. Unfortunately, public wireless networks almost always leave your Mac vulnerable to bad actors on the same network.
That's where virtual private networks (VPN) come in.
security  privacy  vpn  wi-fi  mac 
november 2016 by rgl7194
VPNs Are for Most People—Including You | The Wirecutter
My MacBook Air has connected to at least 74 unsecured Wi-Fi networks in the four years I’ve had it. Each time, much of my Web traffic could have been accessed by anyone else on those networks who cared to look. That information would have been enough for the snooper to connect the dots between personal details that I prefer to stay private, such as my employer, my bank, and my healthcare provider. To my knowledge, on those occasions no one ever bothered trying. Nowadays, anyone who might want my information will have a much harder time obtaining it, thanks to the extra security I get from an inexpensive and easy-to-use virtual private network (VPN) service.
Don’t be intimidated. Everyone can benefit from an increase to their privacy and security, and reliable services are available for less than $4 per month. Setup is automated, too—you need only install a small application. To track down the best advice about what a VPN can and can’t do for everyday people, we rounded up research and advice from around the Web, and we spoke with Rich Mogull, the CEO of security consultancy Securosis.
security  privacy  wi-fi  vpn  wirecutter 
november 2016 by rgl7194
proXPN Review - How Does proXPN VPN Rate On Privacy And Security Parameters? - VPNRate | Just the Best VPN Reviews
Overall Rating and Final Verdict
(Final Rating – 4 Out of 5)
Overall, we are satisfied with what proXPN has to offer. The service is fast and dependable and the company even offers a never ending free plan to just about everyone. The company can definitely add servers at more locations but for those who are looking for cutting edge security, you cannot go wrong with proXPN.
security  privacy  vpn  review 
october 2016 by rgl7194
ProXPN - VPN Service Reviews 2016 | VPNPick.com
Conclusion
In summary, this is a moderately well rounded VPN. but with too many drawbacks to opt for paying $6.25 a moth. The small amount of locations  compared to larger competitors, fluctuating and generally slow speeds, constant connection drops, and various peer user reviews stating that their IP had been leaked, ultimately deem the service insufficiently secure or trustworthy for anything more that non-sensitive applications where you would not care if your personal IP or data leaked due to connection failures.
security  privacy  vpn  review 
october 2016 by rgl7194
ProXPN Review
ProXPN is one of the best VPN service providers that offer anonymous web browsing services to their clients. ProXPN is based out of San Francisco, in California and offers servers across 4 key locations.
security  privacy  vpn  review 
october 2016 by rgl7194
ProXPN – Top 10 Best VPN Services 2016 – ProXPN.com Review
Overview:
ProXPN is a respected VPN provider that has been featured in PCWorld, CNet, ZDNet and LifeHacker. The basic VPN service is available at no cost while premium account holders receive additional connectivity options as well as other upgrades to this service. ProXPN is available for Windows, Mac and both iOS and Android mobile devices. With the VPN service from ProXPN.com, you can encrypt the information that is transmitted from your computer and conceal your true IP address. This allows you to browse the web safely and privately as no one can access your information or discover your location.
security  privacy  vpn  review 
october 2016 by rgl7194
ProXPN Review and Speed Test - VPN Test Drive - VPN Reviews and Speed Tests | VPN Test Drive - VPN Reviews and Speed Tests
Conclusion
ProXPN definitely has mass-market appeal as a vpn service provider. Their software is clean, functional, and easy to use and their service delivers all of the features you need, without forcing you to pay for extra stuff you probably don’t need or want. If you don’t need a ton of international servers and want a vpn that provides excellent customer support and good mobile integration, ProXPN should be on your list.
Don’t forget ProXPN also has a (bandwidth-limited) free version of their vpn service that will help decide whether they are the right vpn for you.
security  privacy  vpn  review 
october 2016 by rgl7194
Security Now! Transcript of Episode #400
Description: After catching up with a wild week of security events, we revisit a topic from the earliest episodes of the Security Now podcast: Virtual Private Networks. This coincides with the introduction of a new sponsor on the TWIT network, proXPN, a VPN provider that truly looks like the right choice.
High quality  (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-400.mp3
Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-400-lq.mp3
SHOW TEASE: It's time for Security Now!, our 400th episode. Let's celebrate with Steve, talk about Java - yes, there's another update - talk about security and a little intro to VPN systems. It's all coming up next on Security Now!.
security  privacy  vpn  review  podcast 
october 2016 by rgl7194
Security Now 400 VPN Solutions | TWiT
Hosted by Leo Laporte, Steve Gibson
Wordpress botnet, another JAVA update, CRAPCHAs, Virtual Private Networks, and more.
security  privacy  vpn  review  podcast 
october 2016 by rgl7194
ProXPN – The best 3rd party VPN service | Christopher Green
First, let me start off with the fact that when I say “best” I mean it from the fulfilling MY needs. There are lots of VPN services out there but for me, it is the best.
As I mentioned in a previous post, all this NSA/Prism stuff has me concerned and I’d like to find a way to have some sort of privacy. It’s not that I’m doing anything wrong per se, I just don’t like to feel like I’m constantly being watched. It’s the same reason I close the bathroom door. Nothing nefarious, I just don’t want you watching me pee.
So I started researching VPN services. And that was about the time ProXPN started sponsoring several of the podcasts I listen to on the Twit.tv network. After listen to Steve Gibson’s vetting of the service on Security Now (and the discount code) I was sold.
I won’t go into all the details of the service, you can read about all the features on their site here. But I will give you the highlights which sold me on the service.
security  privacy  vpn  review 
october 2016 by rgl7194
« earlier      
per page:    204080120160

related tags

1password  2FA  3D_touch  adblock  anonymity  apps  archive  audio  audiobooks  australia  authentication  backup  banking  bbc  berners-lee  bittorrent  bluetooth  books  browser  bug  business_model  calendar  camera  censorship  charger  china  comics  comparo  contacts  cookies  credit_freeze  crime  daring_fireball  data  design  developer  digital  digital_rights  DNS  download  do_not_track  dropbox  editing  EFF  email  emoji  encryption  evernote  exercise  facebook  FBI  fcc  firefox  firewall  flash  forum  free  games  geography  google  google_photos  gov2.0  grammar  guide  hack  handbrake  health  homescreen  howto  HTTP/S  IFTTT  imac  instagram  instapaper  internet  ios  ipad  iphone  iphone7  ipod  IPv4  IPv6  ISP  itunes  journal  krebs  linux  location_services  lyrics  mac  macbook  macosxhints  malware  mapping  maps  math  MBP  menubar  messaging  metadata  mind_mapping  mkv  movies  MPU  music  NAS  netflix  networking  news  notes_app  passwords  PDF  phishing  photo  piracy  plex  podcast  politics  prefs  privacy  productivity  protest  proxy  public  q&a  recommendations  remote  research  review  router  RSS  safari  safety  scam  scanning  search  security  server  setup  signal  siri  slack  smartphone  social_media  software  soundcloud  spotify  statistics  storage  store  streaming  subscription  teenager  test  tips  top_ten  tor  tracking  travel  trump  tv  twitter  uk  URL  USB  usenet  utilities  video  vpn  weather  web-dev  whatsapp  wi-fi  wikipedia  windows  wirecutter  workflow  writing  youtube  watch 

Copy this bookmark:



description:


tags: