Is VPN Legal

Wait…is it legal for you to use a VPN?

If you could hide your identity online, say whatever you wanted, look at whatever you wanted, download whatever you wanted, with no way of it ever getting back to you, would you do it? Well, there is a way to do that and it is called Virtual Private Network or VPN for short. It is…

Guy Fawkes Mask

What Everybody Ought to Know About HideMyAss

In most instances using a Virtual Private Network (VPN) is sufficient to hide your real identity while online; however as Cody Kretsinger, who was using just this type of service, the UK based company Hide My Ass, had to find out, this might not always be the case. If you’ve never heard of Hide My…

darkhotel

DarkHotel – Hacking High Value Target at Expensive Hotels

This week DarkHotel is on everyone’s mind, and for good reasons. For those who slept under a rock the last few days, DarkHotel is an insidious malware infection targeting high profile travelers staying at higher end hotels in mostly Asia and the US. The bug was detected by Kaspersky Lab. Kaspersky Lab is a security…

Email Security

How to Encrypt Your Email – What You Need to Know

This is the second part of a post about email security. If you haven’t read part one ‘Why is it so difficult to secure your email?’ you should check it out. We also published a primer on the differences between ‘Privacy and Anonymity’ that is worth reading. Achieving perfect security of your email is difficult,…

IP Address 127.0.01

What is an IP Address?

We live in a world of networks. Networks are literally everywhere, from power grids, roads, cell towers, financial and legal networks to social networks, and, of course, the Internet. Networks lay over each other and touch all over the place. We navigate them daily, often without even noticing they are there, but have you ever…

Email Security

Email Security – What you need to know about Email

iTnews Australia recently published an interesting article about a leaked security audit of the security and intelligence firm Strafor. These are the guys whose trove of juicy emails was hacked and leaked (and from whom more than 79,000 credit card details were stolen) courtesy of LulzSec, a hacker group loosely associated with Anonymous. The forensic…

Tor Hacked

Tor Has Been Compromised. Now What?

The disturbing news that Tor, the online community’s most secure and effective anonymizing tool has been compromised was officially confirmed July 30, 2014 in an advisory published by the Tor Project. The sophisticated two-pronged attack – thought to have begun in early February 2014 and continued until July 4, a period of about 5 months – raises many questions.

Privacy Versus Security: The New Equation

Privacy Versus Security: The New Equation

In Defense of Privacy A recent unanimous decision by the U.S. Supreme Court has been called “a sweeping victory for privacy rights in the digital age” by The New York Times. At the same time a unanimous decision by the Supreme Court of Canada has been reported by The Globe and Mail as “a privacy…

Tor Onion Knife

Everything You Must Know About Tor

What is Tor? Tor, short for The Onion Router, is a free service designed to allow people to browse the web anonymously, and to evade all known methods of surveillance. Tor’s purpose is to allow individuals and organizations to view and exchange information across the Internet without compromising their privacy or anonymity. Information transmitted using…

Google Drive

Google Drive – Storage is Cheap, Privacy Costs Money

The price for cloud storage is dropping. Recently Google cut its prices for Google Drive from USD 4.99 to USD 1.99 for 100GB and from USD 49.99 to USD 9.99 for 1TB, making it even cheaper to store your content in their cloud. But considering the privacy and security implications the real question here is…

Privacy and Anonymity

Privacy and Anonymity – Understanding the Difference

‘I have nothing to hide, so why worry?’ or so many people think. If you are so sure, then please email me the username and password for all your email and social media accounts… I didn’t think so! Privacy and anonymity are not the same thing and many people get them confused. We all know…

Silent Pocket

Stop Cellphone Tracking with SilentPocket

In August of 2012, we linked to an interview with William Binney, a 32-year veteran of the National Security Agency (NSA) turned whistle-blower about domestic spying on our website: Invisibler. The interview revealed the NSA’s data gathering and analytical capabilities.  According to Binney, the NSA can construct elaborate social graphs on everyone about whom they…

what is tor

Is Tor Safe?

On August 5th, 2013 NBC News reports that “Tor users compromised in child porn takedown.” The Independent reports that Eric Eoin Marques, a 28-year old man from Dublin, appeared before a judge regarding charges of distributing child pornography originating from the FBI. Interestingly at the same time Freedom Hosting, a web host that allows users…

VPN Service Tunnel

What is a VPN and Why Use It?

With thousands of VPN services to choose from, each promising to keep your data secure, each advertising similar technical  features, how can any sane person make a rational choice? Fortunately, it is easier than you might think. Read on… What is a VPN? A Virtual Private Network (VPN) is a private computer network constructed within…

NSA top secret domestic pying program Stellar Wind

Video Revealed the NSA’s Top-Secret Efforts to Spy on U.S. Citizens

Documentary filmmaker Laura Poitras interviewed William Binney, a 32-year veteran of the National Security Agency (NSA) turned whistle-blower about domestic spying. This mind-blowing, short clip reveals details of the NSA’s top-secret “domestic” spying program, Stellar Wind, which began under Bush/Cheney/Tennet/Hayden shortly after 9/11. Benney estimates that a facility being build in UT will be able…

Ed Snowden - Democracy Depends on You

NSA Whistleblower Edward Snowden: Governments Caught Lying

Article 12 of the United Nations Universal Declaration of Human Rights states: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his hono(u)r and reputation. Everyone has the right to the protection of the law against such interference or attacks.” In fact, Amendment 4 of…

Edward Snowden

Edward Snowden – Democracy Under Fire

Every July 4th Americans celebrate their independence from British rule, usually a patriotic display of flags, plenty food and fireworks, an excuse for a long weekend, BBQs and getting drunk. What started out as a great plan, a democracy like never before, has suddenly come to a screeching halt, worst of all ,with the most…

Hot Coals

Messaging and Phone App Viber Blocked in Saudi Arabia

Various news sources, including the Shia International News Association, report that Saudi Arabia has blocked access to the popular encrypted messaging service Viber. Viber CEO, Talmon Marco told the BBC that he didn’t know why Viber was blocked and they expect to restore the service within a few days. Viber, a free messaging and VoIP…

Protect Your Privacy With 10 Easy Offline Steps

Protect Your Privacy With 10 Easy Offline Steps

Chances when you are reading this online, hopefully over your morning coffee or a good glass of wine while relaxing. I write about privacy a lot, but as many people I usually mean online, while the majority of life actually still happens offline, the Matrix none withstanding. Even the best online security measures aren’t good…