By andre

Guy Fawkes Mask

What Everybody Ought to Know About HideMyAss

In most instances using a Virtual Private Network (VPN) is sufficient to hide your real identity while online; however as Cody Kretsinger, who was using just this type of service, the UK based company Hide My Ass, had to find out, this might not always be the case. If you’ve never heard of Hide My…

Secure Email

How to: Use Email and Protect Your Privacy

Email… not secure, not elegant, and not going anywhere. Make your peace with it! I am sure that by now you have heard about at least one person whose email account has been hijacked, hacked or whose emails have fallen into the wrong hands. But enough with the scare mongering… If you want to learn…

Is VPN Legal

Wait…is it legal for you to use a VPN?

If you could hide your identity online, say whatever you wanted, look at whatever you wanted, download whatever you wanted, with no way of it ever getting back to you, would you do it? Well, there is a way to do that and it is called Virtual Private Network or VPN for short. It is…

Email Security

How to Encrypt Your Email – What You Need to Know

This is the second part of a post about email security. If you haven’t read part one ‘Why is it so difficult to secure your email?’ you should check it out. We also published a primer on the differences between ‘Privacy and Anonymity’ that is worth reading. Achieving perfect security of your email is difficult,…

IP Address 127.0.01

What is an IP Address?

We live in a world of networks. Networks are literally everywhere, from power grids, roads, cell towers, financial and legal networks to social networks, and, of course, the Internet. Networks lay over each other and touch all over the place. We navigate them daily, often without even noticing they are there, but have you ever…

Email Security

Email Security – What you need to know about Email

iTnews Australia recently published an interesting article about a leaked security audit of the security and intelligence firm Strafor. These are the guys whose trove of juicy emails was hacked and leaked (and from whom more than 79,000 credit card details were stolen) courtesy of LulzSec, a hacker group loosely associated with Anonymous. The forensic…

Google Drive

Google Drive – Storage is Cheap, Privacy Costs Money

The price for cloud storage is dropping. Recently Google cut its prices for Google Drive from USD 4.99 to USD 1.99 for 100GB and from USD 49.99 to USD 9.99 for 1TB, making it even cheaper to store your content in their cloud. But considering the privacy and security implications the real question here is…

Privacy and Anonymity

Privacy and Anonymity – Understanding the Difference

‘I have nothing to hide, so why worry?’ or so many people think. If you are so sure, then please email me the username and password for all your email and social media accounts… I didn’t think so! Privacy and anonymity are not the same thing and many people get them confused. We all know…

Silent Pocket

Stop Cellphone Tracking with SilentPocket

In August of 2012, we linked to an interview with William Binney, a 32-year veteran of the National Security Agency (NSA) turned whistle-blower about domestic spying on our website: Invisibler. The interview revealed the NSA’s data gathering and analytical capabilities.  According to Binney, the NSA can construct elaborate social graphs on everyone about whom they…

VPN Service Tunnel

What is a VPN and Why Use It?

With thousands of VPN services to choose from, each promising to keep your data secure, each advertising similar technical  features, how can any sane person make a rational choice? Fortunately, it is easier than you might think. Read on… What is a VPN? A Virtual Private Network (VPN) is a private computer network constructed within…

Ed Snowden - Democracy Depends on You

NSA Whistleblower Edward Snowden: Governments Caught Lying

Article 12 of the United Nations Universal Declaration of Human Rights states: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his hono(u)r and reputation. Everyone has the right to the protection of the law against such interference or attacks.” In fact, Amendment 4 of…

Protect Your Privacy With 10 Easy Offline Steps

Protect Your Privacy With 10 Easy Offline Steps

Chances when you are reading this online, hopefully over your morning coffee or a good glass of wine while relaxing. I write about privacy a lot, but as many people I usually mean online, while the majority of life actually still happens offline, the Matrix none withstanding. Even the best online security measures aren’t good…

The Borg - You will be assimilated!

Your Privacy is Under Attack – Facebook

Facebook, the Borg-Collective of the Internet, is making headlines about its Privacy Policies again. With over a billion Facebook “citizens”, larger than any country except China and India, any changes to Facebook’s policies are a big deal. How worried should you be? Facebook wants to change three major things, how it shares information with affiliates,…

George Orwell 1984

Interesting Tidbits From The Web Today

George Orwell was right and the attack on our freedom comes from within! The UN calls for “Anti Terror” Internet surveillance and in the UK the British Phonographic Industry (BPI) succeeds in forcing ISPs to block access to torrent sites CNet reports. Independently viewed these news snippets don’t mean much, but in the context of the global…

Privacy News

HideMyAss didn’t hide his…

In October 2012 Raynaldo Rivera entered a plea bargain with the US Attorney’s Office (USAO), pleading guilty to having hacked Sony Pictures in 2011 as part of LulzSec, a subgroup of Anonymous. He will be sentenced early 2013. Raynaldo is the second member of LulzSec to plead guilty, after Cody Kretsinger, both identified via their…

Security PIN

PIN Security – How to Protect Yourself From Easy Hacking

Is your PIN (Personal Identification Number) as good as it can be? There is a slight problem with “personal” in Personal Identification Number, the rarely mention fact that you and probably thousands of others share the same number. Coincidence? Not so, with 4 numbers to choose from there are only 10,000 possibilities. Considering the millions…

Java Security Flaw

New Java Zero-Day Security Flaw Discovered

Adam Gowdiak provided Oracle with a technical description of a new zero-day security flaw along with sources and binery codes of his team’s proof of concept sandbox bypass in Java 5, 6 and 7, based on Oracle’s figures about 1 Billion PC and Mac users. For more information go to: Critical security issue affecting Java SE…