Unblock Netflix with the Best Netflix VPN

Andrew Orr At LiquidVPN

If you’re using a VPN right now, great! VPNs are a good way to be safer as you browse the web.  However, you might run into a couple of bumps as a VPN user, namely Netflix proxy errors. It is possible to bypass the recent Netflix VPN ban and those pesky Netflix proxy errors too. We’ll show you how. Use LiquidVPN to Unblock Netflix LiquidVPN is a good VPN to use because it has built-in technology designed to help you unblock Netflix, among others. Features like LiquidLock, LiquidDNS and Smart Content …

Is it Illegal to use a VPN Service?

Andrew Orr Informative Internet Guides

*Feb 3, 2017: Because of new anti-VPN laws passed recently this article has been updated* Virtual Private Networks (VPNs) are excellent tools to uphold the principles of privacy and anonymity. But is it legal to use them? Further Reading Here’s why the United Arab Emirates outlawed VPNs How IP Modulation Improves Your VPN Experience As we recently saw last month, the United Arab Emirates made it illegal to use a VPN. Their reason? They don’t want you using any system that is capable of hiding the fact that you are committing a …

Encryption Backdoor Endorsed by Attorney General Jeff Sessions

Andrew Orr From our Perspective

Jeff Sessions, President Trumps new Attorney General for the United States, has recently shown that he supports an encryption backdoor. President Trump seems to support this as well, lambasting Apple when the company wouldn’t unlock an iPhone for the FBI. What Is An Encryption Backdoor? A backdoor is any method, usually secret, that bypasses the usual authentication process in a product, computer system, cryptosystem or algorithm. In encryption, a backdoor would mean that agencies like the NSA could design an encryption algorithm in such a way that they could easily …

One Man in the Middle Compromises 76 Popular iPhone Apps

Andrew Orr In the News

An iOS app analysis service has found that 76 popular iPhone apps are confirmed to be vulnerable to the silent interception of TLS-protected data. Beware of these popular iPhone apps During testing, developers of verify.ly a mobile app analysis service found issues with many popular iPhone apps. Here are the details we have so far: 76 popular iPhone apps let a secret man-in-the-middle attack to be performed on connections that should otherwise be protected by TLS (HTTPS). This MitM vulnerability lets data be intercepted and manipulated. According to Apptopia, there has been …

Should Apple Build their Own iPhone VPN?

Andrew Orr From our Perspective

Recently, Apple website 9To5Mac published a feature request article; the author suggested that Apple should build an iOS VPN network and VPN app for iPhone. However, is this a good idea? Apple’s VPN on iPhone is Very Bad for Privacy Last year Google released an Android feature called Wi-Fi Assistant. It lets Android customers use Google’s free VPN service when they connect to insecure public Wi-Fi hotspots. However, on iOS, Apple users do not have this option. Instead, they have to buy VPN service from a third-party. 9To5Mac author Greg …

Top 10 Adblockers for Apple iOS devices

Andrew Orr Informative Internet Guides

*Feb 9, 2017: Because of new information this article has been updated* Today Apple held its annual Worldwide Developer Conference. Many great features were announced on all four platforms that Apple now focuses on; watchOS, tvOS, iOS and MacOS (formerly Mac OS X). Apple continues to focus on the privacy of its users, and the forthcoming iOS 10 update shows that more than ever. An important but controversial part of privacy and security is using adblockers. The use of this technology is a big issue and leaves many people divided. …

How Secure Is Your Android VPN App?

Andrew Orr In the News

A research paper [PDF] from the University of California and Commonwealth Scientific and Industrial Research Organisation (CSIRO) analyzed a group of Android VPN apps. They found that these particular apps had privacy and security issues. Further Reading VPN On Chromebook: How To Set It Up Why Switzerland is a great place for a VPN More people are starting to realize the benefits of using a virtual private network. But without a lot of tech knowledge, it’s easy to assume that all VPNs are created equal. They are not, and this …

VPN On Chromebook: How To Set It Up

Andrew Orr Informative Internet Guides

Did you know it’s possible to use a VPN on Chromebook? Virtual private networks aren’t just for Windows and Macs, and we’ll show you how to set one up. Further Reading Beat Netflix Proxy Errors with Our Netflix VPN Top 10 Adblockers for Apple iOS devices Using a VPN on Chromebook Google Chromebooks have built-in support for these VPN technologies: L2TP over IPsec with PSK L2TP over IPsec with certificate-based authentication OpenVPN Sign into your Chromebook and click the status area, which is where your account picture is. Click Settings. …

Fix Hulu Proxy Errors with our Hulu VPN

Andrew Orr At LiquidVPN

Just like Netflix, Hulu proxy errors are standard in 2017 for many of us, but LiquidVPN has built-in technology designed to help you access your favorite Hulu content. You can bypass the Hulu VPN ban, and we’ll show you how. VPN For Hulu LiquidVPN can help you watch Hulu with features like LiquidLock and LiquidDNS. You might ask: Can I watch Hulu overseas? As long as you use a VPN for Hulu, you can. Using a VPN can “spoof” your location, so even if you’re in another country, you can watch Hulu as if …

SSHowDowN Flaw Found In Internet of Things Devices

Andrew Orr In the News

Content delivery network Akamai found a security flaw, SSHowDowN, affecting over two million devices. The company says multiple clients have become targets. Further Reading New Router Hack Discovered That Targets Port 7547 Don’t Look, But Your Wi-Fi Router Is Spying On You SSHowDowN Flaw Akamai found a way [PDF] in which hackers can exploit a particular weakness in OpenSSH (CVE-2004-1653). Millions of internet-connected devices use crypto. An attacker can use these flaws to take over these devices. Then combine their power into a single attack, like a botnet. This particular hack has a …