How To Protect Your Online Privacy in 2017 – VPNs and Tor

David Cox Informative Internet Guides

VPN is and acronym for Virtual Private Network. VPNs virtualize a local network (LAN) over a distance. With a VPN computers in two locations work together like they are on one local network.   The business applications of VPNs are obvious. Employees in different offices can resources like they’re on one local network. The data travels through the Internet inside an encrypted VPN tunnel.   What does that have to to do with privacy?   Of course, this guide isn’t for business applications. When a computer connects to a …

Canada Is Trying to Demonize Encryption

Andrew Orr In the News

The Royal Canadian Mounted Police, have been using media in Canada to demonize encryption in the public eye, while trying to sway the public towards surveillance. Further Reading 5 Best Security Tools to Secure Your Data Blackberry Is Making User Data Too Easy To Access Encryption In Canada Canadian police have been pushing for surveillance powers for some time now. Specifically, police want to be able to force people to unlock their phones, or to force ISPs to give the government real-time access to r information. Right now Canada …

AirDroid App Is Vulnerable To Attack; Millions At Risk

Andrew Orr In the News

For the past six months, popular Android app AirDroid has endangered millions of users. The app is vulnerable to code execution and data theft attacks under certain conditions. Further Reading Android Phones Found To Have BackDoor To China Android Users Get New Security Notifications AirDroid Attack AirDroid is a popular app that lets Android users sync notifications and transfer files between their phone and computer. But in a blog post by security firm Zimperium analyzed the app and found some vulnerabilities within the app. Attackers who are on the same network …

Your iMessages May Not Be Safe Anymore

Andrew Orr Informative Internet Guides

In the latest news, we found out that Apple iMessages might not be as safe as we thought. As it turns out, Apple retains certain metadata. Further Reading Signal: The Right Way To Encrypt Our Communications PornHub Blocked In Russia Here’s How To Watch It iMessages A report by The Intercept gives information about iMessage conversations. Although Apple secures messages with end-to-end encryption, your contacts may not be as safe. The company automatically logs which phone numbers you contact. Apple can then this information with law enforcement if ordered …

8 Common VPN Myths And Why They Aren’t True

Andrew Orr Informative Internet Guides

Interested in using a VPN? Maybe you already use one, but you don’t know much about them yet. Here are some common myths about VPNs and why they aren’t true. Further Reading 10 Reasons To Use a VPN in 2016 – What Are You Waiting For? The Future of Freedom: Building a new TOR Myth #1: You only need a VPN if you’re doing something illegal A common misconception surrounding issues of privacy and security is accountability. That is, you might say “I have nothing to hide, so why should …

ICANN Plans To Change The Root Zone Crypto Keys

Andrew Orr In the News

ICANN plans to change a fundamental part of the domain name system: the cryptographic keys of the root zone. What does this mean for you? Further Reading Don’t Lo, But Your Wi-Fi Router Is Spying On You How To Minimize Your Digital Foot with DNS Watch DNS Cryptography In about one month, the Internet Corporation for Assigned Names and Numbers (ICANN) plans to change a key feature of the web’s infrastructure. ICANN is a US-based non-profit organization responsible for different tasks related to the internet. They plan to create new …

Subgraph OS is a Snowden-Approved Operating System

Andrew Orr Informative Internet Guides

Kid-tested, Snowden-approved. That’s what the makers of Subgraph OS say, although maybe not in those exact words. The premise is that Subgraph is a secure Linux distribution that anyone can use, even without technical know-how. Further Reading Our Top 5 Security Extensions for your Browser 5 Best Security Tools to Secure Your Data Subgraph OS Subgraph launched earlier this year at Logan CIJ Symposium as an alpha release. This is the stage of the software release cycle where it’s still in development. The developers release software so the public can report bugs …

How to Enhance Your Security on Chrome OS

Andrew Orr Informative Internet Guides

Chromebos are lightweight computers designed to run Chrome OS, an operating system made by Google and based on the Chrome browser. Unlike other operating systems where browsers run on top of the OS, with Chromebos Chrome IS the OS. Chrome OS is already pretty secure, but there is still you can do as a user. Further Reading Six macOS Tips to Supercharge your Security InfoSec 101: How To Boost Your Privacy On iOS Default Security Chromebos tend to be secure than other computers because there are fewer attack …

Signal: The Right Way To Encrypt Our Communications

Andrew Orr Informative Internet Guides

Have you ever needed to say something – uh – sensitive to your buddy? Maybe it was a photo of an explicit nature, or maybe sending him/her directions on where you hid the booty? Hey, we are not judging, but if you find yourself wishing you could communicate securely, check out Signal by Open Whisper Systems. Signal Signal is an app for iOS, Android and Chrome/Chromium that encrypts your text messages and phone calls. It’s so secure that people like Edward Snowden, Matt Green, Bruce Schneier and Laura Poitras all recommend using …

For Better Privacy, Backup Your iPhone To iTunes

Andrew Orr Informative Internet Guides

Apple has been a privacy-focused company for a long time now. They’re willing to go to great lengths to protect their customers, even facing off against the government. One area that can become vulnerable to malicious attackers is iCloud. As an Apple user, you’re backing up the most important data of your life to iCloud. You’re not just backing up apps any; now it’s health data, financial data, photos, etc. Some people feel fine and trust Apple’s security measures, but others like myself may be uncomfortable. For those people, this …