Top Five Reasons Online Privacy Has Become So Important

Chris Stobing Enemies of the Internet

In 2013 the world was rocked by a trove of classified documents that made their way into the public eye, packed with details covering the most comprehensive international surveillance program ever constructed in modern history. Leaked by none other than the now-infamous Edward Snowden, the Snowden Leaks uncovered a massive data-mining operation undertaken by the National Security Agency in the United States, and the GCHQ in Britain. This network was designed from the ground up to record as many phone calls, es, text messages and search queries as it could, …

VPNs for Absolute Beginners – A Handy Privacy Guide

Geoff Walters Informative Internet Guides

On privacy has become a major topic of discussion in recent years. With ISPs tracking personal information and hackers constantly snooping for data, staying safe on the web is important than ever. There is a number of easy to use security solutions that help protect your privacy, the most reliable of which are virtual private networks. VPNs are safe, comprehensive, and inexpensive, and they’re not as complicated as they sound. ISPs and Your Data Every time you connect to the internet you send information through an internet service provider …

How To Stay Safe Browsing From Public Wi-Fi Networks

Andrew Orr Informative Internet Guides

Earlier this week we told you about a public Wi-Fi threat called Evil Twin Hotspots. Even if you do not encounter these, using insecure public Wi-Fi is risky. Here’s how to stay safe. Further Reading Use A VPN To Defeat Evil Twin Hotspots Public Wi-Fi Hotspots More of a Threat Than You Think Insecurity You might be surprised at all of the wicked things that hackers can do to someone connected on an insecure Wi-Fi connection. There are three general ways in which an attacker can exploit public Wi-Fi: Man-in-the-middle …

Android Users Get New Security Notifications

Andrew Orr In the News

Google is releasing a new feature for Android users that warns them of new device sign-ins. Further Reading Block Spam Calls on Android with Google Phone Is the Age of -Based Two Factor Authentication Finally Over? Account Activity In the past Google used e and/or to warn users of potential security threats when it came to Google accounts. Now, the company is bringing those notifications straight to your Android device. When a new device accesses your Google account, you’ll see a notification saying “Did you just sign in?” If …

A User’s Guide to the Internet in Ghana

Mathew Sayer Informative Internet Guides

This feature is going to undergo a transformation. These profiles encompass history and current affairs as they relate to the internet and a free media. So from now on think ‘user guide’ not ‘spotlight.’ A, B, C, D, E, F, Ghana. Google Trends lets you see what the most popular searches are, a useful SEO tool (zzzzz) but in a way it’s a good social engineering tool too. Ghana is the second in regional interest for the search term ‘vpn’ behind Iran, a beautiful country and people who happen to …

How the Darknet Got its Groove Back

Jason Sander From our Perspective

The Darknet. Just saying those words sends chills down some people’s spines. Others, it piques interest or inspires a smile. Like any new technology, people have misconceptions about what the Darknet is. The Darknet or Dark Web is an all-encompassing buzzword created to describe the “World Wide Wild West Web”. Most people who are skeptical of the Darknet and TOR browsers have heard of the black market website the Silk Road, where users had access to a myriad of illegal products and services before it was shut down. More recently …

Social Media: Privacy Friend or Foe?

Steven Informative Internet Guides

Like many people, I’m assuming that you have a social media account be it a , , Linkedin, Instagram, Snapchat, etc. The list of sites, which encourage you to enter your personal information for the sake of interaction with others, is exhaustive. But just how secure are these sites, what do they use your information for, and how do you make sure that your information is protected? Aside from entering things such as your personal phone number, address, and other bits of personal information that you’d rather not a complete …

CISA Bill: Private Data Sharing Passed by Senate

Michael In the News

With so many steps in the right direction in the way of privacy and freedom on the internet, those in the US were overdue for a setback. Over the past several months awareness about the threat against public privacy by way of government surveillance has paid off. From the lapsing of the USA PATRIOT Act and the subsequent passing of the USA FREEDOM Act, to the appointment of the first FISA Court (read: secret court) amicus curiae, to the net neutrality win in America– and the mixed win in the …

Top 5 Reasons to Use a VPN

Michael At LiquidVPN

So you’ve done some research on VPNs (Virtual Private Networks), hopefully you’ve read my article on Proxies vs. VPNs (if you haven’t I suggest you start there) and decided that a VPN is the way to go. It is the strongest tool to protect your internet privacy. Perhaps you are wondering ‘why use a VPN at all?’ what’s all the fuss is about: why do so many people take using a VPN seriously? Well, my friend, you are about to find out. I have compiled… The Most Popular Reasons to Use …

What is Internet Privacy? Part 2: Free Speech

Michael From our Perspective

In this series I am diving into the core of what internet privacy is and why it’s important to everybody. Too often I hear people assume that those worried about internet privacy and anonymity are only concerned with such because they are being shady. But the notion of internet privacy goes far deeper than that. In the first part I dissected the value of internet privacy as it pertains to your sensitive personal information. Data brers, as they are called, have created a sprawling multi-billion dollar industry collecting, packaging, and …