Since the official public launch, I have received dozens of emails (and Twitter DMs) from readers asking me to review ProtonVPN. A group of scientists with a track record of building secure products (ProtonMail) designed ProtonVPN from the ground up to be safe and privacy-enhancing. The promise is that they will bring the same end… Continue reading Honest review of the ProtonVPN service
American politics is an extremely divisive issue and I will not be taking any sides in this debate. The purpose of this article isn’t to promote any sides but rather to talk about how encrypted communication tools are being used. Michael Moore launched a sub-page to his domain called Trumpileaks. The purpose is to give… Continue reading Michael Moore launches Trumpileaks using strong encryption tools
As we learn more about how much data the intelligence community collects and what their capabilities are (Vault7), it reinforces the mantra of having good security hygiene. If you weren’t using VPN while on (untrusted) WIFI connections, then you should be. I consider untrusted any WIFI network I don’t directly control. I even use VPN… Continue reading Invizbox GO Review
I have written plenty of articles about TOR over the years: What is Tor and should I use it Why use Facebook over the TOR secure network What is the dark web Is TOR really anonymous We know that large scale government actors that control many of the TOR exit nodes have techniques to deanonymize… Continue reading A free anonymous (TOR) Web browser for IOS
When a new undisclosed (0 day) vulnerability is used to hack a target’s device, the media jumps all over it and create a small panic. Government intelligence and organized crime are always looking for new creative ways to break into target devices and are willing to pay top dollar for new unknown hacks. Vulnerability brokers… Continue reading Will your Android phone allow someone to hack you?
Ive written about TOR a few times but I regularly receive emails from “newbies” asking me to describe what it is in general terms. That’s what this article is about. To get things kicked off, let me share an important quote from everyone’s favorite whistle blower, Edward Snowden: “I think Tor is the most important… Continue reading What is Tor and should I use it
When people think about the TOR network, they either think its a means for criminals to buy illicit products or for fugitives trying to hide their online activities from the law. Tor is much more than that. It is a mechanism to protect your online activities when needed. Sitting at home, my packets bounce through… Continue reading Why use Facebook over the TOR secure network