Honest review of the ProtonVPN service

Since the official public launch, I have received dozens of emails (and Twitter DMs) from readers asking me to review ProtonVPN.  A group of scientists with a track record of building secure products (ProtonMail) designed ProtonVPN from the ground up to be safe and privacy-enhancing.  The promise is that they will bring the same end… Continue reading Honest review of the ProtonVPN service

Michael Moore launches Trumpileaks using strong encryption tools

American politics is an extremely divisive issue and I will not be taking any sides in this debate. The purpose of this article isn’t to promote any sides but rather to talk about how encrypted communication tools are being used. Michael Moore launched a sub-page to his domain called Trumpileaks. The purpose is to give… Continue reading Michael Moore launches Trumpileaks using strong encryption tools

A free anonymous (TOR) Web browser for IOS

I have written plenty of articles about TOR over the years: What is Tor and should I use it Why use Facebook over the TOR secure network What is the dark web Is TOR really anonymous We know that large scale government actors that control many of the TOR exit nodes have techniques to deanonymize… Continue reading A free anonymous (TOR) Web browser for IOS

Will your Android phone allow someone to hack you?

When a new undisclosed (0 day) vulnerability is used to hack a target’s device, the media jumps all over it and create a small panic. Government intelligence and organized crime are always looking for new creative ways to break into target devices and are willing to pay top dollar for new unknown hacks. Vulnerability brokers… Continue reading Will your Android phone allow someone to hack you?

What is Tor and should I use it

Ive written about TOR a few times but  I regularly receive emails from “newbies” asking me to describe what it is in general terms. That’s what this article is about. To get things kicked off, let me share an important quote from everyone’s favorite whistle blower, Edward Snowden: “I think Tor is the most important… Continue reading What is Tor and should I use it

Why use Facebook over the TOR secure network

When people think about the TOR network, they either think its a means for criminals to buy illicit products or for fugitives trying to hide their online activities from the law. Tor is much more than that. It is a mechanism to protect your online activities when needed. Sitting at home, my packets bounce through… Continue reading Why use Facebook over the TOR secure network