This incredibly simple privacy app helps protect your phone from snoops with one click

This incredibly simple privacy app helps protect your phone from snoops with one click

The app not only saves the process of manually configuring the Android or iOS operating systems to use 1.1.1.1 as their default DNS server, it also forms an encrypted connection between the DNS server and every app on the phone. That’s because Cloudflare uses a VPN connection to send these encrypted DNS requests.

Researchers Believe Sprint Is Throttling Skype Without Telling Consumers

Researchers Believe Sprint Is Throttling Skype Without Telling Consumers

Choffnes developed an app named Wehe that he’s been using to track how wireless carriers are treating user data in the wake of the repeal of net neutrality rules last June.

How to improve security when using IoT or Smart Home devices

How to improve security when using IoT or Smart Home devices

With the advent of the Internet of Things (IoT) and Smart Home devices, our environments are becoming more connected however this comes with the compromise of security. So what is the best way to secure your network when using IoT or Smart Home devices?

Prison time, hefty fines for data privacy violations: draft U.S. Senate bill

Prison time, hefty fines for data privacy violations: draft U.S. Senate bill

WASHINGTON (Reuters) - A senior Democratic U.S. senator on Thursday unveiled draft legislation that would allow hefty fines and as much as 20-year prison terms for executives who violate privacy and cybersecurity standards.

No More Glass Safes: tnnl Brings Privacy to Digital Assets

PRAGUE, Oct. 31, 2018 /PRNewswire/ -- At Devcon4, Cryptographic Applications Research, LLC (Cryptario) today released a "dark" paper and protocol specification detailing tnnl, a privacy-layer for the Ethereum network.

FCC Republican claims municipal broadband is threat to First Amendment

FCC Republican claims municipal broadband is threat to First Amendment

O'Rielly said that broadband providers run by local governments "have engaged in significant First Amendment mischief." But O'Rielly's only evidence to support his claim was the networks' Acceptable Use Policies, which contain boilerplate language similar to the policies used by private ISPs such as Comcast and AT&T.

California Banned Default Passwords, But Will This Increase Security?

California Banned Default Passwords, But Will This Increase Security?

This law mandates that manufacturers preprogram a unique password for each individual device and that the user is required to change this password upon first login.

4 Anonymous Web Browsers That Are Completely Private

4 Anonymous Web Browsers That Are Completely Private

The network aims to protect a user’s location, browser history, personal data, and online messages from any person or bot that’s performing network traffic analysis. Comodo doesn’t come close to Tor Browser, but it does have some built-in tools that’ll make browsing the web a safer experience.

Enter the Matrix and reclaim data ownership

Enter the Matrix and reclaim data ownership

“The web was always meant to be free to write and as easy to publish as it is to consume,” said Matthew Hodgson, co-founder of a decentralized communications network called Matrix, which was started four years ago, and has recently garnered newfound glory as a viable alternative to the current digital landscape.

Senators question Google's tardy disclosure of user data exposure

Senators question Google's tardy disclosure of user data exposure

WASHINGTON (Reuters) - Two U.S. senators said Alphabet Inc’s (GOOGL.O) disclosure of user data vulnerabilities at Google+ raised “serious questions” over whether it violated a 2011 consent decree with the Federal Trade Commission, potentially exposing Google to penalties.

This Tor-Enabled SIM Card Will Keep You Anonymous On Mobile Networks

This Tor-Enabled SIM Card Will Keep You Anonymous On Mobile Networks

So a UK-based enterprise Brass Horns Communications is currently testing a data only-SIM card that automatically routes all your mobile data traffic through the Tor network. But the best part about the Tor-SIM card is that not even Bras Horn can monitor the traffic that passes through it.

An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet

An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet

According to a new report by the security researchers at UpGuard, a Washington-based ISP by the name of Pocket iNet left 73 gigabytes of essential operational data publicly exposed in a misconfigured Amazon S3 storage bucket for months.

ASUS Z390 Motherboards Automatically Push Software into Your Windows Installation

ASUS Z390 Motherboards Automatically Push Software into Your Windows Installation

Our Windows 10 image is based on Windows 10 April 2018 Update and lacks in-built drivers for the integrated network controllers.Upon first boot, with the machine having no LAN or Internet connectivity, we were greeted by an ASUS-specific window in the bottom right corner of our screen, asking whether we'd like to install the network drivers and download "Armoury Crate".

Mozilla tests Premium VPN Service

Mozilla tests Premium VPN Service

Mozilla will start the test of a commercial VPN offering tomorrow for a subset of users in the United States. The recommendation highlights the basics behind a VPN, that Mozilla selected ProtonVPN as the partner for the test, and the price of the subscription.

Cyborg Unplug

Cyborg Unplug

2.4Ghz detectorDetects and disconnects (disconnection feature outside US only) most common classes of wireless surveillance deviceLED alertSends email alerts to an account you configureUS plug standard, with Euro adaptor for travellersWirelessly tunnel multiple devices (phones, laptops, tablets) through a VPN you configure, no need for extra software on any deviceShare files from a USB stick over the network, with no need for third-party apps (like DropBox)With no settings applied, functions as pocket-sized travel routerFree, 24/7 high-speed VPN service.

Have fun with I2P, the 2018 edition – Masayuki Hatta – Medium

Have fun with I2P, the 2018 edition – Masayuki Hatta – Medium

However, if you set proxy globally for all web accesses, you will access non-I2P, usual internet (often called “clearnet”) websites through “outproxy” sites on the I2P network. Use default (non-)proxy setting for accessing clearnet sites (*.com, *.org, etc.)

The Release of the – MaidSafe – Medium

The Release of the – MaidSafe – Medium

Crust supports hole punching so nodes can connect directly when they might otherwise not be able to. Put simply, this describes the way that Crust itself stores a dynamic list of directly-accessible peers that a node can contact if it wants to join the Network.

5 Security Vulnerabilities You Don’t Want to Overlook

Therefore, development and security teams can no longer overlook known security vulnerabilities in open source components. To combat vulnerabilities, many rely on platforms such as WhiteSource, an open source security management solution, which detects known vulnerabilities in real-time through the SDLC, including post-deployment.

SAFE-Fleming: Our Next Major Milestone – safenetwork – Medium

SAFE-Fleming: Our Next Major Milestone – safenetwork – Medium

So as we approach SAFE-Fleming, we’ll be releasing code which in aggregate will solve many of the problems that remain unsolved for many of the other decentralised projects out there today — and creating a secure Network that solves the well-known problems of scalability and security.

How to Delete Facebook and Instagram From Your Life Forever

How to Delete Facebook and Instagram From Your Life Forever

Last month, Facebook revealed that a security vulnerability exposed up to 50 million accounts to being hijacked by hackers. “It’s why we took immediate action to secure people’s accounts and fix the vulnerability.” So I pulled out my data from Facebook and purged the account.

Firefox Lightbeam – Visually Seeing the Benefits of Privacy in Real Time

Firefox Lightbeam – Visually Seeing the Benefits of Privacy in Real Time

It gives us a unique way to test our Firefox guide and see if all of the settings changes and extensions are really making a difference. This second screenshot is visiting the exact same site with the hardening guide optimizations enabled and the extensions enabled and on their default settings.

Google+ Shutting down after info from 500k Accounts is leaked

Google+ Shutting down after info from 500k Accounts is leaked

Today Google has announced that they are shutting down consumer version of Google+ after an API bug has leaked the personal information of up to 500k accounts. After performing a code review of the Google+ APIs, they discovered a bug that could leak the personal information of Google+ account users.

Google + is shutting down after a massive data breach, sending shares down

Google + is shutting down after a massive data breach, sending shares down

Google is shutting down its beleaguered Google+ social network after it discovered a software bug that gave third-parties potential access to private user data, the company writes in a blog post.

Tor Hidden Service

Relative links aside, what you are suggesting will actually serve to deanonymize you, and is worse than accessing the service over tor. you → tor client guard → tor client middle → tor client exit → tor onion exit → tor onion middle → tor onion guard → your server → tutanota server

Facebook extends account deletion grace period from 14 to 30 days

Facebook extends account deletion grace period from 14 to 30 days

Facebook recently extended the deletion grace period for terminating your main account from 14 to 30 days, the company confirmed to The Verge. “We recently increased the grace period when you choose to delete your Facebook account from 14 days to 30 days,” says a Facebook spokesperson.

Facebook Faces Potential $1.63 Billion Fine in Europe Over Data Breach

Facebook Faces Potential $1.63 Billion Fine in Europe Over Data Breach

A European Union privacy watchdog could fine Inc. FB -2.59% as much as $1.63 billion for a data breach announced Friday in which hackers compromised the accounts of more than 50 million users, if regulators find the company violated the bloc’s strict new privacy law.

Practical Privacy — Facebook Alternatives – Kelly Rush – Medium

Practical Privacy — Facebook Alternatives – Kelly Rush – Medium

While there are no social networks that are nearly as large as Facebook (or even Twitter, Instagram, etc.), the technology to replace them in a more privacy-minded way absolutely exists today.

Facebook Confirms Giving Advertisers Access to User Phone Numbers

Facebook Confirms Giving Advertisers Access to User Phone Numbers

“We are clear about how we use the information we collect, including the contact information that people upload or add to their own accounts.” In a Gizmodo report published Wednesday, two studies found that the social network was giving advertisers access to data sources that users did not explicitly permit could be used.

California passes nation’s first IoT security bill – too little too late?

California passes nation’s first IoT security bill – too little too late?

The California bill doesn’t define exactly what a ‘reasonable security feature’ would be but it mandates that connected devices come with unique passwords that users can change, which isn’t the case for many IoT products.

'I am admin' bug turns WD's My Cloud boxes into Everyone's Cloud

'I am admin' bug turns WD's My Cloud boxes into Everyone's Cloud

Researchers at infosec shop Securify revealed today the vulnerability, designated CVE-2018-17153, which allows an unauthenticated attacker with network access to the device to bypass password checks and login with admin privileges.

More