Multi-Account Containers Add-on Sync Feature

Multi-Account Containers Add-on Sync Feature

The Multi-Account Containers Add-on will now sync your container configuration and site assignments.Firefox Multi-Account Containers allows users to separate their online identities into different tab types called Containers.This privacy feature allows users to assign sites to only open in a specific Container.

Mashio.NET - Matthew Walther

Mashio.NET - Matthew Walther

Providers like Google, Apple, Amazon, and Microsoft can, and have, cut people off from the data and services that they rely on to run their lives, businesses, and communities.

Mozilla is ramping up its program to stop snooping ISPs

Mozilla is ramping up its program to stop snooping ISPs

To eliminate the temptation for ISPs to peek, Mozilla began offering a service that encrypts DNS requests and sends them to providers that pledge not to log or share your data, rather than to your ISP’s own, unencrypted DNS server.

Microsoft says it will follow California's digital privacy law in U.S.

Microsoft says it will follow California's digital privacy law in U.S.

WASHINGTON (Reuters) - Microsoft Corp said in a blog post on Monday that it would honor California’s privacy law throughout the United States, expanding the impact of a strict set of rules meant to protect consumers and their data.

Google reveals ‘Project Nightingale’ after being accused of secretly gathering personal health records

Google reveals ‘Project Nightingale’ after being accused of secretly gathering personal health records

The Wall Street Journal’s Rob Copeland wrote that the data amassed in the program includes “lab results, doctor diagnoses and hospitalization records, among other categories, and amounts to a complete health history, complete with patient names and dates of birth,” and that as many as 150 Google employees may have had access to the data.

It’s Very Easy to Get Your Hands on Cell Phone Location Data

It’s Very Easy to Get Your Hands on Cell Phone Location Data

Photo-Illustration: Konstantin Sergeyev/Intelligencer; Photo: Alberto Cabanillas/Getty Images/EyeEm. If recent privacy scandals have taught us anything, it’s that industries reliant on monetizing user data have little or no enforcement procedures in place for preventing the abuse of that data.The most recent example of this comes from a large report from Motherboard concerning how telecom companies resell user location data.

Tutanota is blocked in Egypt. Here's what you can do.

Tutanota is blocked in Egypt. Here's what you can do.

Whenever a site is blocked in your country or by your Internet Service Provider (ISP), you can access this site with the help of the Tor browser or via a VPN.

VA shares electronic health records

VA shares electronic health records

If you plan on receiving care in the U.S. from VA and/or a participating community care provider, then you need to opt out by submitting VA Form 10-10164 if you do not want to share your health information.

Why big ISPs aren’t happy about Google’s plans for encrypted DNS

Why big ISPs aren’t happy about Google’s plans for encrypted DNS

Google and Mozilla are trying to address these concerns by adding support in their browsers for sending DNS queries over the encrypted HTTPS protocol.Despite insinuations from telecom companies, Google says, the company has no plans to switch Chrome users to its own DNS servers.

Presbyterian Healthcare Services Reports Data Security Breach

Presbyterian Healthcare Services Reports Data Security Breach

Presbyterian Healthcare Services (PHS) issued a statement on its website acknowledging a data security incident from early May that affected more than 180,000 patients.

Don’t Let Encrypted Messaging Become a Hollow Promise

Don’t Let Encrypted Messaging Become a Hollow Promise

EFF considers the following signs that a messenger is not delivering end-to-end encryption: client-side scanning, law enforcement “ghosts,” and unencrypted backups. But because services like PhotoDNA run on company servers, they cannot be used with an end-to-end encrypted messaging service, leading to the proposal that providers of these services should do this scanning “client-side,” on the device itself.

Google’s Gmail scans, parses, analyzes and catalogs your email

Google’s Gmail scans, parses, analyzes and catalogs your email

First, it means that in order to isolate and parse purchases, Google must then be scanning every email, otherwise, how would they know what’s a purchase and what isn’t? I still couldn’t believe that Google was in essence reading your email and cataloging your purchases on it’s own.

Dnscrypt.ca: Snork's DNSCrypt Servers

Dnscrypt.ca: Snork's DNSCrypt Servers

There is no record of who connects to these servers, or what names they resolve to IP addresses. As a result, it might be possible for someone to know what DNS names you are requesting, and ultimately what services you are using (even if you are connecting to an encrypted service).

P410n3 - blog: Trust is good, cryptography is better

P410n3 - blog: Trust is good, cryptography is better

This is what many people refer to as a "Threat Model".What I am saying is: When choosing a cloud storage provider, we should think about our personal privacy and security, as these two things go hand in hand these days.

Court Throws out Lawsuit Against Tor for Providing Anonymous Routing

Court Throws out Lawsuit Against Tor for Providing Anonymous Routing

The parents of G.S. have brought suit against the website that sold the drug to G.S., the service provider that created the network through which G.S. was able to access the website on the dark web (Tor), and the mail service that sent the drug to G.S. Plaintiffs have brought claims for strict products liability, negligence, abnormally dangerous activity, and civil conspiracy.

How To Stop Using Free Email

How To Stop Using Free Email

So for most free services like Gmail, Yahoo, or Hotmail, you're not going to be able to use your existing email address with a different email provider. The next thing you want to do is update all your online accounts that use your old address to contact you.

How I Became Untraceable on the Web.

How I Became Untraceable on the Web.

It’s pretty simple: If John selects France on his VPN service, all his data will first go through one of the servers of his VPN provider in France and then “reach” the website. It’s really great for privacy, but the user interface is horrible.

Neutrino Saga Reveals Coinbase User Data Was Leaked

Neutrino Saga Reveals Coinbase User Data Was Leaked

Now, a Coinbase executive has reportedly gone on record to state that a previous intelligence firm hired by the exchange was caught selling customer data to third parties for a profit.

Who's misusing your personal data? Why we need federal privacy protection regulations.

Who's misusing your personal data? Why we need federal privacy protection regulations.

While not exhaustive, there are a few principles that can help ensure the United States protects its citizens from the loss and misuse of their personal data while incorporating our own unique understanding of constitutionally-protected privacy and free speech.

How to Make Your VPN Connection More Secure: A Beginners Guide

How to Make Your VPN Connection More Secure: A Beginners Guide

Stop DNS leaks When you use a VPN, you connect to the internet with the DNS server given by your VPN provider. With a kill switch, your internet connection will be blocked completely if there’s a problem with the VPN, which keeps your true IP address hidden.

How to browse the web securely and privately

How to browse the web securely and privately

Gift Guide: The best security and privacy tech to keep your friends safe You’ll need a secure DNS What does it mean that “your internet provider knows what sites you visit,” anyway? Most devices automatically use the resolver that’s set by the network you’re connected to — usually your internet provider.

VPN + Tor: Not Necessarily a Net Gain

VPN + Tor: Not Necessarily a Net Gain

Users don't have to trust every Tor relay that they use in order to stay safe with Tor. As long as the right ones aren't compromised, working together, or otherwise malicious, the user stays protected.

On Ghost Users and Messaging Backdoors

On Ghost Users and Messaging Backdoors

Indeed, Levy and Robinson make a concrete proposal in the article above: they offer a new solution designed to surveil both encrypted messaging and phone calls. Due to this need for extensive server and client modifications, the GCHQ proposal actually represents a very significant change to the design of messaging systems.

On Ghost Users and Messaging Backdoors

On Ghost Users and Messaging Backdoors

(Certain designs like Signal are already hardened against these changes, because group chat setup is handled in an end-to-end encrypted/authenticated fashion by clients, and the server can’t just insert users.

Bulk SMS Service Provider In Bangalore-Best SMS Service

Bulk SMS Service Provider In Bangalore-Best SMS Service

Integrate our bulk sms API with java, php, http scripts. We not only deal with bulk sms but also we are cloud telephony service provider. We are the fastest growing Bulk sms service provider in Bangalore.

How to Use a VPN to Improve Security on Your MacOS Device

How to Use a VPN to Improve Security on Your MacOS Device

If your VPN provider doesn’t have a custom app for Mac and you want to use OpenVPN, you’ll need to use the Tunnelblick app. Download and install the Tunnelblick app for Mac. Get the configuration package from your VPN provider and unzip it.

How to Use a VPN to Improve Security on Windows

How to Use a VPN to Improve Security on Windows

Enter the username and password as given in the email from Private Internet Access and click on Save. If you’ve purchased VPN services through a provider that doesn’t offer a custom app, you’ll need to work a bit harder.

How to Use a VPN to Improve Security on Your iOS Device

How to Use a VPN to Improve Security on Your iOS Device

If your VPN provider doesn’t have a custom app, iOS will let you configure the VPN using its inbuilt settings. Now that you’ve installed a VPN on your device, make sure you connect to it whenever you go online to improve your security.

How to Use a VPN to Improve Security on Your Android Device

How to Use a VPN to Improve Security on Your Android Device

Since Android doesn’t offer inbuilt support for OpenVPN, you’ll need to use this app. While Android doesn’t offer inbuilt support for OpenVPN, it does let you connect to PPTP and L2TP.

Schneier on Security

Schneier on Security

To remain anonymous and secure on the Internet, invest in a Virtual Private Network account, but remember, the bad guys are very smart, so by the time this column runs, they may have figured out a way to hack into a VPN.