• Oct 4, 2018
  • Derek Zimmer
  • Networking, Open Source, Privacy, Security,

uMatrix – A Powerful Firefox Extension to Enhance Security and Privacy

Today we are going to talk about uMatrix, a more powerful cousin of the uBlock Origin ad-blocker. uMatrix adds Cookie, CSS, Media/Image, Script, XML Http Requests (XHR), Frame, and other types of blocking to your security and privacy arsenal, and it allows the user to fine tune each of these types of blocking to the … Continue reading “uMatrix – A Powerful Firefox Extension to Enhance Security and Privacy”

2

  • Sep 15, 2018
  • Glyn Moody
  • Governments, Networking, Privacy,

Here come connected vehicles and urban analytics: what do they mean for privacy?

Electric vehicles and driverless cars may get the headlines, but the real revolution on roads is happening elsewhere, silently and out of sight. For twenty years, more and more digital technology has been added to vehicles. Today, they have almost become computers that have wheels and engines. That’s been made possible in part by the … Continue reading “Here come connected vehicles and urban analytics: what do they mean for privacy?”

0

  • Sep 5, 2018
  • Derek Zimmer
  • Networking, Open Source, Privacy, Security,

The Current Status of WireGuard VPNs – Are We There Yet?

In security circles, WireGuard is an exciting proposition. It is a modern, open-source VPN client and server system that is highly streamlined, lean, and easy to review due to its simplicity. Conceptually, this is something we have been seeing a hard push for in both cryptography and security circles. Code needs to be simple, have … Continue reading “The Current Status of WireGuard VPNs – Are We There Yet?”

8

  • Aug 29, 2018
  • Derek Zimmer
  • Networking, Privacy, Security,

Hardware Acceleration is Here for Routers Using OpenVPN

One of the most popular privacy uses for a VPN is setting up the service on a VPN router. The router protects the entire network behind it by routing all of the devices through your preferred VPN service by default. There‚Äôs a few big advantages to using a VPN router: -For network users, the VPN … Continue reading “Hardware Acceleration is Here for Routers Using OpenVPN”

10

How to See What Your Router is Exposing to the Internet

Is your home router a sitting duck with ports open to the world just waiting to be hacked? Let’s go over how you can check. First, it’s important to start with implementing basic defenses to secure your router. Keeping the firmware up to date on your router, changing the default password and turning off remote … Continue reading “How to See What Your Router is Exposing to the Internet”

0

  • Aug 15, 2018
  • Derek Zimmer
  • Governments, Networking, Privacy, Security,

TLS 1.3 is Coming – an Opportunity for Amazon, Google and Microsoft to End Censorship

A new standard for cryptography is on the horizon, called Transport Level Security 1.3 (TLS 1.3). TLS 1.3 is a major update to cryptography, and fundamentally changes how websites and services will handle negotiating and executing encrypted services. Among the big improvements are faster handshakes with websites (meaning faster page load times), new ciphers (new … Continue reading “TLS 1.3 is Coming – an Opportunity for Amazon, Google and Microsoft to End Censorship”

0

  • Aug 4, 2018
  • Glyn Moody
  • Governments, Net Neutrality, Networking, News, Privacy, Security,

Dedicated first responder network raises privacy, transparency and net neutrality issues

Providing first responders such as the police, fire services and paramedics with the best available technology makes sense. Lives can be saved and disasters averted if action is taken as promptly as possible, and key information shared widely among relevant personnel. But as previous posts on Privacy News Online have noted, the enhanced capabilities of … Continue reading “Dedicated first responder network raises privacy, transparency and net neutrality issues”

0

Performing Ethical Hacking Through a VPN Service for a Full Attack Simulation

A major difficulty in defending against attackers and performing accurate attribution, lies in the fact that threat actors often route their traffic through the proverbial seven proxies. Defenders often spend many hours determining the source of malicious traffic, only to find that the attacker has compromised the web server of an unrelated victim somewhere on … Continue reading “Performing Ethical Hacking Through a VPN Service for a Full Attack Simulation”

0

  • Jul 25, 2018
  • Derek Zimmer
  • Governments, Networking, Open Source, Privacy, Security,

The Internet Cannot be Trusted – Beamsplitters, Backdoors, and Broken Promises

We all know that the Internet is not a fundamentally safe place. With the tremendous gains in information sharing and the conveniences that the Internet brings, come opportunities for exploitation. Fraud, harassment, surveillance, censorship, social and political manipulation, industrial and political espionage, data theft and discrimination have all taken hold in one of the greatest … Continue reading “The Internet Cannot be Trusted – Beamsplitters, Backdoors, and Broken Promises”

0

How to Use Private Internet Access and Tor: Tor over VPN or VPN over Tor?

A big question for those who consider internet privacy essential is how to best use Tor in combination with a VPN service provider like Private Internet Access. Should a Tor connection be tunneled inside an already established VPN connection, or should a VPN connection be tunneled inside an already established Tor connection? Before you can … Continue reading “How to Use Private Internet Access and Tor: Tor over VPN or VPN over Tor?”

0