Privacy News Online
  • PIA Homepage
  • Privacy News
    • Bitcoin
    • BitTorrent
    • Copyright
    • Governments
    • Guides
    • IRC
    • Linux
    • Net Neutrality
    • Networking
    • News
    • Open Source
    • Privacy
    • Programming
    • Security
    • Tutorials
      • Browsers
      • Encryption
      • Online Activity
      • Operating Systems
  • Authors
  • Contact

Tutorials

Firefox Extensions are Temporarily Broken for Most Users – What Happened and How to Fix

Posted on May 4, 2019 by Derek Zimmer

What Happened? Today, many users were met with an error saying that their extensions were no longer valid and have been disabled by Firefox. This is because in mid-2018, Mozilla…

Categories: Browsers, Mozilla Firefox, News, Tutorials

Preparing for Travel – Properly Backing Up Your Android Cell Phone

Posted on Mar 20, 2019 by Derek Zimmer

When I prepare for travel, I take some steps to make sure that my protected data will not be read or otherwise mishandled by customs. I then follow-up with rigorous…

Categories: Privacy, Security, Tutorials

Testing your web browser for cryptojacking

Posted on Jan 12, 2019 by Sean Doyle

Cryptojacking or cryptocurrency mining is the covert use of your computer's Central Processing Unit (CPU) and Graphics Processing unit (GPU) to mine for cryptocurrency. With the rise of cryptocurrency, cryptojacking…

Categories: Bitcoin, Cryptocurrency, General Privacy and Security, Online Activity, Tutorials

Buying Bitcoin? 4 Criteria For Choosing the Right Crypto Exchange

Posted on Jan 11, 2019 by Ben Brown

Your first foray into cryptocurrency will almost certainly take place on a cryptocurrency exchange - a place for buying and selling bitcoin. Travel back in time a few years, and…

Categories: Bitcoin, Cryptocurrency, Tutorials

How to permanently delete files in Windows with Cipher

Posted on Jan 8, 2019 by Sean Doyle

When you delete a file in Windows, all it really does, is delete an entry in the master file table that tells the computer where the actual file is stored. …

Categories: Microsoft Windows, Operating Systems, Tutorials

Cyberstalking: Definition, Laws, and How to Stay Safe

Posted on Jan 5, 2019 by Ashley Perna

Cyberstalking is a serious crime with scary statistics. Most people are victimized for an average of two years, which can have serious consequences on your emotional and mental health. Despite…

Categories: General Privacy and Security, Online Activity, Tutorials

Changing Your DNS Settings on Windows 10

Posted on Jan 4, 2019 by Chris Miller

If you’ve never changed your DNS address, you’re probably still using the one given to you by your ISP. It’s really easy to change the DNS server and by doing…

Categories: General Privacy and Security, Microsoft Windows, Online Activity, Operating Systems, Tutorials

How to Unblock Wikipedia

Posted on Jan 4, 2019 by Summer Hirst

Whether you’re writing a school essay or looking for a piece of information online, Wikipedia can be a helpful resource. The English Wikipedia has over 5 million educational articles, which…

Categories: Online Activity, Tutorials, VPN

How to Make Your VPN Connection More Secure: A Beginners Guide

Posted on Jan 3, 2019 by Summer Hirst

VPN services are used to make your internet connection more secure. But this doesn’t mean VPN connections cannot be decrypted. If the people spying on you have all the right…

Categories: Online Activity, Tutorials, VPN

How to Know if You’re Being Tracked on the Internet

Posted on Jan 2, 2019 by Summer Hirst

You just spoke to your family about how you need a new juicer. When you go online, you see ads for juicers everywhere. And you didn’t even search for a…

Categories: General Privacy and Security, Online Activity, Tutorials
  Older Posts
VPN Service
Latest News
  • Private Internet Access updates Linux desktop client to prevent against [CVE-2019-14899]
  • Apple explains location seeking behavior on iPhone 11 Pro
  • Roll-out of facial recognition by governments around the world accelerates as privacy experts sound the alarm
  • iPhone 11 Pro phones home with user location even when told not to
  • Google’s “smart city” in Toronto: what it wanted, what it will now get – and why it’s still problematic for privacy
Popular posts
  • The Gift of Privacy
  • A Private Net Is Just As Fundamental A Right As Freedom Of Speech
  • Wiretapping Today Just Doesn’t Mean What The Word Meant In The 1990s, So Don’t Fall For That Lie
  • iPhone 6, New Samsung & Blackberry Phones Highlight Security Demands
  • Tax Authority Demands Customer Data From Bitcoin Exchange: Demands Trackability Of Everybody’s Past, Present, And Future
Tag cloud
facial recognition google internet censorship Apple isp biometrics gdpr internet privacy tracking india canada privacy mass surveillance dna internet of things france encryption russia microsoft AI nsa surveillance gchq Facebook amazon australia bitcoin security china whatsapp vpn germany censorship tor copyright united kingdom police fcc uk ajit pai malware cryptocurrency net neutrality EU advertising

VPN Service

Why

  • Hide My IP
  • Public Wifi Security
  • Internet Security
  • Prevent Data Theft
  • FaceNiff and Firesheep
  • Free vs Paid
  • Snooper's Charter
  • Browse Anonymously
  • Identity Protection
  • Internet of Things Security
  • Hide My Location
  • Tor vs VPN vs Proxy
  • UN Recommends Encryption
  • Privacy from your ISP

Navigation

  • VPN Service
  • VPN Encryption
  • How it Works
  • About Us
  • Downloads
  • VPN Forum
  • VPN Affiliates
  • Jobs
  • PIA In The Media
  • PIA On The Web
  • Buy VPN
  • What's my IP?
  • VPN Reviews
  • Client Support
  • Network
  • VPN Blog
  • Companies We Support
  • PIA Site Map
  • Android VPN App
  • iOS VPN App

Legal

  • Terms of Service
  • Privacy Policy
  • DMCA Policy
  • Export Control Policy

Copyright

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Private Internet Access and London Trust Media, Inc. assume no responsibility for any errors or omissions in the content. The views expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of Private Internet Access, London Trust Media, Inc. or any related or affiliated entities or persons.

Social Media