• Aug 29, 2018
  • Derek Zimmer
  • Networking, Privacy, Security,

Hardware Acceleration is Here for Routers Using OpenVPN

One of the most popular privacy uses for a VPN is setting up the service on a VPN router. The router protects the entire network behind it by routing all of the devices through your preferred VPN service by default. There‚Äôs a few big advantages to using a VPN router: -For network users, the VPN … Continue reading “Hardware Acceleration is Here for Routers Using OpenVPN”

6

How to See What Your Router is Exposing to the Internet

Is your home router a sitting duck with ports open to the world just waiting to be hacked? Let’s go over how you can check. First, it’s important to start with implementing basic defenses to secure your router. Keeping the firmware up to date on your router, changing the default password and turning off remote … Continue reading “How to See What Your Router is Exposing to the Internet”

0

If You Have a Comcast Xfinity Router, You Need to Install a VPN (Now)

If you lease an Xfinity router from internet service provider (ISP) Comcast, you need to install a VPN as soon as possible. According to security researchers Karan Saini and Ryan Stevenson, the telecom giant, which operates in 40 states as well as the District of Columbia, leaked router login informat through a website designed to … Continue reading “If You Have a Comcast Xfinity Router, You Need to Install a VPN (Now)”

1

  • Aug 31, 2017
  • Glyn Moody
  • News, Privacy, Programming, Security,

Even encrypted data streams from the Internet of Things are leaking sensitive information; here’s what we can do

As the Internet of Things (IoT) begins to enter the mainstream, concerns about the impact such “smart” devices will have on users’ privacy are growing. Many of the problems are obvious, but so far largely anecdotal. That makes a new paper from four researchers at Princeton University particularly valuable, because they analyze in detail how … Continue reading “Even encrypted data streams from the Internet of Things are leaking sensitive information; here’s what we can do”

2