facebook
Privacy-seekers and political activists around the world are desperate for anonymous web browsing. For this market, simple privacy is not enough*. They want online access without leaving any traces of their identities behind. Yet achieving it is difficult to say the least, thanks to the online traffic monitoring efforts and deanonymization abilities of government spy...
facebook
While there are plenty of quality VPN network options available, you can see on our rankings page that no service is perfect. One key factor that potential customers — or customers looking to improve their current service — are concerned with: reliability. It makes sense. If the network connection drops, the computer defaults back to...
facebook
Many people in the U.S. remember the heyday of Napster with dreamy nostalgia. From June 1999 to July 2001, there was an unending catalog of music available at no cost. Yet like all dreams, Napster’s heyday proved fleeting. Music industry associations and their lawyers woke everyone up with a blitz of litigation against the service...
facebook
ProtonMail is not just another browser add-on trying to catch your attention. Built by a team of CERN scientists, this encrypted email service offers state-of-the-art security balanced by seamless usability. The company is young. They just began taking open sign-ups in March. Yet it is taking the email market by storm with over one million users...
facebook
Based out of Hanover, Germany, Tutanota is an open-source, end-to-end encrypted email service. This means email text, attachments, and contacts are protected by some of the most powerful encryption standards from creation all the way through delivery. With this innovative service, users can securely manage confidential email exchanges, even if the receiving party uses old-fashioned Gmail....
facebook
PogoWasRight.Org is a news aggregation and viewpoints blog that increases awareness on key privacy issues. The site’s owner, who goes by the pseudonym “Dissent,” uses the blog to highlight the powerful reach governments and businesses have and their unrelenting efforts to expand their surveillance and data collection abilities. In a recent discussion, Dissent explained to...
facebook
Founded in Panama in 2008, NordVPN offers easy-to-use, military-grade encryption to keep customers’ data safe and private.  With 553 servers in every continent save Antarctica, the company offers a host of cutting-edge features including: mobile apps for Apple and Android, a network kill switch, a DNS leak resolver, encrypted chat, and web proxy extensions. As a...
facebook
Few entrepreneurs consider online privacy policy issues when they build their websites. Yet, as many security experts will tell you, these policies provide needed safeguards for the company and its users. So in this post, we’ll detail the elements of a successful privacy policy and provide free-to-use template language at the bottom of this page so...
facebook
VPN network users care more about privacy than general internet users. Yet thanks to the perception of privacy policies as confusing, complex documents, many of the networks’ policies go unread. At vpnMentor, we want all internet users aware of their options and privacy rights. So, we’ll use the space below to analyze and compare major...
facebook
A major debate is currently raging in the U.S. over changes to a rule that dictates how law enforcement can perform electronic searches on suspects’ computers. In this FAQ, we dive deep into Rule 41, the upcoming changes, and how this will potentially affect VPN customers in the U.S. and abroad. Click here to see...
facebook
Findings from the Pew Research Center reveal many Americans deeply value their online privacy, but only a relative few have employed “advanced measures” – like a VPN service – to increase their protection. While there are many reasons for this lack of use, misunderstandings about VPN abilities and operations prevent many potential U.S. consumers from...
facebook
For anyone interested in protecting their online privacy and security, the Invisible Internet Project (I2P) should sound intriguing. Open source developers launched the anonymous network back in the early 2000s with the goal of protecting communication from government surveillance and third party monitoring. Since then, it has evolved into end-to-end encrypted access to the Darknet....
facebook
Our blog predominantly focuses on VPN network security and privacy. Yet new research has indicated VPN users value access to better entertainment content almost as much as they value browsing anonymously. So, the performance features of the services also need analysis. In this article, we’ll dive into the research to show how prevalent VPN use has...
facebook
At the Blackhat Asia Conference in early April 2016, researchers from Northeastern University and Boston University revealed nine of the top ten Firefox extensions are vulnerable to reuse attacks. Unfortunately, this includes a few of the most popular security extensions available in the Add-on catalog. In this article, we discuss how these attacks could happen, describe...
facebook
The combination of Firefox security add-ons and browser updates can be tricky for many users. Some extensions lose effectiveness as Firefox iterates. Others make changes to core functionality that end up backfiring. And if you have an active security extension that is no longer performing well, you may be unknowingly open to cyber-attacks. So, keeping...