While there are plenty of quality VPN network options available, you can see on our rankings page that no service is perfect. One key factor that potential customers — or customers looking to improve their current service — are concerned with: reliability. It makes sense. If the network connection drops, the computer defaults back to...
Mozilla Firefox is a browser that is already well known for its commitment to protecting user privacy. Nevertheless, there are a lot of optional add-ons for Firefox to make your connection more secure. Many of them pull double duty by optimizing the browsing experience in addition to reinforcing privacy or security features. However, it’s important...
A major debate is currently raging in the U.S. over changes to a rule that dictates how law enforcement can perform electronic searches on suspects’ computers. In this FAQ, we dive deep into Rule 41, the upcoming changes, and how this will potentially affect VPN customers in the U.S. and abroad. Click here to see...
Findings from the Pew Research Center reveal many Americans deeply value their online privacy, but only a relative few have employed “advanced measures” – like a VPN service – to increase their protection. While there are many reasons for this lack of use, misunderstandings about VPN abilities and operations prevent many potential U.S. consumers from...
Founded in Panama in 2008,  offers easy-to-use, military-grade encryption to keep customers’ data safe and private.  With 553 servers in every continent save Antarctica, the company offers a host of cutting-edge features including: mobile apps for Apple and Android, a network kill switch, a DNS leak resolver, encrypted chat, and web proxy extensions. As a result,...
VPN network users care more about privacy than general internet users. Yet thanks to the perception of privacy policies as confusing, complex documents, many of the networks’ policies go unread. At vpnMentor, we want all internet users aware of their options and privacy rights. So, we’ll use the space below to analyze and compare major...
Few entrepreneurs consider online privacy policy issues when they build their websites. However, with the General Data Protection Regulation (GDPR) laws being passed in the EU, that will have to change if they hope to do business there. In this post, we’ll detail the elements of a successful privacy policy and provide a GDPR compliant,...
At the Blackhat Asia Conference in early April 2016, researchers from Northeastern University and Boston University revealed nine of the top ten Firefox extensions are vulnerable to reuse attacks. Unfortunately, this includes a few of the most popular security extensions available in the Add-on catalog. In this article, we discuss how these attacks could happen, describe...
Privacy-seekers and political activists around the world are desperate for anonymous web browsing. For this market, simple privacy is not enough*. They want online access without leaving any traces of their identities behind. Yet achieving it is difficult to say the least, thanks to the online traffic monitoring efforts and deanonymization abilities of government spy...
For anyone interested in protecting their online privacy and security, the Invisible Internet Project (I2P) should sound intriguing. Open source developers launched the anonymous network back in the early 2000s with the goal of protecting communication from government surveillance and third party monitoring. Since then, it has evolved into end-to-end encrypted access to the Darknet....