Privacy deep dives

Tor over VPN
en
  • Privacy deep dives
Tor is a powerful privacy tool, but you may not want to use Tor all by itself. Learn why you may want to connect to Tor over a VPN. When you connect to the Internet, especially if you’re using public WiFi, there’s a good chance people are watching y
Smart TV privacy
en
  • Privacy deep dives
Smart TVs are essentially televisions that can watch you. Their surge in popularity, along with smart speakers, means corporations (and anyone that can hack these devices) have another window through which they can view your private activity. The dat
What is AirTag stalking?
en
  • Privacy deep dives
In an era of “smart devices” that often double as spy devices, AirTags are tracking tools that are open about their function and can be vital in helping locate lost items (as anyone who has lost their car keys can attest to). However, as a recent cla
how to flush dns blog
en
  • Privacy deep dives
A DNS cache is a record of all the websites you’ve visited over a set amount of time. Simply put, your DNS cache is a list of websites you visited in the past that’s stored on your device. Your computer uses it to speed up visits to those same websit
Open source apps like Zoom
en
  • Privacy deep dives
We already shared our top picks when it comes to private YouTube alternatives and private WhatsApp alternatives. Now, we take a detailed look at the best free Zoom alternatives that respect your privacy. Zoom is a video-conferencing platform that be
What does private DNS mean?
en
  • Privacy deep dives
DNS translates human-friendly domain names to computer-friendly IP addresses. Private DNS encrypts DNS queries made by your device to a DNS server. When used with a third-party DNS service that respects your privacy, private DNS can improve your onli
We look at privacy-friendly apps like YouTube and websites like YouTube
en
  • Privacy deep dives
In this article, we look at the best YouTube alternatives out there. We look at both alternative YouTube frontends that allow you to watch YouTube videos without Google tracking you, and true alternative streaming sites that offer content with no con
en
  • Privacy deep dives
An evil twin attack is a cyberattack that occurs when an attacker  sets up a malicious WiFi network that mimics a legitimate one, often in public places like coffee shops, airports, or hotels.  This rogue WiFi network is the “evil twin” of a legitim
en
  • Privacy deep dives
ChaCha20 is a performant and lightweight, yet highly secure, 256-bit stream cipher used to encrypt and decrypt data. It’s often used to secure data transmitted online, such as emails, messages, web traffic, and files being uploaded to the cloud.  Yo
en
  • Privacy deep dives
Freenet is a decentralized, encrypted, open-source dark web designed to let you communicate with others, upload and download content, and access online information anonymously.  Learn more about the different dark webs * What’s in a name?  * What
en
  • Privacy deep dives
Last month, Google launched a new feature for Chrome called IP Protection that makes it easier for the company to spy on you. No surprise, since this is Google’s business model. But what’s concerning is that Google is marketing this as a privacy feat