Wednesday, August 31, 2016

MiniLock: a program to keep your private files private

Image courtesy of  Yuri Samoilov at Flickr.com
The creator of an encryption program that wasn’t successful released another one with a renewed concept: making encryption so easy that anyone can do it, in order to stay protected from the prying eyes that spy on digital communications.

Espionage, a century ago, could be as simple as setting up a copper wire on an official telephone line and start eavesdropping. Today, one hundred years later, that way of spying is something to laugh at, and it may even seem endearing. Current espionage systems are so incredibly sophisticated that few words actually manage to escape the network of technological eyes that are constantly watching the digital messages circulating on the planet: SMS, emails, social networks, phone calls, and so on.

The world’s public opinion is divided between those who justify tracking and those who believe that a compulsively observed population will result in the most barbaric totalitarianism imaginable. Hackers and tech-savvy experts, though, were the first to denounce the machinery that states and governments were setting up to delve into any private space. The best known cases are those related to Julian Assange and Edward Snowden, but there are many more.

This community is also trying, with a lot more courage, to avoid an ultra-controlled future. For years, hackers have been creating encryption technologies to shield messages and making them only accessible to the person who sends and receives them. Many of them called themselves “cypherpunks”. People like Assange spent a lot of time creating free encryption systems for people to express themselves freely on the Internet. The identity and contents of a message are inaccessible except for the sender and the recipient.

For years there have been services that have been trying to stay out of this global espionage network consisting of governments and businesses. As an example we can find web browsers (Tor, Chrome’s incognito mode or Firefox’s private browsing), mail services (Lavabit, Riseup), instant messaging clients (Telegram) or search engines (DuckDuckGo).

But outside of those environments, for the average user, encryption remains a bit of a mystery. Software engineers and similar experts, however, work harder to make it easier and lighten the weight of this unprecedented network of espionage. One of those hard-working people is security consultant Nadim Kobeissi, who created and released a browser plugin that is capable of encrypting and decrypting files in just a few seconds, and was featured in an article from Wired magazine.

The program is called MiniLock. It is free and open source -you can find its source code in GitHub-, and it was presented for the first time in New York’s Hope X hacker conference in July of 2014. Kobeissi hopes to develop software so simple that anyone can use it. “It’s super simple, approachable, and it’s almost impossible to be confused using it”, said Kobeissi to the aforementioned magazine.

Image courtesy of Christiaan Colen at Flickr.com
MiniLock first appeared as a beta version and, according to its creator, it began still in an experimental phase. The extension is capable of encrypting virtually anything, ranging from videos embedded on an e-mail message to photos stored on a USB drive. These encrypted documents can also be stored, safely, on services like Dropbox or Google Drive.

In this desire for simplicity, MiniLock requires no registration or a signup process. The only thing the user has to enter is an extremely secure password, which means that it must be comprised of a combination of at least 30 letters and numbers.

Kobeissi has been working for quite a while on encryption systems. The consultant is probably better known for his Cryptocat chat program. But, according to Wired, that project had security flaws. In a pessimistic view this could mean that the hacker community can view MiniLock with a skeptical eye. An optimistic outlook may focus on something different. Kobeissi himself says that he has learned a lot from Cryptocat and he’ll avoid the mistakes he made back then. One example is the fact that he chose not to release the program right away via Google’s store. Instead, he posted the code on GitHub in order to allow other coders and experts to assess it, check it and correct it beforehand.

Information leaks have turned into a trending occurrence, an especially significant one when it comes to fighting corruption. Certain systems, such as the open-sourced SecureDrop, have allowed citizens to present documents and all kinds of complaints to major news outlets, in a secure and anonymous way, to protect the identities of the whistleblowers.

The controversy that came after Snowden’s revelations about the NSA encouraged the creation of platforms such as Trsst, a microblogging site similar to Twitter, which describes itself as “encrypted, anonymized and decentralized”.

Encrypting information will probably end up being a common practice. And maybe, hopefully before long, it will turn into something as simple as creating a zip file today.

Related contentRead Don Burns’ “Threema, a messaging app that cares about your privacy”

Tuesday, August 30, 2016

Did You Know Wireless Devices Were This Important in Today's World?

Image courtesy of Jope at Flickr.com
Telecommunication devices have come a long way from the time of smoke signals and notes on a pigeon's foot, but one of the most amazing advances has by far been the possibility of doing all of this without any of the traditional wires needed. Wireless communication does not only refer to smart-phones and Wi-Fi, it is every kind of possible communication where there is a transfer of information or power, but there is no connection whatsoever. The most common and known is the radio, which can be at short-wave and travel only a few meters, or as much as millions of kilometers for deep-space communication. You can find on the list great variety in the different types of communication like two-way radios, PDAs, GPS, garage door openers, wireless gadgets like headphones, keyboards and mice, broadcast and satellite television and of course cell phones and Wi-Fi. If you take a minute and start to really analyze how many of the devices you use on a regular basis are wireless, and not to mention which ones you’ll be using a year from now. Wireless is on the rise while offering consumers a more pleasurable experience without any of the hassle brought on by cables, and receiving the same service. 

We think wireless and of course we immediately think Wi-Fi and the advances there have been with 4G and now 5G communication, which you can read more about on the Don Burns Blogspot page, but it goes beyond that. Wireless communication, believe it or not, started off even before the 1900s when Guglielmo Marconi developed the first wireless telegraph, which started off a wave of other inventions including basic data compression, initial technology behind cellular phones, and radiotelephones during the early 1900s. From there, you could easily list the devices that started popping up in the 50s and 60s from microwave signals and satellites, which were launched into space. Around this time, some associations also started appearing with the purpose of controlling communication as it started to be implemented, among these were: The Federal Communications Commission (FCC), and the International Telecommunications Satellite Consortium (INTELSAT). In the 80s, you could definitely say there was a boom in technology and it can be said this was the birth of the cell phone, since this is when the technology we know today was refined, leading to the beginning of the “technological wars” that would establish the competition grounds for digital cellular standards in 1989. In the 90s, there’s no surprise when records are broken, and the 10 million milestone was surpassed by cell phone users and the size of the internet just continues to exponentially grow.

The 2000s brought tons of new and interesting advances that now allowed users to interact more than ever. This tech had become such a part of everyday life that in 2009 it was registered that over 6.2 billion minutes were used by clients and more than 5 billion SMS messages were sent per day, all via wireless networks. During these years, was also the creation of the iTunes and the Android Play Store bringing about a brand new way of interacting. Apps on smart phones are now integrated into almost every part of our lives, and it seems that this is not the end of it. From here there was an even more advanced integration, which is the Internet of Things (IoT), allowing users to use the internet networks to communicate with devices around the home, office or city to carry out specific tasks.


Image courtesy of ollierb at Flickr.com
So, even though this was a brief timeline, you need to also realize that there are different types of wireless signals, which will be determined by the device being used. For instance, on a TV you are either using analog video or digital video, whereas on a cell phone you are using voice, be it via analog or digital, 3G, 4G or LTE, Bluetooth, or two-way radio. Satellites can carry all types of signals independent if they carry voice, audio, video or data, or even if they do so through analog or digital. The other consideration is the frequency of the signal, which are all supported by these satellites from 3400 MHz to 23 GHz, or others. Then you Wi-Fi and Bluetooth, and finally radio which synchronizes on AM and FM radio. In this whole mix you’ll find devices that could be transmitters, receivers, or transceivers. Each of these will take on a particular role in the wireless communication service: wireless clients (which are the stations that use the connection to interact), access points (which the host of the signal), and Ad-Hoc Nodes (which allow a network of devices to connect to a specific access point).

The list could go on about devices or wireless tech, but at the end of the day the purpose of all of this is maintaining communication as we have the possibility of going mobile. There’s now doubt that there will only continue to be advances in this field in the years to come.

Tuesday, August 23, 2016

Threema, a messaging app that cares about your privacy

Image courtesy of Dr. Motte at Flickr.com
Telegram is surely the app that we usually resort to in order to demonstrate how an app can offer a very high level of security and privacy to its users, with certain characteristics such as end-to-end encryption and secure chats that take to the next level the fact that we can feel safe when we take part in a conversation with sensitive information. The developers of Telegram have struck a chord with a need that came from millions of users after the events that took place with Edward Snowden and the NSA.

Now we have another application that follows this path and that presents itself as one of the most secure ones to stay out of reach from hackers, corporations and government agencies, and, once and for all, it can be used in a completely anonymous way.

The app is called Threema and we could say that it's the opposite to the ones that we use everyday -such as WhatsApp- in terms of security and privacy.


Security comes first


Telegram is a big bet, and so is Line with the implementation of end-to-end encryption. WhatsApp would later adopt this method, though a bit later than its competitors. If we want to jump to the next level, we’ll get to Threema. It's not a free app, something that some users may not like, but those who want to have access to certain privacy and security features will shortly find in it a great destination for completely anonymous conversations.

Threema is an app developed by a company in Switzerland that has been endorsed by the German government. The servers are located in Switzerland as well and we could say that it’s one of the countries that cares the most about users’ safety and privacy.


With that being said, these servers will only store the minimal amount of information, and the users’ devices will act as clients and servers. The Swiss servers will only act as intermediaries to transfer information from one device to the other. Said information, will be encrypted.


Anti-hacker encryption

Image courtesy of  Melina Sampaio Manfrinatti at Flickr.com

Without a doubt, announcing that it will be impossible for hackers to access your private information will be an attractive statement to them, but this is due to an encryption method based in the open-source library NACl (Networking and Cryptography library). This is why in order to impede copies of information or unauthorized backdoor accesses, the encryption keys are generated and stored securely in the devices of the users, as we mentioned before. 

Threema has stated that group subscriptions and contact lists are only managed from the user’s device. Once the messages have been delivered, they delete themselves so that the files that remain locally will stay, encrypted, within the smartphone or tablet.

The following are several of Threema’s features:

  • Text messages and voice messages 
  • Sending of all kinds of files: PDF, GIF, MP3, Doc, ZIP and so on.
  • Sending images and video and the ability to share your location.
  • Group chats in which new members can be deleted at any time.
  • ID verification of contacts through personal QR codes.
It’s also worth noting that Threema doesn't require the use of a phone number or an email address. Each user receives a random ID from Threema to identify themselves.

You may not find many of your contacts with it, but it's only a matter of time. It also has a specific function in terms of privacy which differentiates it completely from other apps.

The company that created Threema is made out of -you guessed it- three employees. The startup managed in just 24 hours to double the size of their user base and the app got to the first place in the charts of paid apps in Germany.

Threema combines components of social networking with some of them coming from messaging apps and, on the other hand, apps aimed towards customization. Anonymity is definitely a key factor around which the app revolves.

The German government endorsed the usage of alternative apps for private communications. The app also allows you to find other users by syncing your contacts, but this step is completely optional. You can also share information such as your location on a map, all without leaving the app. If you want, you can exclude individual contacts from the sync process, it features an internal image viewer, a contact list that can be classified according to your needs, blocking of individual contacts, quick switching between different chat conversations, custom nicknames for unknown contacts and several other useful features that will help you keep your conversations away from eavesdroppers.

Even though it doesn't feature the option of voice calling, users can send voice messages. It's available for iOS and Android, and it’s a little less expensive if you have a Windows phone.

Related content

Read Don Burns' "The importance of cryptography in points of sale"

Monday, August 22, 2016

Some 2016 communication trends you need to know

Image courtesy of  RL GNZLZ at Flickr.com
Etymologically, the words trend and “turn” are closely related: they derive from the same Old Norse root: trendr. Trends are new directions, transformations, changes. If our time could be described with a social phenomenon, the lot of increasingly, frequent and definite trends is the right one. The communications sector is an example of how these trends occur very quickly. Some of these trends, which have had prominence in the current year, will be analyzed in this post.

Related: Find Out What Happens When the Telecommunications Industry Discovers 3D Printing

According to Forbes, communication with Millennials is a priority, and one of the ways this will be achieved more efficiently is through human capital investments in call centers. It will certainly develop the necessary technology to achieve the necessary communication.

Several call centers have invested a considerable amount of money on improving communication technologies. The aim has been, for a long time, an effective agent management and a continuous improvement of customer service. Today, the focus of many investments in this sector is real-time communication with users through virtual channels (WebRTC and SMS, for instance), because the Millennials seek, above all, direct and immediate interaction with customer service for solving their problems quickly and efficiently.

Brands will be the new activists. It’s important to keep communities together, but we need to live the experience of living among them and to see them in action. Because of the new kind of consumers, who judge everything based on economic and social policies of brands, we continue to see how brands give more weight to those political and social issues that concern people, placing values at the heart of its communication strategy.

On the other hand, virtual reality as a channel of choice is another important trend this year. While consumers need more experiences and less linear communications, virtual reality will become a key trend in the current 2016. This system has been generally used in the gaming and adult entertainment community, but content creators and communications professionals will use this kind of platforms to help people to assimilate certain realities. Users ask for new experiences in real life every day (or something that closely resembles.) Virtual reality has been very useful in the education sector (driving and flight simulators, for example), to the point that in the future will be a need to impart knowledge of all kind. Since during 2015 the technological advances in this field of communications were tremendous, this year things will move faster. “Brands not only need to ensure that they understand the impact that technology may have on the strategy,” says Don Burns, leader in the telecom industry, “they also must know when to use it and where to turn it into work.”

Image courtesy of  Tyler Pruitt at Flickr.com
In addition, in the flowcharts of companies, Youtubers may have a significant presence to stream content to workers. Companies need to decode new cultural codes, just like Youtubers: a social phenomenon of a decade that started in 2006 and has revolutionized the way information is transmitted at present.

Large 2016 marketing campaigns don’t just make noise to catch attention: they provide a good service. IBM, for example, has protected people from the rain under their ads on the street, and Samsung has set up giant screens in the back of their trucks where they project an image of the traffic through a camera on the front of the vehicle, to show drivers a good view that the truck is blocking. Marketing campaigns will be increasingly active every day.

The traditional model of 'funnel' sales belongs to the past. Consumers go directly to the end point of purchase today. While large online retailers are always seeking the amplitude, brands must seek depth. They guide their ad contents and campaigns to create a good experience with the brand. It makes it possible for consumers not only back, but remember the brand anywhere when purchasing.

The Internet of Things (IoT) is changing the way the global society communicates with itself. This phenomenon of hyper-connectivity will produce a paradigm shift of huge proportions, difficult to foresee (almost like the invention of the steam engine or the discovery of electricity.) Every day, more devices and objects of daily use are connecting to internet and providing useful information for users and businesses. In ten years, the number of smart objects will exceed the fifty billion of units. This year, more and more brands want their products to use IoT technology to improve the user experience and their sales and services as well.

Finally, the Millennials are destroying advertising. iOS 9 has allowed ad blocking, but the market is not ready to react. In 2016, brands will need to improve native advertising, as well as exploring new ways to generate notoriety in the top of the funnel (from sponsored podcasts and agreements with bloggers who are influencers, vloggers and Instagrammers), to a renewed commitment to activities experiences.

Tuesday, August 16, 2016

The importance of cryptography in points of sale

Image courtesy of hrp_images now at Flickr.com
When we analyze the security of point of sale (PoS) applications, we must keep in mind the necessary presence of magnetic bands and the data of the owners of cards, which are extremely sensitive information, both for the owner as well as for the financial institution that provides them.

In any space in which there’s information that needs to be protected and safeguarded, there lies the imperious necessity of using cryptographic solutions, the ones that originated in battlefields and which today are capable of protecting the confidentiality and integrity of said data. It's not enough to use certain safe protocols, it is also necessary and imperative to make a correct and proper implementation at a software and hardware level.

As obvious as it may seem, cryptography is an essential part of a point of sale, as well as in any other digital forms of payment used today. Complementing the pillars of confidentiality and integrity, authentication and non-repudiation come into play, which means that an operation cannot let itself be unknown to the user.

In terminals, mainly three groups of cryptographic algorithms converge which are used in heterogeneous technologies, where they mix with one another and with many architectures within the point-of-sale devices. Each one of these groups has advantages and disadvantages in relation to one another.
The main point where we will be able to distinguish great differences are linked to resource consumption, speed and even the ease of implementation in the different sections that point-of-sale devices have. The way of storing a password, the way of encrypting the communication between two points or even the degree of safety needed will be the way in which either one of the following algorithms will be implemented.

Symmetric-key algorithms



The same password is shared for the encryption and decryption of information. This algorithm is very fast, but at the same time it is less secure and it definitely needs both parts to have already exchanged their key or password to begin the communication. A couple of examples of symmetric-key cryptography are the 3DES and AES algorithms.

Asymmetric-key algorithms

Image courtesy of MIKI Yoshihito at Flickr.com
They contain two keys: a public and a private one. This way, the same one cannot be used to encrypt and decrypt the information. Both keys are generated at the same time and the private one is safeguarded, which is the one that will be used to read; and the public one is distributed, which is the one that will write, encrypting the communication. Two extensively used examples of asymmetric-key cryptography or public key infrastructure (PKI) are email messages sent through PGP (Pretty Good Privacy), or the network traffic encrypted with SSL or TLS. These are widely used in transactional websites or those that require the user to enter a set of credentials.


One-way algorithm or hash


These functions capture a variable-length information and generate an output commonly called fixed-length hash, based on the input. These functions used in cryptography have the property of being easily calculated, which is why they're widely used to store passwords, since it is difficult -in many cases- to recreate the input if only the value of the hash is known.

When it comes to encryption algorithms, size does matter


A general rule for all encryption algorithms is: the bigger, the better. This is due to the fact that the most simple way of attacking encryption is a brute force attack, testing all the possible combinations of bits, until finally the desired string is found. With the data combination processing capacity of modern computers, it is possible to apply brute force techniques to obtain relatively long passwords made out of several bits or characters.

For instance, DES with a 56 bit combination password can be cracked in less than a day. However, the addition of more bits to the string will exponentially increase the time required for the cracking process to finish. The most widely used hash algorithms are MD5 (128 bits) and SHA1 (160 bits) which curiously are not very robust when it comes to security in comparison with Triple DES or AES, both of which are recommended by the NSA.

To sum up, the diversity in the different types of point of sale devices, both in modular and compact machines, will keep rising and the telecommunication technologies will also accompany this constant evolution, generating greater indices of speed and availability. However, cryptographic algorithms in many cases don't go hand-in-hand with the development of point of sale devices from the initial stage of the design, which leaves an open window through which cyber criminals are able to break into systems and extract different types of information.

Malicious codes are able to sort these cryptographic processes in payment terminals or point of sale devices, applied in certain specific layers with the intention of capturing sensitive information.

Recent contents

Read Don Burns' "What Is Encryption And How Can It Work For Me?"

Thursday, August 11, 2016

What Is Encryption And How Can It Work For Me?


Image courtesy of Intel Free Press at Flickr.com
We truly live in an era where information has become one of the most traded commodities available. Is it possible to ensure that the information we send, receive, create and store in our devices stays safe and accessible only to those you want to share it with?

The use of encryption software has been associated with paranoid conspiracy-theory enthusiasts who believe the government is out to get them and wants to steal their information. However, as ridiculous as it may sound, they are not entirely wrong. Your information can be at risk but not exactly the way you think. Identity theft, hacking, state-sponsored snooping and even advanced steps of social hacking may take place by violating your electronic privacy accessing your files, pictures and personal computer content.

You’ve probably heard the word “encryption” many times before but are unsure of what it means exactly, how it works and what can you do to take advantage of its benefits.

First of all, encryption is a method of protecting information in a way so that only those intended by you are able to access it. Using encryption is not something new, and the basic concept of it remains the same even if the tools available to encrypt have changed. Rudimentary forms of encryption have existed since the times of the Old Kingdom of Egypt when non-standard hieroglyphics were carved in monuments. It wasn’t until around 800 AD when Al-Kindi invented a frequency-analysis technique for breaking mono-alphabetic substitution ciphers, something that proved to be the most fundamental cryptanalytic advanced until WWII.

Encryption uses algorithms to jumble data into a string of code that is complete gibberish to those who do not have permissions to see the information. Those permissions come in the form of an encryption key that decodes the information and rearranges characters and code so it can be read the way it was meant to and without the key it is impossible to decrypt the data.
Data can be encrypted in transit, meaning when the information is traveling towards its destination; or at rest, when the data is stored at a terminal or server. End-to-end encryption for communication platforms is considered the most secure. If messages are end-to-end encrypted, only the people who are having the conversation have the keys to decrypt what’s being sent.

Software for encryption is very easy to use nowadays and it doesn’t take much to get started. Here you can see a very easy info-graphic showing you all the necessary steps to do basic encryption for folders in different operative systems. 

It is important to choose an encryption key length that is strong enough to withstand any attacks or attempts to decrypt your data. An AES 128-bit encryption key is considered suitable for your security needs as it can have more than 300,000,000,000,000,000,000,000,000,000,000,000 key combinations.  
Encryption software gathers random data before encrypting your files, also known as entropy. The password you use will be part of this random data gathered to cipher the files, this is why it is very important that you choose a long passphrase, in addition, you should not use any dictionary words to avoid brute force attacks. A brute force attack consists of an automatic process where all of the dictionary words are quickly input at the password login window. As computers have become increasingly faster this can be done in a matter of hours or less using cloud computing.

Here are some tips to follow:
Image courtesy of Kevin Spencer at Flickr.com
  • Always choose an encryption program that uses a standard cipher that has been approved and tested by experts, like AES for example.
  • Do not use common dictionary words as your password, use a long passphrase made up of capital and small letters with punctuation signs and numbers that will remember and try not to write it down anywhere
  • Do not use the passphrase you use to encrypt your data for anything else like your email, Facebook or any other computer password.
  • Never trust a third party service to store your encryption keys or carry out the encryption implementation, if you store data online encrypt it yourself in your computer before uploading it.
  • Watch out for key-loggers and malware in your computer that could capture your keystrokes and your secret passphrase, use an antivirus and firewall and always keep it up to date.
  • Never reveal to anyone your password, not even to a support department whose staff could be outsourced overseas or could be impersonating someone else. Always verify personnel before giving out any of your information over the phone
All of your information is valuable and should be protected, so take the necessary steps and get in the positive habit of encrypting your files and your communicated over the web.

If you want to learn more about encrypted communications and more advances in telecommunication technologies, be sure to check out our many articles at our blog at Don Burns’ Blogspot.

Monday, August 8, 2016

Anonymity on the Internet: which is better, VPN or Tor?


Image courtesy of Blue Coat Photos at Flickr.com
Complete anonymity on the Internet is impossible and, in the best of cases, a particular phenomenon unfeasible of being maintained for extended periods of time. However, both the VPN and Tor networks help hide the user's identity from third parties. But which one of them is better? Let’s take a look at the similarities, differences, advantages and disadvantages of using VPN and Tor.

Online privacy has become a growing concern for millions of users worldwide, either due to the fact that they’re sharing all kinds of personal information with third parties such as Facebook, Google or Twitter; or to prevent possible attacks by cybercriminals; monitoring by government agencies like the NSA or to limit access to certain websites.

Even though some still believe that surfing the Internet is an anonymous activity, reality is stubborn. The incognito mode or private browsing offered by browsers like Google Chrome, Mozilla Firefox and others is not an effective method of maintaining your anonymity on the Internet, which is why more users are choosing to use a VPN or connecting through Tor.

Both are two methods of transport to surf the Internet. However, the differences between Tor and VPN networks are considerable: a VPN could be likened to an ultralight aircraft, pretty fast but also expensive; whereas Tor, could be compared with a bus, available to anyone, but much slower.


Advantages of using Tor


The purpose of Tor (The Onion Router) is anonymity when surfing the Internet. To do this, the user’s information bounces between different nodes before reaching its destination, so the last server is unable to know the location and private information such as the IP address of the source.

We said at the beginning that there’s no such thing as complete anonymity, and Tor is no exception. Although it’s one of the best systems to surf anonymously, the network’s end node decrypts the data to access the required destination by the initial user, opening the door to possible vulnerabilities. It is hard, but not impossible.

If you browse via Tor, it is essential for you to be aware of the fact that it is not a bullet-proof system. The security level is very high if you use secure connections (HTTPS), but otherwise it’s low.

To maintain your anonymity it’s essential that you avoid sending unencrypted personal information such as your email address, location or mobile phone.


Advantages of using a VPN

Image courtesy of PhOtOnQuAnTiQuE at Flickr.com
In simple terms, VPNs (Virtual Private Networks) add a private network -tunnel- on the main network of the user. Basically, a VPN grabs your connection, encrypts it and sends it to another server. Instead of your computer going directly to Google, it first accesses an intermediate server and, from there, it goes to Google.

Using a VPN is recommended, for example, when browsing within a public Wi-Fi network because otherwise you’ll be at risk of third parties seeing everything you do online. When using a tunnel, only your connection to the intermediate server will be visible, which is the one that actually makes the requests to Google, Facebook and other sites.

Another advantage of using a VPN versus the usual navigation is that you can “fool” the rest of the world about your location: if you are in New York and the VPN server you use is in London, all of the websites that you visit will believe that you are a user from England, which opens the possibility of skipping geographical limitations in all types of content.


When is it best to use Tor? And a VPN?


Although there are some providers of free services like Hola, most VPN services -the most powerful ones- are paid. By contrast, the Tor network is free by definition, because it employs the user’s connections to establish the nodes.

Anonymity in a VPN network is in any case relative, given the fact that even though they promise not to store information about their users, it is difficult to think that they can keep their promise if a court order comes.

Tor guarantees a higher level of online anonymity, as long as the the user takes some precautions, but it’s not as impenetrable as the NSA has tried to show in recent years. The biggest disadvantage of Tor is that browsing speed is very limited.

When to use a VPN? If you are an intermediate user concerned about online privacy and the use of your data by third parties the recommended option is a VPN. You will have a considerable latency, but the speed of your connection will be enough to play HD videos on sites like YouTube or Netflix.

When to use a Tor network? This system is used in situations that require a high level of anonymity, especially with the threat of governments or intelligence agencies. It’s reliable, for instance, for journalists working with sensitive documents and leaks, but the biggest disadvantage is that the connection speed is quite slow.
Recent contents

Read Don Burns’ “How The Evolution of Sensors On Smartphones Makes Life Easier”