Posts tagged “protection

Stop VPN and Tor Bias

In an age where governments spy on it’s own, common carriers such as AT&T and Comcast want to sell your data for profit and the NSA can spy on every communication channel that we have — is it so much to want a taste of anonymity online?


VPNs, Tor and other privacy tools have become synonymous with the “dark web” and online hacking; however, these tools are built to protect users; however, intelligent individuals can also use them to get away with certain activities online.  But what about the sophisticated user, who simply wants to protect his internet traffic from prying eyes and be safe online?  Why do some look at those people as if they are doing something wrong when they aren’t?  It’s simple: they are biased and ignorant.  Not only are they biased, they may not fully understand the technology if they only limit it to one side of the equation.

635880340972740241343053941_internet-surveillance

I’ve spoken in depth about how VPNs (Virtual Private Network)s work and how I really don’t believe you should connect to the internet, especially any public WiFi without first being connected to one because it sends all of the traffic from your device through an encrypted tunnel to another host that allows you to browse the internet in that fashion, making your traffic look like a jumbled mess to anyone trying to snoop.  (Of course remember to sign up for a VPN provider that doesn’t log, such as Private Internet Access).  So, what is Tor?  Tor is a protocol that was actually implemented by the US government that sends your traffic, encrypted, through a series of relays (relays are formed from machines that are volunteered to the Tor network), usually thousands before reaching the final destination.  Usually browsing the web through Tor is a little slow because of this.


The one thing that a VPN and Tor has in common is that when viewed on a network where no one else uses these tools, your network traffic will look quite different, which could lead to someone believe that you are doing something insidious; however, now that you know how these tools work, you won’t think that way anymore, right?

TLDR; Since our electronic landscape is becoming scrutinized more and more to serve us ads, track us down and garner our personal information without our consent, users have the RIGHT to protect themselves, we’re not all hackers, most of us just want our information we transfer online to be private — deal with it.

Protect Your Investment

We are walking around with $800 super computers in our pockets…. sort of.  It’s 2017 and we all have smartphones that consume our lives and make them easier at the same time; however, some users wear a cracked screen like a badge of honor — I see it as simply not caring.


Most users, who do not use cases, tend to marvel at the industrial design of their devices (cue Apple fans — I’m one myself); however, there are numerous cases which compliment the design of the phone, such as ones that are made by the OEM itself.  Apple cases are just as beautiful as the iPhone that it produces because it is designed to give you protection, extra grip and still look great — with all of these options out there ranging from ultra cheap to expensive it’s something out there for everyone.

iPhonewCases

 Note there are a few things that one should look for when purchasing a great case:

  1. Fit. Fit of the case should be tight so that the phone would not become easily dislodged if a drop occurred.
  2. Finish. The case itself should be of good quality from a reputable brand such as Apple, Spigen, Caseology or others.
  3. Clickability. Yup, just made that word up, but clickability comes down to the user being able to press (or click) a power or volume button with acceptable feedback, the button should never feel like mush or soft.

Protect your device.  A $10 case could end up being the difference of a functional device versus a device that must be sent off to the manufacturer or one that can put tiny shards of glass into your fingertips or face.