Macintosh Users: Encrypt and Hide Your Private Files with Hider 2

If you have something you would like to keep secret, whether it is your income tax return, your bet list you give to your bookie, or your wife’s or girlfriend’s (or both!) sizes needed for Christmas gifts, Hider 2 is the application you need. It keeps your data locked up and protected with password protection. Nobody gets into the app or your data without your password. It also optionally hides your file(s) and folder(s) so that they are invisible to Macintosh Finder, Spotlight, and other Mac applications. Family members who share your computer or online spies who access it remotely will not find or decode files that have been encrypted and hidden with Hider 2.

In short, as mentioned on the application’s web site, “Hider 2 is the Fort Knox of digital storage. Anything and everything you hide with Hider 2 is tightly locked up and hidden, making it ultra-secure.”

Continue reading

The Senate just Voted to Eliminate Any Internet Privacy You May Have Had

Senate lawmakers voted Thursday to repeal a historic set of rules aimed at protecting consumers’ online data from their own Internet providers, in a move that could make it easier for broadband companies to sell and share their customers’ usage information for advertising purposes. You can thank your senators for giving away your privacy and helping businesses (that probably contributed campaign funds to the politicians) track your every online movement.

U.S. senators voted 50 to 48 to approve a joint resolution from Sen. Jeff Flake (R-Ariz.) that would prevent the Federal Communications Commission’s privacy rules from going into effect. The resolution also would bar the FCC from ever enacting similar consumer protections. It now heads to the House.

You can find dozens of stories about this stupid bit of legislation by starting at http://bit.ly/2nee7D4.

NOTE: Most of the online tracking can be blocked by using a VPN. That makes your web use invisible to your Internet service provider and to most everyone else. This piece of legislation is just one more reason why you should use a VPN all the time, regardless of the politician’s disdain for your privacy.

Microsoft’s Edge Browser was the Most Hacked Browser at the Pwn2Own 2017 Conference, While Chrome Remained Unhackable

At the Pwn2Own 2017 hacking event, Microsoft’s Edge browser proved itself to be the least secure browser at the event, after it was hacked no less than five times. Google’s Chrome browser, on the other hand, remained unhackable during the contest.

You can read all about it in Tom’s Hardware at: http://www.tomshardware.com/news/pwn2own-2017-microsoft-edge-hacked,33940.html

Which web browser are YOU using?

Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections

Internet Service Providers (ISPs) have a history of invading their customers’ privacy until they caught at it. History has shown that ISPs in the past have sold data to marketeers (and apparently still do that), hijacked customers’ searches and directed them to paid advertising sites instead, inserted ads into web pages you view which did not contain advertising otherwise, and performed other objectionable things to your web usage.

Now new efforts by the Trump administration are trying to repeal all the privacy restrictions put in place by the FCC in recent years. If successful, the result will be “open season” on consumers by ISPs who will be free to do whatever spying and hijacking they wish. Examples of what could happen if we don’t stop Congress now are given in an article by Jeremy Gillula in the Electronic Frontier Foundation’s web site at: http://bit.ly/2naIFas.

NOTE: Most of these actions can be blocked by using a VPN. That makes your web use invisible to your ISP. That is just one more reason why you should use a VPN all the time, regardless of the FCC’s actions.

What the CIA WikiLeaks Dump Tells Us: Encryption Works

“If the tech industry is drawing one lesson from the latest WikiLeaks disclosures, it’s that data-scrambling encryption works,” writes the Associated Press, “and the industry should use more of it.” An anonymous reader quotes their report:

Documents purportedly outlining a massive CIA surveillance program suggest that CIA agents must go to great lengths to circumvent encryption they can’t break. In many cases, physical presence is required to carry off these targeted attacks. “We are in a world where if the U.S. government wants to get your data, they can’t hope to break the encryption,” said Nicholas Weaver, who teaches networking and security at the University of California, Berkeley. “They have to resort to targeted attacks, and that is costly, risky and the kind of thing you do only on targets you care about. Seeing the CIA have to do stuff like this should reassure civil libertarians that the situation is better now than it was four years ago”… Cindy Cohn, executive director for Electronic Frontier Foundation, a group focused on online privacy, likened the CIA’s approach to “fishing with a line and pole rather than fishing with a driftnet.”

Continue reading

Do Macs Need Antivirus or AntiMalware Software?

Not really.

If you own a Macintosh or are thinking of switching to a Mac, you might want to read an article by Steve Sande in the Rocket Yard web site. He writes:

“One reason that many people move from the world of Windows to macOS is because they’re tired of the hassles of having their PCs infected with viruses and other malware. The other reason? The miseries of the tools that allegedly fix those problems but cause even new PCs to run slowly and crash more often. When new Mac owners first set up their new machines, one question they may have is whether or not they’re taking a risk by not installing that same genre of application on their Macs.

“The answer to the question “Do Macs need antivirus or anti-malware software?” is “No, but…” As a Mac user since late 1984, I have never had a virus, and I’ve rarely seen malware that caused an issue for more than just a few minutes. That includes the early days of Mac when the operating system wasn’t Unix-based with all of its built-in security features.

“So, as a longtime Mac owner and user, a former Mac consultant, and a writer specializing in the world of Apple devices, I’ve usually used my Macs with absolutely no anti-virus or anti-malware software.

“Am I just lucky? Not really”

Continue reading