Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Software

Zello Walkie Talkie: Why App Downloads Are Soaring Ahead of Hurricane Florence

Are you facing a hurricane in your area? Or do you want to be able to communicate with friends and/or relatives during a hurricane and soon after? If so, read Zello Walkie Talkie: Why App Downloads Are Soaring Ahead of Hurricane Florence in the Yahoo web site at: https://yhoo.it/2p3WBTM. You can also read my previous articles about Zello by starting at: https://privacyblog.com/?s=zello.

Continue Reading →

Microsoft to ‘warn’ Windows 10 Users not to Install Chrome or Firefox

The next update to Windows 10, to be released in October, is expected to “warn” users to never install Microsoft’s biggest web browser competitors: Chrome or Firefox. The pop-up message reportedly says that these two big-time competitor are not as safe and secure as Microsoft’s own Edge browser. Don’t believe it. Experience has shown the opposite to be true: Both Chrome and Firefox have proven to be more secure than […]

Continue Reading →

Tor Browser 8.0 is Released

Tor is probably the best-known privacy network and also one of the best at protecting your personal data. It is free software for enabling anonymous communication. According to Wikipedia: The name is derived from an acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage […]

Continue Reading →

With the Next Version of Microsoft Windows, Say Goodbye To Your Windows PC As You Know It

Huge changes are coming from Microsoft. A new rumor is going around that claims Microsoft is switching from SELLING Windows to RENTING it instead. Some users think it will be an improvement while others believe it will be a major step backwards to computing in the way it was done in the 1970s when very expensive mainframes did all the computing and all data input and output by humans was […]

Continue Reading →

Which Backup Products Are Good Ones?

In my recent article, US Hospital Pays $55,000 to Hackers after Ransomware Attack, I referred to “all good backup products.” That obviously leads to the question, “Which backup products are good ones?” I do not have a list of all good backup products for all operating systems, especially for those that are designed for use in large data processing centers. I am sure there must be dozens of such products. […]

Continue Reading →

How You Can Protect Your Secrets with Encryption

News stories over the past few years about the unconstitutional actions of the National Security Agency (NSA) and other government agencies should serve as a wake-up call for all of us. Yes, there are many people and organizations trying to obtain information about you. From hackers in third-world countries, to companies trying to sell you products, to semi-secret agencies of the U.S. Government, it seems as if nearly everyone is […]

Continue Reading →