Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

Web Browsers

The Best Browsers for Privacy

From an article by Anita George in the DigitalTrends.com web site: “While speed and user-friendliness are important concerns to consider when looking for a new browser, it’s also important to find the right browser for your privacy needs. Our picks for the best browsers for privacy include a wide variety of privacy features. “In fact, consider our top pick, Brave. It’s a browser that contains many of the same features […]

Continue Reading →

RSS Is Better Than Twitter

I have to agree with Patrick Howell O’Neill who wrote an article in Gizmodo. He writes: “There is a good reason people call Twitter the hell website. “Cynicism, egos, unprovoked hostility, unchecked propaganda, sexism, bigotry, and outright hate—Twitter is as full of it as virtually anywhere online, and worse, it’s unbearably nonstop. The design of the place feels uniquely unhealthy due in large part to its speed and unrelenting stream. […]

Continue Reading →

Google Chrome Most Resilient Against Attacks, Researchers Find

Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. The researchers assessed these barriers, and concluded that: Chrome is the most resilient against attacks due to a tight lockdown of components, separation of duties, and greater identifiable vendor efforts for automated vulnerability discovery. The security level of Internet Explorer is decreased due to a weakened sandbox (Protected Mode). Microsoft […]

Continue Reading →

Apple and Google Fix Browser Bug. Microsoft Does Not.

From the Bleeping Computer web site: “Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively. “According to Cisco Talos researcher Nicolai Grødum, the vulnerability can be classified as a bypass of the Content Security Policy (CSP), a mechanism that allows website developers […]

Continue Reading →

What is the TOR Browser and How does it Work?

If you are not yet familiar with Tor Networking and the Tor Browser, I suggest you watch a YouTube video tutorial at https://youtu.be/gcEq9JDMs94 or in the video player below. The Tor Browser protects your privacy and the information you send and receive over the Internet. It makes you anonymous online. After you have watched the video, you might want to visit https://www.torproject.org to learn more and to download the and […]

Continue Reading →

How to Foil the Web Sites that Block the Ad Blockers

eMarketer found that about a quarter of all U.S. Internet users, nearly 70 million people, use technology to block online ads, either on their desktop or laptop computers or on their smartphones. I am one of those 70 million. I detest all the intrusive advertising and all the privacy-invading tracking of my online activities. Sophisticated advertising technology has led to the creepy feeling you get when, for example, an item […]

Continue Reading →