From an article by Anita George in the DigitalTrends.com web site: “While speed and user-friendliness are important concerns to consider when looking for a new browser, it’s also important to find the right browser for your privacy needs. Our picks for the best browsers for privacy include a wide variety of privacy features. “In fact, consider our top pick, Brave. It’s a browser that contains many of the same features […]
If you are concerned about personal privacy and if you also use the Chrome web browser, you NEED to read a recent article by Geoffrey A. Fowler in The Mercury News web site at: https://bayareane.ws/2X0sYRZ. Next, read Best Browsers for Privacy and Security at http://bit.ly/2x9CwQ3 and then make up your own mind which solution is best for you.
I have to agree with Patrick Howell O’Neill who wrote an article in Gizmodo. He writes: “There is a good reason people call Twitter the hell website. “Cynicism, egos, unprovoked hostility, unchecked propaganda, sexism, bigotry, and outright hate—Twitter is as full of it as virtually anywhere online, and worse, it’s unbearably nonstop. The design of the place feels uniquely unhealthy due in large part to its speed and unrelenting stream. […]
Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. The researchers assessed these barriers, and concluded that: Chrome is the most resilient against attacks due to a tight lockdown of components, separation of duties, and greater identifiable vendor efforts for automated vulnerability discovery. The security level of Internet Explorer is decreased due to a weakened sandbox (Protected Mode). Microsoft […]
From the Bleeping Computer web site: “Microsoft has declined to patch a security bug Cisco Talos researchers discovered in the Edge browser, claiming the reported issue is by design. Apple and Google patched a similar flaw in Safari (CVE-2017-2419) and Chrome (CVE-2017-5033), respectively. “According to Cisco Talos researcher Nicolai Grødum, the vulnerability can be classified as a bypass of the Content Security Policy (CSP), a mechanism that allows website developers […]
If you are not yet familiar with Tor Networking and the Tor Browser, I suggest you watch a YouTube video tutorial at https://youtu.be/gcEq9JDMs94 or in the video player below. The Tor Browser protects your privacy and the information you send and receive over the Internet. It makes you anonymous online. After you have watched the video, you might want to visit https://www.torproject.org to learn more and to download the and […]
eMarketer found that about a quarter of all U.S. Internet users, nearly 70 million people, use technology to block online ads, either on their desktop or laptop computers or on their smartphones. I am one of those 70 million. I detest all the intrusive advertising and all the privacy-invading tracking of my online activities. Sophisticated advertising technology has led to the creepy feeling you get when, for example, an item […]