I have been using Ooma as my telephone provider for a couple of years and love the service. (I disconnected my old-fashioned telephone service years ago.) There are many features about Ooma that I love, in addition to the low cost. Ooma provides better service and higher-quality audio than the old telephone company’s service ever did. However, perhaps the best service of all is the ability to block obnoxious callers. […]
When you send an email without using encryption it can potentially be monitored, logged, analyzed and stored by your employer, your Internet service provider and other parties. In fact, Gmail and some other email services even have “software robots” that read your email messages in order to display targeted advertising. In some countries, including the United States of America, government sponsored projects have been set up to collect massive amounts […]
The Electronic Freedom Foundation has issued a year-end report of the state of privacy in the past twelve months. The report isn is positive although there are many issues yet to be addressed. The quick overview is available at http://goo.gl/6KVO2n with links to detailed articles available at https://www.eff.org/deeplinks/2014/11/2014-year-review.
Circle Internet Financial has unveiled a new Bitcoin service that includes a digital wallet for securely storing Bitcoins. The company also offers Android and Apple iOS apps to manage the wallet as well as a web-based interface. Circle is a FREE service aimed at general consumers to allow them to seamlessly import traditional currency from a linked bank account or credit card and convert the funds to Bitcoins stored in […]
Documents published this week by the German news magazine Der Speigel at http://goo.gl/xIvm1c reveal that the National Security Agency’s Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today. However, there is some good news: […]
Many Android applications collect a huge amount of user data for various purposes, without always specifically explaining why. Vocativ checked 25 of the most popular Android apps in the Google Play store, counting the number of permissions they require and looking at the kind of data they can collect once the users agrees to them, often without even reading them. In fact, Vocativ claims that some Android apps may be […]
When a Silent Circle subscriber makes a phone call, sends a text or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end from their iOS, Android or Windows PC device and is transmitted via Silent Circle’s crystal-clear, secure network. Silent Circle provides an encrypted communications service with easy-to-use tools available to all who appreciate a little control over who has access to their conversations. The […]