Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • News
  • Reviews
    Eset Smart Security Review

    Eset Smart Security Review

    Avast Premium Security Review: The Best Anti-Malware & Cybercrime Software?

    Avast Premium Security Review: The Best Anti-Malware & Cybercrime Software?

    Norton Internet Security Review

    Norton Internet Security Review

    MSI GS65 Stealth Thin 15 Review

    MSI GS65 Stealth Thin 15 Review

    ASUS Zephyrus M15 GU502LW Review

    ASUS Zephyrus M15 GU502LW Review

    Alienware Area-51m R2 Review

    Alienware Area-51m R2 Review

  • Gaming
    Best Gaming Laptops of 2022

    Best Gaming Laptops of 2022

    Most Popular Online Games in 2022

    Most Popular Online Games in 2022

    Best Gaming Consoles You Can Buy in 2022

    Best Gaming Consoles You Can Buy in 2022

    The Analogue Nt Mini NES Console Review: Play Your Favorite NES Games On The Big Screen

    The Analogue Nt Mini NES Console Review: Play Your Favorite NES Games On The Big Screen

  • Gear
    • All
    • Camera
    • Drones
    • Hardware
    • Laptop
    • Smartphone
    Cheapest 4K Graphics Cards for Gaming PC

    Cheapest 4K Graphics Cards for Gaming PC

    Best Power Supplies For Gaming in 2022

    Best Power Supplies For Gaming in 2022

    Best CPU Coolers for Ryzen 7 5800X

    Best CPU Coolers for Ryzen 7 5800X

    15 Best Smartwatches With Built-in GPS in 2022

    15 Best Smartwatches With Built-in GPS in 2022

    Lenovo Legion Y740 Review

    Lenovo Legion Y740 Review

    MSI GS65 Stealth Thin 15 Review

    MSI GS65 Stealth Thin 15 Review

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    Top 10 PC Keyboards in 2022

    Top 10 PC Keyboards in 2022

    Lenovo Legion Y740 Review

    Lenovo Legion Y740 Review

    MSI GS65 Stealth Thin 15 Review

    MSI GS65 Stealth Thin 15 Review

    ASUS Zephyrus M15 GU502LW Review

    ASUS Zephyrus M15 GU502LW Review

    Alienware Area-51m R2 Review

    Alienware Area-51m R2 Review

    Acer Predator Triton 500 PT515-51 Review

    Acer Predator Triton 500 PT515-51 Review

  • Security
    Cybersecurity & PR: How The Human Element Can Cause Breaches

    Cybersecurity & PR: How The Human Element Can Cause Breaches

    Eset Smart Security Review

    Eset Smart Security Review

    Avast Premium Security Review: The Best Anti-Malware & Cybercrime Software?

    Avast Premium Security Review: The Best Anti-Malware & Cybercrime Software?

    How To Protect Yourself While Using Public WiFi

    How To Protect Yourself While Using Public WiFi

    Norton Internet Security Review

    Norton Internet Security Review

    Google has been asked to take down over a million websites

    Google has been asked to take down over a million websites

No Result
View All Result
  • Home
  • News
  • Reviews
    Eset Smart Security Review

    Eset Smart Security Review

    Avast Premium Security Review: The Best Anti-Malware & Cybercrime Software?

    Avast Premium Security Review: The Best Anti-Malware & Cybercrime Software?

    Norton Internet Security Review

    Norton Internet Security Review

    MSI GS65 Stealth Thin 15 Review

    MSI GS65 Stealth Thin 15 Review

    ASUS Zephyrus M15 GU502LW Review

    ASUS Zephyrus M15 GU502LW Review

    Alienware Area-51m R2 Review

    Alienware Area-51m R2 Review

  • Gaming
    Best Gaming Laptops of 2022

    Best Gaming Laptops of 2022

    Most Popular Online Games in 2022

    Most Popular Online Games in 2022

    Best Gaming Consoles You Can Buy in 2022

    Best Gaming Consoles You Can Buy in 2022

    The Analogue Nt Mini NES Console Review: Play Your Favorite NES Games On The Big Screen

    The Analogue Nt Mini NES Console Review: Play Your Favorite NES Games On The Big Screen

  • Gear
    • All
    • Camera
    • Drones
    • Hardware
    • Laptop
    • Smartphone
    Cheapest 4K Graphics Cards for Gaming PC

    Cheapest 4K Graphics Cards for Gaming PC

    Best Power Supplies For Gaming in 2022

    Best Power Supplies For Gaming in 2022

    Best CPU Coolers for Ryzen 7 5800X

    Best CPU Coolers for Ryzen 7 5800X

    15 Best Smartwatches With Built-in GPS in 2022

    15 Best Smartwatches With Built-in GPS in 2022

    Lenovo Legion Y740 Review

    Lenovo Legion Y740 Review

    MSI GS65 Stealth Thin 15 Review

    MSI GS65 Stealth Thin 15 Review

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    Top 10 PC Keyboards in 2022

    Top 10 PC Keyboards in 2022

    Lenovo Legion Y740 Review

    Lenovo Legion Y740 Review

    MSI GS65 Stealth Thin 15 Review

    MSI GS65 Stealth Thin 15 Review

    ASUS Zephyrus M15 GU502LW Review

    ASUS Zephyrus M15 GU502LW Review

    Alienware Area-51m R2 Review

    Alienware Area-51m R2 Review

    Acer Predator Triton 500 PT515-51 Review

    Acer Predator Triton 500 PT515-51 Review

  • Security
    Cybersecurity & PR: How The Human Element Can Cause Breaches

    Cybersecurity & PR: How The Human Element Can Cause Breaches

    Eset Smart Security Review

    Eset Smart Security Review

    Avast Premium Security Review: The Best Anti-Malware & Cybercrime Software?

    Avast Premium Security Review: The Best Anti-Malware & Cybercrime Software?

    How To Protect Yourself While Using Public WiFi

    How To Protect Yourself While Using Public WiFi

    Norton Internet Security Review

    Norton Internet Security Review

    Google has been asked to take down over a million websites

    Google has been asked to take down over a million websites

No Result
View All Result
ITRsearch.com
No Result
View All Result

Wolverton: No perfect way to protect privacy

March 31, 2017
Reading Time: 5 mins read
A A
Home News
Share on FacebookShare on Twitter

Wolverton: No perfect way to protect privacy

Now that Congress has given internet service providers the green light to keep tabs on your online activities and do as they wish with that information, you might be wondering what you can do about it.

The good news is there are two different technical tools you can use — the Tor system and virtual private networks, or VPNs. The bad news is both tools can be difficult to use and VPNs can be costly. The even worse news is that both, but particularly VPNs, may pose an even bigger risk to your privacy and security than your broadband provider’s prying eyes.

“Those two are the best technological solutions we have,” said Kevin Riggle, a cybersecurity professional who previously worked at web company Akamai Technologies. But, he added, “neither of them are good solutions.”

Many consumers have found themselves looking for a good privacy solution following the recent passage by Congress of a resolution that would overturn privacy rules voted in place last year by the Federal Communications Commission. Those rules, which were due to take effect later this year, would have required broadband providers to seek customer approval before collecting or sharing information about them or their online activities. It would have also required companies to take “reasonable” steps to protect the data they collected and to alert customer if that data had been compromised by hackers.

Perhaps the most popular answer for consumers is to sign up for a VPN.

A virtual private network is a service that connects your computer or other device with a server on the internet. VPN services typically encrypt all the traffic between your computer or device and their servers and routes all of your online traffic — web browsing, email, videos — through those servers before sending it on to its eventual destination.

Because your data is scrambled, your broadband provider typically can’t see what sites you’re visiting or what you’re doing online when you use a VPN. They also can’t see what’s in your email or what’s on the websites you’re visiting. All they can generally see is that you are connecting to a private network.

Most VPNs are available for desktop computers and both Android and Apple smartphones. Some can be connected directly to your internet router so that all traffic through your home network passes through them. And if you’re really geeky, you can set up your own VPN using open source software called Algo that will run on your own server or on a cloud service like Amazon’s EC2.

But VPNs aren’t a perfect solution for protecting privacy. They can be difficult to configure and use. They can slow your access to online sites and services. And because security experts strongly advise users to stay away from free VPNs, you can expect to spend between $3 and $13 a month to use one.

More disturbingly, you may be less secure using a VPN than you would be otherwise. Security experts have noted that the encryption keys used by some popular virtual private networks are known and easily broken, meaning it wouldn’t be hard for someone to snoop on data you sent through them.

Potentially much worse, by using a VPN, you may be swapping the devil you know for the devil you don’t, giving the VPN provider a God’s eye view of your online activities. While many networks promise to protect your privacy and not keep track of what you do on the internet, most are black boxes and almost none of their claims have been independently verified, security experts warn.

“You basically have to have faith in them that they’re telling the truth,” said Paul Bischoff, an editor at Comparitech, a website that reviews privacy and security products.

Security experts like Bischoff recommend that you do plenty of research before signing up for a VPN. Scrutinize their privacy policies and terms of service to see what data they collect, how long they hold on to it and what they do with it. Check to see if they are using secure encryption keys. And see if there are any press reports about how they’ve responded to subpoenas or other legal requests that they turn over data.

The other option is to use Tor, which works kind of like a multistage VPN. Tor routes your online data through multiple servers and encrypts it along the way. So, like a regular VPN, it obscures your online activities from your broadband provider; all that provider can detect is that you are using Tor.

But Tor also helps shield your activities from the servers through which your data passes. And the last server in the chain, the one that connects you to your destination, doesn’t know your internet address, so it can’t tell who is trying to reach that site.

Unlike many VPNs, Tor is free to use and it’s something of a gold standard in shielding online activity.

But it too has its shortcomings. Because online traffic sent through Tor goes through multiple servers, it can be painfully slow to use, so much so that it’s typically not good to use if you’re trying to stream videos or wanting to compete with other people head-to-head in online games. Some sites even block Tor users.

Tor is typically accessed through a custom web browser. Although you can configure your computer to route your traffic through the Tor network, that’s much more difficult for the average user to do. And if you’re on an iPhone, it’s basically impossible. An app called Orbot allows Android users to connect to the Tor network and use multiple apps through it. But if you use an iPhone, your only Tor options are web browsers.

And Tor could have security problems. There have been reports that the National Security Administration and even malicious hackers are monitoring traffic on the network, and the use of Tor could draw more attention to users than they would otherwise get.

“Tor is by far the best thing we have available today,” said Riggle. “But that’s far from saying it’s perfect.”

Indeed, when it comes to protecting your activities from your broadband provider, the best solution is not a technical one but a political one — the one the FCC already came up with, and that Republicans in Congress have now chucked out the window.

Let’s block ads! (Why?)

Published at Fri, 31 Mar 2017 16:30:00 +0000

Previous Post

‘Super’ Wi-Fi may finally be coming your way

Next Post

McAfee expected back after expected Intel spin-off

Related Posts

Lenovo Legion Y740 Review
Computers

Lenovo Legion Y740 Review

May 12, 2022
Quantum Computers: The Future Of Computer Technology
News

Quantum Computers: The Future Of Computer Technology

May 10, 2022
Virtual Reality and Augmented Reality
News

Virtual Reality and Augmented Reality

May 10, 2022
Robotic Process Automation (RPA): What It Is and Why Your Business Needs It
News

Robotic Process Automation (RPA): What It Is and Why Your Business Needs It

May 10, 2022
Artificial Neural Networks (ANNs) and Deep Learning: An Overview
News

Artificial Neural Networks (ANNs) and Deep Learning: An Overview

May 10, 2022
Top 8 New Technology Trends for 2022
News

Top 8 New Technology Trends for 2022

May 10, 2022
Next Post

McAfee expected back after expected Intel spin-off

Recommended.

Blackfire’s Wireless Magnetic Speaker Provides New Mounting Opportunities for Bluetooth® Music

Blackfire’s Wireless Magnetic Speaker Provides New Mounting Opportunities for Bluetooth® Music

June 4, 2019
Larry Magid: Be safe when shopping for the holidays

Larry Magid: Be safe when shopping for the holidays

November 27, 2020

Trending.

How to talk with kids about the cyberbullying they see from famous adults

How to talk with kids about the cyberbullying they see from famous adults

July 7, 2017
Wolverton: Price right, service not with DirecTV Now

Wolverton: Price right, service not with DirecTV Now

December 8, 2016
3 money habits to carry forward from the pandemic era

3 money habits to carry forward from the pandemic era

February 22, 2021
Larry Magid: Wellness, social media and online safety

Larry Magid: Wellness, social media and online safety

March 18, 2021
How Big Data Analytics Can Help You Provide Better Experience to Your Customers

How Big Data Analytics Can Help You Provide Better Experience to Your Customers

May 10, 2022
ITRsearch.com

ITRsearch.com: time for you to read up on the latest IT industry news — and view the best tech recommendations to try. We cover numerous topics from computers, security, internet & more.

Categories

  • Apple
  • Apps
  • Camera
  • Computers
  • Drones
  • Gaming
  • Gear
  • Hardware
  • Laptop
  • Microsoft
  • News
  • Review
  • Security
  • Smartphone
  • Social Media
  • Software
  • Tech
  • Wireless

Tags

Camera Dji Facebook Fujifilm Google GoPro Instagram iPhone Macbook Pro Microsoft MSI Pinterest Shopify

Recent News

Cheapest 4K Graphics Cards for Gaming PC

Cheapest 4K Graphics Cards for Gaming PC

December 13, 2022
Best Power Supplies For Gaming in 2022

Best Power Supplies For Gaming in 2022

December 13, 2022
  • Contact Us
  • Disclaimer
  • FTC Compliance
  • Privacy Policy
  • Terms & Conditions

© 1997-2022 ITrsearch.com, All Rights Reserved.

No Result
View All Result
  • Home
  • News
  • Reviews
  • Apple
  • Computers
  • Gaming
  • Gear
    • Audio
    • Camera
    • Gear
    • Laptop
    • Smartphone
  • Microsoft
  • Security
  • Contact Us

© 1997-2022 ITrsearch.com, All Rights Reserved.