Stop Sharing your Personal Information

How to Prevent your Personal Information from Leaking and Spreading Online This is the third part of our five-part series on Preventing Identity Theft & Doxing. One of the best ways to keep your personal information private and prevent it from ending up online is to stop sharing it in the first place. That may […]

Continue reading

How to Prevent Identity Theft & Doxing including for Free

Identity Theft Prevention, Doxing Protection & Removing your Personal Information Online Learn about identity theft prevention and doxing protection and how to prevent these rising crimes in the first place. Our materials cover all the practical steps you can take to protect yourself from identity theft prevention and doxing attacks. These posts are long and […]

Continue reading

How to Watch Olympics Online

Guide to Live Streaming the 2016 Rio Olympic Games The days are ticking by for the greatest athletics show on Earth — the 2016 Summer Olympics — in Rio de Janeiro, Brazil. With 10,500 athletes from 206 nations competing in 28 sports over 17 days and in 306 events, it is shaping up to be […]

Continue reading

WebTorrent is NOT an Anonymous Torrent File-sharing Method

Before Jumping on the WebTorrent Bandwagon, Read this and Stay Safe The technology behind free, open source WebTorrent (and its Desktop counterparts) certainly commands attention. If you visit their website at https://webtorrent.io/ an impressive demo starts right away and within seconds a high-quality movie is being streamed to your display. WebTorrent supports traditional .torrent files and magnet links […]

Continue reading
1

Why is Piracy Still Thriving?

Despite affordable streaming services, the many alternative methods for downloading TV shows & movies online continue to be popular With Amazon Prime USA (UK version), Netflix and Hulu now the same cost as other ways (arguably less legitimate ways) that people obtain TV shows and movies, why are people not migrating to these streaming services? […]

Continue reading

Veilig gebruik van torrents

Dit zijn de stappen om veilig en anoniem torrents te gebruiken Dit is een verkorte versie van onze enorm populaire pagina Hoe kan je torrents anoniem downloaden, die iets te lang is voor sommigen. Onderstaand artikel is een ingekorte versie van dezelfde technieken over het veilig gebruik van torrents. Volg onderstaande stappen om anoniem torrents […]

Continue reading

How to Use XDCC (Search and Download)

Complete Guide to XDCC XDCC (Extended Direct Client-to-Client) protocol is an extension of a DCC protocol used in IRC (Internet Relay Chat) to enable users to connect and exchange files (or chat messages). XDCC has lifted the limitations of the original DCC protocol by removing file size limitation and allowing batches of files to be […]

Continue reading

VPN Protocols Explained

Which is the Best VPN Protocol to Use? If you are taking your online privacy and security seriously, it’s likely that you have already read our materials covering the different approaches to the subject, including our information on using a VPN. In this article we look at the various VPN protocols available, including PPTP vs […]

Continue reading

Internet Privacy Year in Review 2015

Top News Stories in 2015 about Online Privacy This year has in general been marked by a steady erosion of privacy due to government surveillance, and by increased efforts from copyright holders to stamp out piracy. However, in a surprising turn of events, it seems that the United Sates is now set to go against […]

Continue reading