How to Sign up for Anonymous VPN Service

Pay for a VPN Anonymously (Gift Cards and other tips & tricks) Our post Anonymous Payment Methods discussed in general the topic of paying anonymously for online goods or services. In this post, we go into step-by-step and specific details about how to pay anonymously for a VPN account. Paying anonymously for a VPN is not something that everyone needs to do, […]

Continue reading

What is a Blocklist? Best Blocklists Explained

How to Use Blocklists for Increased Security and Privacy A blocklist (aka IP blocklists) prevent or block harmful IP addresses from accessing your computers and devices. Technically, the blocklist is a database of blacklisted IP addresses from which data is not accepted from or sent to your computer or device. Being connected to the Internet […]

Continue reading

How to Remove Personal Information Online

De-Doxing and Removing Personal Information Online This is the last part of our five-part series on Preventing Identity Theft & Doxing. This is usually the most difficult step because if or once your personal information is online it can be very difficult to remove or suppress. However, with some persistence you can undo some of […]

Continue reading

Stop Sharing your Personal Information

How to Prevent your Personal Information from Leaking and Spreading Online This is the third part of our five-part series on Preventing Identity Theft & Doxing. One of the best ways to keep your personal information private and prevent it from ending up online is to stop sharing it in the first place. That may […]

Continue reading

How to Prevent Identity Theft & Doxing including for Free

Identity Theft Prevention, Doxing Protection & Removing your Personal Information Online Learn about identity theft prevention and doxing protection and how to prevent these rising crimes in the first place. Our materials cover all the practical steps you can take to protect yourself from identity theft prevention and doxing attacks. These posts are long and […]

Continue reading

WebTorrent is NOT an Anonymous Torrent File-sharing Method

Before Jumping on the WebTorrent Bandwagon, Read this and Stay Safe The technology behind free, open source WebTorrent (and its Desktop counterparts) certainly commands attention. If you visit their website at https://webtorrent.io/ an impressive demo starts right away and within seconds a high-quality movie is being streamed to your display. WebTorrent supports traditional .torrent files and magnet links […]

Continue reading

How to Use XDCC (Search and Download)

Complete Guide to XDCC XDCC (Extended Direct Client-to-Client) protocol is an extension of a DCC protocol used in IRC (Internet Relay Chat) to enable users to connect and exchange files (or chat messages). XDCC has lifted the limitations of the original DCC protocol by removing file size limitation and allowing batches of files to be […]

Continue reading

VPN Protocols Explained

Which is the Best VPN Protocol to Use? If you are taking your online privacy and security seriously, it’s likely that you have already read our materials covering the different approaches to the subject, including our information on using a VPN. In this article we look at the various VPN protocols available, including PPTP vs […]

Continue reading