How to Remove Personal Information Online

De-Doxing and Removing Personal Information Online This is the last part of our five-part series on Preventing Identity Theft & Doxing. This is usually the most difficult step because if or once your personal information is online it can be very difficult to remove or suppress. However, with some persistence you can undo some of […]

Continue reading

Stop Sharing your Personal Information

How to Prevent your Personal Information from Leaking and Spreading Online This is the third part of our five-part series on Preventing Identity Theft & Doxing. One of the best ways to keep your personal information private and prevent it from ending up online is to stop sharing it in the first place. That may […]

Continue reading

How to Prevent Identity Theft & Doxing including for Free

Identity Theft Prevention, Doxing Protection & Removing your Personal Information Online Learn about identity theft prevention and doxing protection and how to prevent these rising crimes in the first place. Our materials cover all the practical steps you can take to protect yourself from identity theft prevention and doxing attacks. These posts are long and […]

Continue reading

WebTorrent is NOT an Anonymous Torrent File-sharing Method

Before Jumping on the WebTorrent Bandwagon, Read this and Stay Safe The technology behind free, open source WebTorrent (and its Desktop counterparts) certainly commands attention. If you visit their website at https://webtorrent.io/ an impressive demo starts right away and within seconds a high-quality movie is being streamed to your display. WebTorrent supports traditional .torrent files and magnet links […]

Continue reading

How to Use XDCC (Search and Download)

Complete Guide to XDCC XDCC (Extended Direct Client-to-Client) protocol is an extension of a DCC protocol used in IRC (Internet Relay Chat) to enable users to connect and exchange files (or chat messages). XDCC has lifted the limitations of the original DCC protocol by removing file size limitation and allowing batches of files to be […]

Continue reading

VPN Protocols Explained

Which is the Best VPN Protocol to Use? If you are taking your online privacy and security seriously, it’s likely that you have already read our materials covering the different approaches to the subject, including our information on using a VPN. In this article we look at the various VPN protocols available, including PPTP vs […]

Continue reading

Internet Privacy Year in Review 2015

Top News Stories in 2015 about Online Privacy This year has in general been marked by a steady erosion of privacy due to government surveillance, and by increased efforts from copyright holders to stamp out piracy. However, in a surprising turn of events, it seems that the United Sates is now set to go against […]

Continue reading

Snowden Leaks: a Summary of the NSA Programs

In Brief: Revelations of the Wide-scale Spying on Citizens Revealed by Edward Snowden By now, everyone has heard of Edward Snowden, former computer security consultant for the CIA and the NSA, and now described as anything from a hero to a traitor. His story made a great impact starting in 2013, when he disclosed a […]

Continue reading