Notice that the last connection is shown at the top of the list. You must create an account before you can connect to the Private Tunnel network of VPN servers. In summary, your privacy and anonymity while using the Private Tunnel VPN service is a mi…
Category: Blog
Is it illegal to use a VPN for Netflix?
The rest of your computer’s activity is not secured by these tools. One general concern with VPNs is that they might leak identifiable information, either in the form of DNS requests or your real IP address. In my tests, I found that my ISP and IP ad…
CyberGhost vs Private Internet Access vs Avira Phantom VPN Comparison for 2020
PIA VPN is able to maintain the connection speed, keeping it pretty close to what you’d get if you were connecting to local servers. Speed is very important for VPNs; a slow VPN speed can hinder and slow down the performance of the tools and the brow…
ExpressVPN vs Private Internet Access 2020
This lets you add an extra jump in your connection, improving security without having as much of an impact on performance as something like a double VPN. Private Internet Access also offers what it calls PIA Mace, which is essentially an ad blocker t…
Perils of Private Browsing
Most people leave digital footprints everywhere they go online, when they visit websites, log in to a site, or when advertisers track them with cookies. Any browsing session leaves behind information such as the sites visited in the browser history. …
Privacy and Information Technology
He lists four general categories of privacy-harming activities: information collection, information processing, information dissemination, and invasion….
Past ICO Review: Power Ledger
In essence, this event is about selling the market access at a discount, based on the assumption that the value of the market will grow in the future. Similar to shares in companies, where you participate in the growing value of the company and its p…
Polkadot network custody launched by Coinbase and Web3
Allocations of Polkadot’s native DOT token are technically and legally non-transferable. Hence any publicized sale of DOTs is unsanctioned by Web3 Foundation and possible fraudulent. The idea was presented by Gavin Wood, co-founder of Ethereum and fo…
VPN Port Forwarding Guide
This is great, but it can also block incoming connections that you want or need. If a VPN offers port forwarding, it can be used to reroute incoming connections so that they bypass its NAT firewall. Using port forwarding when torrenting, you are able…
Perfect Privacy VPN Review 2019
After testing numerous VPN services over the past few years, Perfect Privacy remains thetop VPN for privacy and security. Since I first tried their service in 2016, I have been personally using it every day with computers and mobile devices. Every se…