* VPN or TOR, which do I use?

TechViews News   …..

TOR (The Onion Router)

Tor has become very a very popular online tool for leaving a minimal trace while moving through websites. Many people use their service to browse the Internet anonymously.

Tor (short for ‘the onion router’) was developed by the United States navy, and it helps bolster your online privacy by making it extremely difficult for online entities to track your online habits.

By moving your traffic through multiple Tor servers, someone who intercepts your data can’t trace it back to your computer. All you need to do to take advantage of these benefits is to download and install the Tor browser.

For the average computer user, Tor came to the limelight as a result of the revelation that Edward Snowden used Tor to help mask his Internet traffic when he exposed the inner workings of the NSA and GCHQ surveillance programs.

Tor is often used by social and political activists, reporters, businesses, and others, to simply help eliminate identity snooping from unauthorized players in Internet security.

But, you might be thinking that Tor provides the same services as a VPN, right? This begs the question, “Which is better? Tor or a VPN?”

Continue reading


* Why You Need a VPN

TechViews News   …..

Virtual Private networks (VPN) have become more popular since Edward Snowden’s revelation on government snooping. But recently the rash of corporate and communications data grabbing has expanded the interest levels even further.

If you’re concerned about online privacy, a virtual private network (VPN) will help keep snoopers at bay.

Over the past few years public awareness of VPNs has grown, but for many they are still a mystery. Traditionally, they were used by businesses to enable their employees to access a company’s internal network securely. Nowadays people use them for two main things: viewing content in other countries, and personal privacy.

Continue reading

*How browsing history collection works

TechViews News   …..

The media has been buzzing since the House of Representatives voted Tuesday to give Internet service providers (ISPs) the ability to compete on the same level as other Internet giants such as Google, Microsoft, Facebook, and others.

Those giants already collect and sell your browsing history for advertising purposes, this modification allows ISPs to essentially compete in the same manner as the non-regulated afore mentioned Internet giants.

How will it work?

If the bill passes (remember, it’s not yet law, ISPs will have the ability to collect, store, share and sell certain types of data — including browsing history, app usage data, location information, all without users’ consent. This is already being done on a massive, invasive scale by Google, Facebook, Microsoft, and others.

While the collection is not mandated, nor is it always necessary to provide connection services, they have the option to retain connection information when you go online.

Continue reading

*3 Sneaky Ways Identity Thieves Can Access Your Data

By Damian Davila   …..

You just can’t be too careful nowadays.

From 2010 to 2015, identity thieves have stolen $112 billion from U.S. consumers. A staggering 13.1 million victims of identify theft lost $15 billion in 2015 alone. To curb more cases of identity theft, more and more issuers of credit and debit cards are transitioning their clients to cards with chip technology. (See also: 4 Ways Chip Credit Cards Make Life Easier)

Still, there are plenty of methods for criminals to get a hold of your personal information. Let’s review three more ways thieves can steal your identity and how to protect yourself against them.

Continue reading

*Top 5 Reasons to use a VPN


A Virtual Private Network (VPN) extends a private network allowing users to connect to remote data centers, network resources, and to encrypt their communication.

A simple way of thinking about VPNs is as a node sitting between your computer and another resource, the Internet for example. If you want additional details, check out the main Wikipedia article on the topic.

Traffic between your computer and the VPN is encrypted which is good for privacy and security, but more about that later.

This guide looks at the top five reasons for using a VPN. There are more and you could probably divide some into multiple points, but for the sake of simplicity, we have decided to pick the five core ones.

Continue reading