Pi-Hole on Lightsail with 5 Million Blocked Sites
I decided to take my own advice and deploy Pi-Hole on Amazon LightSail. I made a couple of changes to the deployment that make it easier and more efficient. The…
I decided to take my own advice and deploy Pi-Hole on Amazon LightSail. I made a couple of changes to the deployment that make it easier and more efficient. The…
Tools helping China's netizens to bypass the Great Firewall appear to be facing a fresh round of crackdowns in the run-up to the country's quinquennial party congress that will see…
For a “normal” company, having a TV series with your product as the star would be an impossible dream. But Amazon is not a normal company. The latest evidence that…
What is a Decentralized VPN? Decentralized VPNs promise to be the upgrade to existing, standard VPN services. They claim to offer better privacy at lower prices than their traditional counterparts,…
What is a MeshNet? NordVPN, one of the world’s leading VPN providers with 14 million users worldwide, has unveiled Meshnet –– a brand new feature allowing users to create their…
Data copied from devices at entry points into the United States — including airports and border crossings — gets saved for 15 years in a database searchable by thousands of…
AI vs IP Is Artificial Intelligence being used as a means to extract value from copyrighted intellectual property? For years pundits and advocates have struggled to attach tangible meaning to…
Why do companies need CyberSecurity? Have you ever heard a company talk about privacy when they are discussing a massive hack and theft of your data? Why is cybersecurity such…
At this point, it’s obvious that our smartphones and computers are data-leakers. Plenty of us now cover our laptops’ webcams (although we always forget about the mics), while our smartphones track…
Two members of Congress have called on the Federal Trade Commission to tackle a digital threat that privacy watchdogs have been concerned about for years: Virtual private network companies continue…