Device & Browser Fingerprinting: Explanations, Tests, & Solutions

Fingerprinting, more precisely known as browser fingerprinting and device fingerprinting, is basically a way by which websites and advertisers track you online. Every time you visit a web page, your browser sends information about its operating system, settings, IP address, and some other data about your device like screen resolution, date and time, etc. Your … Read more

DNS Hosting Providers

This post is about Authoritative Name Servers. Learn More. Your Website or App’s DNS server or Authoritative Name Servers should be hosted with a DNS hosting provider that provides great speeds, is reasonably secure, and you should have some form of redundancy. As the DDoS or Distributed Denial of Services Attack become a more common … Read more

Operating Systems

Using all the privacy and security-oriented apps and services won’t help much if you are stuck using an operating system that spies on you. All the popular default operating systems, be it Windows 10, Android, iOS or macOS collect heaps of personal data. Apple, Google, and Microsoft are allegedly a part of PRISM. Their proprietary, … Read more

Social Networks

You probably shouldn’t be using Facebook, Instagram, Twitter, or any of the tens of other social media apps that you are using right now. Why? — well, i can go on and on about all the different kinds of privacy violations they have done. Or i could just recommend you to watch The Social Dilemma, … Read more

Encryption Tools

You should always use a secure and open source encryption software to encrypt your data in hard drives, emails, messages — don’t trust any company with your data, always encrypt your data. Encryption is not the same thing as password protection. Just because something is password protected doesn’t mean it’s encrypted. Most of the companies love … Read more

Two-Factor Authentication

Two-factor authentication (2fa), two-step login, or more broadly multi-factor authentication is the method of confirming a user’s identity, and giving them access only after they’re successfully presenting two or more pieces of evidence or factors: Knowledge: something they know (password, pin, passphrase) Possession: something they have (SMS, push notifications, software or hardware tokens) Inherence: something … Read more

DNS Explained

DNS or Domain Name System is an integral part of Internet, and is quintessential for the web to work altogether — you can think of DNS as the phone book of Internet. What is DNS? DNS or Domain Name System is a system, duh, of computers all around the world with the goal of converting Domain Names like … Read more

Office & Productivity Tools

Office & Productivity apps like Microsoft Office, Google Docs, Evernote, etc are a great way of keeping track of all your notes and journaling, but it more often than ever comes with the cost of your privacy. Most of these productivity apps collect & store pretty much everything you have stored in them, as most … Read more

File Sharing & Syncing

Sharing files with anyone online, be it your friends and family should not come at a cost of privacy and security. I will be covering all the ways you can share files easily and securely with your friends and family or anonymously, without a middleman. Most of the online file sharing techniques like sending via … Read more

Cloud Storage

Storing your important documents, pictures and other things on a cloud server so that you may need to access anywhere, anytime is a pretty nifty idea. However, you should be wary before choosing a cloud storage provider, as they technically have access to everything you store on the cloud. Most of the cloud storage providers … Read more