Device & Browser Fingerprinting: Explanations, Tests, & Solutions

Fingerprinting, more precisely known as browser fingerprinting and device fingerprinting, is basically a way by which websites and advertisers track you online. Every time you visit a web page, your browser sends information about its operating system, settings, IP address, and some other data about your device like screen resolution, date and time, etc. Your … Read more

DNS Hosting Providers

This post is about Authoritative Name Servers. Learn More. Your Website or App’s DNS server or Authoritative Name Servers should be hosted with a DNS hosting provider that provides great speeds, is reasonably secure, and you should have some form of redundancy. As the DDoS or Distributed Denial of Services Attack become a more common … Read more

Operating Systems

Using all the privacy and security-oriented apps and services won’t help much if you are stuck using an operating system that spies on you. All the popular default operating systems, be it Windows 10, Android, iOS or macOS collect heaps of personal data. Apple, Google, and Microsoft are allegedly a part of PRISM. Their proprietary, … Read more

Social Networks

You probably shouldn’t be using Facebook, Instagram, Twitter, or any of the tens of other social media apps that you are using right now. Why? — well, i can go on and on about all the different kinds of privacy violations they have done. Or i could just recommend you to watch The Social Dilemma, … Read more

Encryption Tools

You should always use a secure and open source encryption software to encrypt your data in hard drives, emails, messages — don’t trust any company with your data, always encrypt your data. Encryption is not the same thing as password protection. Just because something is password protected doesn’t mean it’s encrypted. Most of the companies love … Read more

Two-Factor Authentication

Two-factor authentication (2fa), two-step login, or more broadly multi-factor authentication is the method of confirming a user’s identity, and giving them access only after they’re successfully presenting two or more pieces of evidence or factors: Knowledge: something they know (password, pin, passphrase) Possession: something they have (SMS, push notifications, software or hardware tokens) Inherence: something … Read more

Office & Productivity Tools

Office & Productivity apps like Microsoft Office, Google Docs, Evernote, etc are a great way of keeping track of all your notes and journaling, but it more often than ever comes with the cost of your privacy. Most of these productivity apps collect & store pretty much everything you have stored in them, as most … Read more

File Sharing & Syncing

Sharing files with anyone online, be it your friends and family should not come at a cost of privacy and security. I will be covering all the ways you can share files easily and securely with your friends and family or anonymously, without a middleman. Most of the online file sharing techniques like sending via … Read more

Cloud Storage

Storing your important documents, pictures and other things on a cloud server so that you may need to access anywhere, anytime is a pretty nifty idea. However, you should be wary before choosing a cloud storage provider, as they technically have access to everything you store on the cloud. Most of the cloud storage providers … Read more

Email Providers

A secure and encrypted email service provider that respects your privacy, supports end-to-end encryption, collects little amount of metadata, is a must-have for a secure communication online. Email privacy is quintessential to protect your privacy & security online. While many communication methods have somewhat replaced email, most people still have and use at least one email account. Most … Read more