Private Beta sharing is now available for Dump Truck

7:38 PM Add Comment
Private Beta sharing is now available for Dump Truck -

Dump Truck Blog Bug We are pleased to announce the beta release of the new private sharing feature for Dump Truck. Using the Dump Truck Web App, users can now use private sharing to easily and securely collaborate on files and folders with other users dumper. This new feature is ideal for small businesses and for sharing files with family and friends. Users can also easily invite anyone to access shared folders and assign a level of permission, with just an email address. When a file or a private shared folder is changed, added or deleted, the changes to synchronize all the users who have joined the action.

Private Sharing

users Previously, Dump Truck only allowed to share files and / or folders with others via a public link. Users also have the option to add an expiration date and a password for the link, but they could not work with these files. The new private sharing feature now allows for collaboration, easy access and secure sharing!

Dump Truck Private Sharing Features

  • Any change to a file will show all users who have access to it, making it easier and better collaboration
  • there are multiple options for authorization level for each folder. You can also change the level of authorization after you share the folder
  • Unlike many competitors, we support a read-only access. If you choose this option, users can view files but can not
  • With permission levels right, users can move, rename and edit files and shared folders
  • users can access files shared across all change Dump Truck desktop applications, web and mobile

Getting started

You n 'are not required to register for the private Beta share. Here's how you can start :.

  1. If you are an existing user, you can register for a free 5GB account today
  2. Dump Truck If you are an existing user, update dump Truck Mac or Windows app
  3. log in to the beta version of the Web App and start sharing files with dump users using their email address
  4. Share your valuable feedback with us by using the Beta feedback form on the page

desktop App Update Required

Although you can share files via the private share that by the Web application, you can access shared folders via our desktop applications. Company shared files will be synchronized to your PC using the application Truck Dump office. We recently updated the Dump Truck Mac and Windows applications to version 1.2.2 to support the private beta shares. To use the private share, you must update the Dump Truck desktop application. Note: You may lose some of your data if you do not update your first applications . . Update from the application by clicking on "Update Available" from the main menu, or you can download the latest version of the application on our website

Dump Truck Desktop Version 1.2.2 the changes include:

  • Compatibility with folder permissions private Sharing
  • Synchronize several defects resolved
  • Sync speed improvements
  • Added the ability to pause / resume synchronization (Mac only)
  • ability to choose the location for the Dump Truck folder during installation (Mac only)
  • update process improved the software (Mac only)

to stay updated with Dump Truck, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

Golden Frog joins the activism against Mass Surveillance Day

6:37 PM Add Comment
Golden Frog joins the activism against Mass Surveillance Day -

On February 11, Golden Frog will join thousands of sites in a day of protests and action against mass surveillance. Golden Frog is proud to participate in "The Day We Fight Back," and you'll notice content to support the movement on our home page, blog and all social media channels. We are standing with over 4,500+ organizations, urging customers to call and email their representatives to the United States Congress. This objective is to rally people to ask US lawmakers to oppose the Improvement Act, FISA, and support the law on freedom USA. (If you are not in the US, visit the website of the campaign for appropriate targets that you can reach).

The Day We Fight Back

Many well-known US companies, including Reddit, BoingBoing and Mozilla are already on board, with more joining the campaign every day. This event reminds us of the "strike SOPA" held in January 2012 when we censored the VyprVPN logo to join the biggest event in the Internet history and contributed to the defeat SOPA and PIPA legislation on censorship .

While the "We Fight Back Day" campaign may not be as effective in changing the legislation that SOPA protests, we Golden frog firmly believe that we need to get behind these collective efforts and our voices heard. Legislators need to hear from people like you who care about your Internet freedom and privacy that you do not support mass surveillance.

The campaign honors the tragic death of activist and technologist Aaron Swartz and SOPA celebrates the victory over two years ago this month

How you can get involved: ..

  1. Add the campaign banner on your site, blog or web page today to get the word
  2. Use social media to tell the world that you are joining the fight . You can find ads, profile pictures and other tools on their site to use to show your support on your Facebook and Twitter pages.
  3. Join the conversation on Reddit
  4. If you are in the United States, 11 February please call and / or email the United States Congress and ask your legislators to oppose the FISA law improvements, support the law on freedom United States, and to adopt safeguards to non-Americans.
  5. If you are not in the US, visit the website of the campaign for appropriate targets to institute privacy protections that you can reach out to.

for more information on how to participate. Please visit The Day We Fight Back website

Our Vision To open Internet :.

Please read the Vision Paper Golden Frog, " peace, prosperity and the case for the Open Internet :. a shared vision and call to action for the Internet world "to learn more about our struggle for a free and open Internet

The Top Six Quotes Edward Snowden SXSW Keynote

5:36 PM Add Comment
The Top Six Quotes Edward Snowden SXSW Keynote -

Edward Snowden

Golden Frog attended the roundtable Edward Snowden SXSW. We shot some of the most important quotes from Mr. Snowden and other members of the panel

  1. "End-to-end encryption makes it impossible level monitoring network." -. Edward Snowden

    boasting Snowden encryption technologies was a major takeaway for many in the audience. By encrypting all the data you send and receive on the Internet, you are more difficult for the very personal information to be recorded by third parties.

  2. "You must choose between a service that is easy to use, reliable and polished or tool that is very safe and impossible for the average person to use." - ACLU technologist Chris Soghoian

    We agree. Making security easy and privacy is a huge goal for us. If we are going to defeat Internet surveillance by governments around the world, and the collection of data by large corporations - Privacy companies must make products that are easier to use. In addition, we must do a better job of explaining why these services are needed. The attitude of "I have nothing to hide, so I'm not worried" is flawed on so many levels. If companies can provide products that are not intimidate regular consumers this will help increase safety and privacy for everyone.

  3. "There is a political response that must occur. There is also a technical solution that needs to occur. It is the development community that can really design solutions and ensure that we are safe. "- Edward Snowden

    Everyone hopes legislative reform that better protects the confidentiality of data. However, the government generally moves much slower than the technology industry. It is up to individual businesses and consumers to take matters into their own hands instead of waiting for the government to protect them. Consumers need to select, test and use the services of private life. It is time to take back the Internet and find services that protect you.

  4. "It is not that you can not collect data, it is that you should collect the data and take as long as necessary for the operation." - Edward Snowden

    consumers want products and solutions that work. part of providing an experience that meets their expectations collects data to diagnose problems of system or network, to ensure service quality and offer support effective customer. service providers need to perceive the absolute minimum amount of data and then remove it when they are no longer needed.

  5. "when talking about encryption for average person, and we say digital, there is a problem. "- Ben Wizner, counsel for Snowden

    We agree with the response to Wizer Ben Snowden said that digital was the solution to encrypt network traffic .. Yes, digital is a solution. But it is unlikely that the average person will use TOR as complicated to install and it is slow. Users should not have to compromise their user experience to get better security. There are much simpler tools for encryption as a personal VPN to minimize your exposure online and give you a reasonable level of privacy.

  6. "If there is a warrant against you if the NSA is after you, they still go for you." - Edward Snowden

    There ! no such thing as being anonymous on the Internet Any business that promises anonymity is misleading customers and is part of the problem - not the solution but, encryption tools, such as VyprVPN, will greatly increase your privacy. Internet and makes mass surveillance a difficult and costly exercise for the government.

Al Arabiya News: Politics, pornography and iPlayer Why use Arabic VPN is rising

4:35 PM Add Comment
Al Arabiya News: Politics, pornography and iPlayer Why use Arabic VPN is rising -

Global VPN Golden Frog supplier told Al Arabiya News that the use of its service VyprVPN continues to increase in the Middle East, adding that he now has users in almost every country in the region

Read the full article :. Politics, pornography and iPlayer Why use Arabic VPN is rising

The Golden Frog 2014 World Cup Bracket Challenge

3:34 PM Add Comment
The Golden Frog 2014 World Cup Bracket Challenge -

Golden Frog 2014 World Cup Bracket Challenge

We celebrate the 2014 FIFA World Cup with a Challenge Cup Support World! Fill a medium, select your favorite teams, and join us for a chance to win prizes

Prices include :.

  • 1 st Price: Playstation 4 with FIFA 14
  • 2 e Price: 1 year VyprVPN Premier
  • 3 e Price: 1 year of VyprVPN Pro

World Cup begins on June 12th, so be sure to create your console and enter to win!

Enjoy the World Cup 2014!

Myth # 6 :. Although my VPN provider does not own and operate the network, I can still be anonymous

2:33 PM Add Comment
Myth # 6 :. Although my VPN provider does not own and operate the network, I can still be anonymous -

Myth 6

myth is presented today, "even if my VPN provider does not own and operate the network, I can still be anonymous. " Myth # 5 revealed VPN providers that do not own their servers can not guarantee your privacy. However, suppliers who do not have their network can not guarantee your privacy is. Learn the reality behind myth # 6 and stay tuned for our last myth, 7, from our last article, I am Anonymous when I use a VPN - 7 myths Debunked

  • Myth # 1: I can be anonymous on the Internet
  • Myth # 2: .. anonymity and confidentiality are the same
  • Myth # 3: .. When my VPN provider announced a "limited" service, which means they will connect no information identification on me
  • Myth 4 :. When my VPN provider privacy policy says they "do not connect", that means I'm anonymous
  • Myth # 5: Even if my supplier VPN uses Hosted or cloud-based VPN servers I can still be anonymous
  • Myth # 6 :. Although my VPN provider does not own and operate the network, I can still be anonymous
  • Myth # 7 - July 17th .. Everything Logging VPN is Bad

I Anonymous When I use a VPN - 7 myths Debunked is the last article in our "Take Back Your Internet" microsite policy. The "7 myths" article addresses a disturbing trend in the VPN industry during the past year. Increasingly VPN providers perpetuate the myth of a VPN or service "anonymous" "no logging", while providing minimal or no transparency on how they actually manage your data. This diverted conscious VPN user privacy to concentrate on the false promise of anonymity instead of focusing on what really matters when choosing a VPN provider :. Transparency, trust, ease of use, performance and reliability

To keep up with Golden Frog, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+.

reddit chooses VyprVPN for companies to secure their employees online

1:32 PM Add Comment
reddit chooses VyprVPN for companies to secure their employees online -

reddit chooses VyprVPN for Business

We are pleased to announce that reddit has selected for VyprVPN companies to protect the online privacy and security of its employees.

"We evaluated several virtual private networks, and it became clear that VyprVPN is the best service on the market. It is the only VPN that is reliable and fast enough for commercial use. our employees have all VyprVPN installed on their laptops and smart phones, and they use it to establish a secure connection every time they are out of the office " Ricky Ramirez, system administrator. - Reddit

reddit carefully evaluated several VPN services and VyprVPN selected for its speed, reliability and user-friendly applications for Windows, Mac, Android and iOS. We are honored to reddit family VyprVPN and proud to support a progressive company that has a huge impetus on the current state of the Internet.

VyprVPN for business provides an online safety, privacy and freedom for businesses. worldwide
Any business accounts include:

  • Easy to use interface for adding users and managing permissions
  • dedicated account manager
  • Windows, Mac, Android and iOS apps

See how VyprVPN for business can benefit your business

TechTarget: applications present opportunities based on location - and the challenges of data

12:31 PM Add Comment
TechTarget: applications present opportunities based on location - and the challenges of data -

Sunday Yokubaitis, President of Golden Frog, said location services responsible are transparent about how they use the data they collect from location-based applications

Read the full article :. applications based on the current location of the opportunities - and challenges data

Save money on flights, car hire and travel with VyprVPN

10:29 PM Add Comment
Save money on flights, car hire and travel with VyprVPN -

Some companies use information about your location and IP address to determine how much to charge you for flights, car rentals, and other online travel purchases. With VyprVPN, you can obtain an IP address from locations around the world and find the lowest prices

VyprVPN We put to the test and the prices changed more :.

  • $ 00 on flights using Kayak.com
  • car rental $ 400 using rentalcars.com

How is your position cost you ?

We connected to VyprVPN server locations in different countries and the prices recorded for each location in our infographic, which is displayed below. Learn how you can save money on flights, car rentals and other travel purchases using VyprVPN. Savings happy!

"Is this your location cost you? Save Money on Travel with VyprVPN"

Save Money on Travel VPN

Updated: VyprVPN Fix for iOS 8 is now available

11:30 AM Add Comment
Updated: VyprVPN Fix for iOS 8 is now available -

iOS8 Fix

A new version of VyprVPN is available for iOS that includes a fix iOS 8. The update also improves the connection time server, which makes it faster than ever to connect to a server location VyprVPN Please update your VyprVPN for iOS to version 2.3.0.1238

Instructions: ..

  1. VyprVPN update for iOS to the latest version of 2.3.0.1238.
  2. After updating your application, open VyprVPN and you will be prompted to "Install VyprVPN profile."
  3. Once the download profile is complete, you will be sent to the Settings application to complete the installation of the Trust certificate VyprVPN.
  4. After having successfully installed the Trust certificate, VyprVPN will navigate you back into the Settings app to install the VPN profile personnel.
  5. After installing the VPN personal profile is complete, you will be taken in the fixed version of VyprVPN for iOS.
security

We take our customers very seriously and want to iOS thank our users for their patience. our iOS app has several sophisticated features and we have worked hard to make them compatible with iOS 8. We appreciate your comments and we will continue working to ensure our apps function as expected on all platforms .

Discuss this latest version, plus other features for VyprVPN on our Forum Golden Frog.

Our Take on Internet Event of Senator Ted Cruz in Austin

9:28 PM Add Comment
Our Take on Internet Event of Senator Ted Cruz in Austin -

Last week, Golden Frog co-founder and co-CEO Ron Yokubaitis attended US Senator Ted Cruz (R Texas), press conference in the Capital Factory in Austin, Texas for the future of the Internet. This event included the opportunity for Ron to speak with the senator and his staff on several issues, including the recent comments of Senator against Title II classification "last mile" - the link between the Internet and your House. To be clear, while we agree with much of the agenda of the Internet Senator Cruz, we do not agree with his comments about the Title II. We welcomed the opportunity to talk directly with the Senator, and expect to continue the conversation in the future.

Ron at Cruz Event

Speaking on stage before Senator Ron focused his remarks on Internet privacy issues. Ron urged Senator Cruz to help get the Act horribly day and confidentiality of electronic communications (ECPA) updated and reminded the public broadband telecommunications and ISPs are currently surveilling Internet traffic. Ron said, "the Constitution does not save you ... you need to use encryption to defeat the surveillance state"

He also praised efforts to protect its citizens from Texas. . personal data He said: "I compare Texas for Switzerland within the United States."

Cruz Event

US Senator Ted Cruz has unveiled its "Do not mess with the Internet" agenda in Austin, saying Congress should not allow the administration Obama to regulate the Internet as a public service and that Congress should kill legislation that online sales tax.

regarding the remarks of Senator of title II, we believe that Senator Cruz President Obama simplified to the open question on the Internet. Neither the difference between the Internet "real" and the "last mile." The Internet, as defined by Wikipedia, "is a worldwide system of computer networks interconnected connecting billions of devices worldwide. It is an international network made up of millions of private networks, public, academic, business and government networks, connected by a wide range of electronic products, wireless and optical networking technologies. "This portion of the Internet has a dynamic competition, it is booming. It does not need to be fixed or regulated

Instead, it is the last mile -. The link between the Internet and your home - which is slow, expensive, and a threat to privacy and freedom. The last mile is not the Internet. The last mile is controlled by monopolistic companies that provide customer service. He is the last mile we support should be reclassified under Title II. This would give the FCC the authority to enforce transit rules, so that providers have a duty to serve all Internet packets without discrimination, or even go so far as to open to competition, innovation and ensure that all content providers have the ability to compete.

After the press conference, Ron was invited to a future discussion with Cruz staff to discuss the Internet legislation. We look forward to continued dialogue and to thank Senator Cruz for the opportunity to participate in the event last week.

See the video of the event and listen Ron Yokubaitis talk.

New VyprVPN server location in Argentina!

7:26 PM Add Comment
New VyprVPN server location in Argentina! -

argentina_server_gf

We added a new VyprVPN server location in Argentina! This is our second location server in South America. You can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

How to access the location of the Argentina server:

  • VyprVPN Bureau - If using VyprVPN. Desktop, the location of the new server is automatically available when you choose the location of your server
  • Mobile VyprVPN -. If you use mobile VyprVPN, just log on and get back to allow Argentina optional [

You have access to 51 server locations across North America , South America, Europe, Asia and Oceania.

argentina_map_gf

This is our first new server location for 2015 and we will have several more are planned throughout the year! Please visit Golden Frog ideas to share product ideas, feature requests and recommendations for the location of our next server.

If you want protection for your Internet connection while at home or on the road, try VyprVPN with our 3-Day free trial. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

Keep up to date with VyprVPN by subscribing to the Golden Frog blog or follow us on Facebook, Twitter and Google+.

Breakfast with Edward Snowden at SXSW

6:25 PM Add Comment
Breakfast with Edward Snowden at SXSW -

Yesterday, President of Golden Frog Sunday Yokubaitis and co-founder Ron Yokubaitis participated in Q & A discussion with Edward Snowden at SXSW . The invitation-only meeting with about 25 technology leaders was a chance for technological and Snowden community to talk about the things we need to do to improve cybersecurity and fight against government surveillance.

The Verge wrote a beautiful reminder of the event, but here are some highlights that might interest the readers of this blog:

What's next VPN technology

Sunday brought personal VPN services and asked, "what products or services should we build to fill the gaps in the current policy?" Snowden replied that the VPN providers need to develop new technologies to hide their services to VPN traffic can not be identified as being encrypted. He also said that we need more efforts to randomization other services so that we, as a community of technology can overcome monitoring at the network level. Snowden's suggestion was very encouraging because Golden Frog has already built our own VPN technology called Chameleon that is already what Snowden described so that people around the world can overcome the deep pack inspection tactics Great Firewall and other monitoring efforts. So we were delighted that Snowden validated our existing efforts!

Tech vs. Policy Tech Innovation

Much of the discussion focused on the politics of technology to fight against government surveillance. But Snowden stressed that the technology industry needs to build products and services to protect people. If you are waiting for the government to protect you, you'll probably be waiting a very long time.

This is why we founded Golden Frog in 09. Before 09, we spent a good amount of time talking with lawmakers about the need for better privacy laws and updates. Finally, after becoming frustrated with the legislative and regulatory process, we lost confidence that the policy would provide the solutions that we all need. We were happy that Snowden validated the mission of Golden Frog to build the tools that Internet users will need to protect themselves online without waiting for the policy to protect us.

Encryption Works

There are no secret NSA is actively trying to break encryption. Snowden said we encrypt, the more expensive it is for the government to collect data. Even the NSA budget constraints, and the more money we make them go to get our data, the easier it will become to keep their current programs.

Speaking of encryption, predictable Snowden also criticized the government's proposals that enable organizations like the NSA and FBI backdoors in our networks. Snowden correctly noted backdoors will create insecurity and "China jump at the chance" if we decide to create encryption backdoors. We agree, it is quite difficult to Encryption properly without the government asks us to build on our servers intentionally vulnerabilities.

There is a way the government can actually help

Snowden also said that many safety critical solutions to cyber infrastructure, things like SSL libraries are funded by voluntary investment in time - and thus massive security holes. We need to be more proactive in plug these holes. He urged the government and the big tech companies, to create a fund for research on security vulnerabilities.

This was a great experience participating in the Q & A and gratifying to hear the kind of things we do in Golden Frog are consistent with the direction he believes the technology community must .

Golden Frog with Edward Snowden

Call on Congress to end the mass surveillance

5:24 PM Add Comment
Call on Congress to end the mass surveillance -

(Editor's Note :. The following is a guest blog from Daniel Schuman, policy director progress in demand demand progress works to win progressive policy changes for ordinary people through organizing and grassroots lobbying. It focuses on civil liberties issues, civil rights, and government reform. demand progress recently helped organize a coalition letter signed by 60 companies and bipartisan groups, including Golden Frog, urging Congress to end US mass surveillance).

DanielS-bw

Daniel Schuman

Policy Director, Demand Progress

clock turns down three provisions of the USA PATRIOT Act, which gives a real opportunity to end mass surveillance and to adopt additional reforms in Congress. But the intelligence community and its allies on Capitol Hill are fighting tooth and nail to codify broad supervisory powers it has assumed to itself before June 1 expiration.

Mass surveillance is toxic to our democracy. government mass surveillance practices are virtually endless, and unnecessary, against-productive and costly. They undermine our economy, public confidence in government, and even the proper functioning of government itself. The only antidote is the reform of the important surveillance.

Meaningful reform must include fixing the law and end the perverse understanding of executive power of his authority to spy on Americans. In addition, Congress must significantly increase the transparency, oversight and accountability of intelligence agencies, especially those who have acted unconstitutionally.

Fixed the USA PATRIOT Act.

Mass surveillance conducted under the USA PATRIOT Act is contrary to the exercise by the Americans of their civil liberties. Section 215 of the law has been twisted by the executive to allow ostensibly to collect virtually unlimited personal information, from weapons fire records and financial records in our physical locations and with whom we speak. Even the author of the original bill said that it is not what Congress intended

Any worse, this intrusive collection is not only contrary to the Constitution. it is useless. President Privacy and Civil Liberties Oversight Board have not found a single instance exists "implying a threat to the United States in which the telephone records program makes a concrete difference in the outcome of a terrorism investigation." Others have reached similar conclusions. Even the NSA considered ending the program because the "costs outweigh the limited benefits counterterrorism." Additional provisions may be interpreted to allow bulk collection, whether under Article 214, via national security letter, or elsewhere, must be addressed.

Clarify other laws, too.

Congress must end mass surveillance programs allegedly allowed elsewhere, including under the FISA Amendments Act and Executive Order 12333. These programs are incredibly wide. For example, they include the acquisition of large amounts of information sent privately over the Internet (eg, "upstream collection" under section 702 of the Act of 08 FISA Amendments). They also include any information or communication, by foreigners and Americans, which is always transmitted outside the physical limits of the United States (eg, as authorized by the 12333 decree). Section 702 results in the unnecessary collection of innocent American domestic communications, and EO 12333 raises troubling concerns about the scope of the collection and the authority assumed by the President.

Restore the responsibility for the bad actors in the intelligence community.

responsibility begins with the truth. members of Congress, both on the left and the right, must have access to the necessary documents to know the full story. they must be able to trust those they supervise. When they are misled, as happened in the statements of Director of National Intelligence James Clapper and CIA Director John Brennan, there must be consequences. In addition, the intelligence committees and members of Congress must have the staff, resources, permission and cooperation necessary to ensure vigorous monitoring. A special committee should investigate and report publicly on the Community Intelligence transgressions since 9/11.

Mass Surveillance harms our economy.

mass surveillance will cost in the digital economy to $ 180 billion in lost revenue by 2016 law enforcement efforts to subvert the integrity of technology, especially by attacking the confidentiality mechanisms and safety integrated in technology threaten the profitability of US manufacturers, entrepreneurs and software companies. Already, 30% of all American adults reported changing their online behavior in response to fears of surveillance.

For the most part, Congress has focused on minor changes to the general supervisory powers the executive has aggregated to itself, often in secret. This is the right place to start. Instead, Congress should focus on what can actually needs the intelligence community, if properly exercised and effective, and if they violate our civil liberties.

I look forward to continuing the fight for Congress to end US mass surveillance. I hope you will join me. The site of application: Progress http://www.stopmassspying.com is a great place to start

About the author :.

Daniel Schuman is the director of policy at the request of advancement. Daniel was the advocacy vanguard for greater transparency of the Congress for the better part of a decade. He worked as a member of Congress staff and later as an attorney with the Congressional Research Service. You can follow him on Twitter at @danielschuman

Protect your privacy and security online with Dashlane

4:23 PM Add Comment
Protect your privacy and security online with Dashlane -

Dashlane protect passwords offer

Exclusive Deal for VyprVPN customer

Golden Frog is proud to announce that our partner Dashlane, offers its customers an exclusive special VyprVPN. VyprVPN customers can get 6 months Dashlane Premium, best password manager in the world, for free by visiting this page and claiming exclusive special offer.

What is a password manger and why do I need?

a password manger, as Dashlane, uses encryption to store your passwords in a secure password safe. Instead of using the same few passwords for each online account - this is the dream come true of a pirate - Dashlane automatically generates a unique strong password for each account, and all remembers for you. Without using Dashlane to protect your passwords, hackers and snoops 3rd party can use the same few passwords that you use everywhere to connect to your private accounts, putting your identity at risk.

Dashlane solution is simple :.

  • Protects your online identity across all your devices
  • remembers all your passwords for you, then you can stop forgetting and resetting words pass
  • [
  • connects you to your websites automatically, so you can stop typing your passwords.
  • easily create strong, secure passwords with a single click. No more remembering complicated, unique passwords and worrying if your passwords are really secure, random or unbreakable.
  • notifies you automatically when a data breach occurs on a site you belong to, you can use Dashlane to change your password instantly with one click.

What makes Dashlane different?

"Dashlane values ​​privacy of users and features architecture, which prevents anyone, including Dashlane, access to personal user information." - TheNextWeb

"... Dashlane is extremely secure, keeping your private information and encrypted." - PCMag, Editors' choice

"the application fulfills password, payment, and shipping specifications with almost twice the precision competitors. " - Popular Science

"Unlike other password managers, Dashlane encrypts your personal information and passwords with AES-256 on the machine local and syncs your account information with its online server, so you can access the database from all accounts. "-? Addictive Tips

What you get with this exclusive offer Dashlane

6 months Dashlane premium for FREE for first time users

Dashlane is free to store and secure unlimited passwords on one of your devices. It frees you scribbled notes, spreadsheets and file folders that you use to remember all your accounts. Dashlane simplifies the secure storage of all your passwords - for life! Login with one click, fill out forms in a second and enjoy the security of passwords automatically generated that can not be guessed or cracked.

Dashlane Premium took power and multiplies it on all your devices, making the passwords and access secure account on your phone, tablet, laptop, work computer and even on the web - wherever you go! You'll never forget another password.

You will never be in the office and that "I can not pay this bill, I will write a note to do at home," because you have your account information any registered security on your phone or your work computer. you can take action when you need it. with Dashlane on all your devices, all you need to do to keep in sync and the update is everywhere... nothing. synchronization and backup are automatic and completely secure.

as a premium customer, you get premium support! Move to the front of the line and get a real person to help you with any questions you have. Dashlane VIP e-mail address gives you access to the same day the help you need.

How to watch the Hungarian Grand Prix live online

3:22 PM Add Comment
How to watch the Hungarian Grand Prix live online -

Hungarian Grand Prix Stream VPN

Due to the cancellation of the German Grand Prix, race fans face an agonizing wait three weeks until the next race - great Hungarian GP. Accidents, plays against undercuts and tension in the recent British Grand Prix proved that Formula One is one of the most exciting sports in the world! And if the British Grand Prix was an indication, the Hungarian Grand Prix will be quite dramatic for white-knuckle any fan Grand Prix.

The main race of the Hungarian Grand Prix is ​​scheduled for July 26 th in Mogyoród in the northeast of Budapest. Few broadcasters will provide live coverage of the race, and Internet geo-restrictions will limit access to their streams. For those looking to watch the event, you're in luck! VyprVPN allows anyone to watch the Hungarian Grand Prix live - regardless of

location

live Grand Prix of Hungary Live Schedule

Date Day session Time (LT ) Time (GMT)
July 24 Friday practice 1 ten hours 00-11 hours 8:00 00-09h00
practice 2 14: 00-15h30 12: 00-13: 30
July 25 Saturday Practice 3 11:00 - 12:00 9: 00-10h00
admissible 2:00 p.m. to 3:00 p.m. 12: 00 - 13:00
July 26 Sunday stroke 14: 00-16h00 12:00 -14: 00

How to live broadcast the grand Prix of Hungary:

  1. Sign to VyprVPN to overcome geographical restrictions
  2. Download VyprVPN software for your desired device
  3. Visit a website or a channel in the list below after the connection to the server respective countries
  4. Direct starting point streaming large Hungarian GP from any place on earth

UK
BBC Sport / Sky F1 sports
Unlock and watch now with VyprVPN

US
NBC sports / Univision Deportes

Unlock and watch now with VyprVPN

Canada
TSN 3 / RDS 2

Unlock and watch now with VyprVPN

For all the fans out there, we have put together some fun facts about the great Hungarian GP:

  • Each seat has a view! The circuit is located in a valley surrounded by a hill, which provides a comprehensive overview of the track, so there is no bad seat in the Hungarian Grand Prix
  • The Budapest circuit is narrow, and there are some points where runners can pass another
  • Hungarian race has the lowest second average speed per lap for an F1 race (Monaco is the slowest)

can not wait for the race to start? Prepare yourself by looking at the last lap of the Hungarian Grand Prix

Golden Frog advocates a free and open Internet. We believe that everyone has the right to access the Internet without restrictions, regardless of their location in the world.

Attackers in the use of VPN network in China to launch attacks

2:21 PM Add Comment
Attackers in the use of VPN network in China to launch attacks -

RSA researchers have discovered that pirate groups have used VPN servers based networks in China launch attacks. This VPN managed by malicious users has been dubbed "clay". The attacks took place around the world, including Brazil, Vietnam, the United States, the United Kingdom and Canada.

As noted in Krebs on Security, the "VPN service satellite network may be the first exhibition of a VPN-RPC operation that maliciously, efficiently and quickly appealed to vulnerable servers across the world. "full details on the situation described in the RSA Research report that was released today.

This discovery reinforces the importance of choosing a VPN provider with their own infrastructure network and hardware. Golden Frog VyprVPN with Chameleon exclusive technology provides users with an option for China VPN access secure and trustworthy.

Try free VyprVPN.

Golden Frog privacy of market services and special deals Recommended

1:20 PM Add Comment
Golden Frog privacy of market services and special deals Recommended -

gf_blog_privacy_marketplace

Did you know Golden Frog has a privacy market? Confidentiality market is our collection of recommended services and organizations that support online privacy, security and freedom. It is a great place to go when looking for additional tools to protect yourself online. Many of the partners listed in the Market privacy special offers Golden Frog customers, as

Partnership with Personal

Our new partner - Personal - is now offering users Golden Frog free subscriptions to their Personal Cloud & Data Vault. Personal provides users a way to securely collaborate and share information via their cloud applications, whether for commercial or personal use with friends and family. You can access personal special offer privacy market Golden Frog. Visit the confidentiality of the market to get your subscription now!

If you have a recommendation on a service or partner that you think Golden Frog should work in the future, let us know! Visit Ideas Golden Frog to submit your idea.

Help Bring Down the Great Firewall of China

12:19 PM Add Comment
Help Bring Down the Great Firewall of China -

We the People Great Firewall Petition

There is a petition circulating online asking US President Obama to bring down Great Wall of China. The great firewall imposes restrictive censorship of Internet users in China.

The petition to bring down the Great Firewall echoes much of what is believed Golden Frog. Golden Frog advocates a free and open Internet experience for everyone in the world. Golden Frog believes that the "Internet is an ocean" - nobody owns the Internet, including the Chinese government we support these beliefs by "hacking for freedom" and give people the tools to circumvent censorship and restrictions. imposed on them Internet.

our product VyprVPN provides access to a free and open Internet experience, and our Chameleon disguises owner VPN technology VPN connections and allows Internet users in China to circumvent the great firewall and access Internet without restriction. VyprVPN is one of the few tools that wall exhaust are not blocked in China.

If your Internet provider or VPN is blocked in China, s 'please try VyprVPN free with 1GB of free data and the experience of the free and open Internet.

please also show your support for a free and open Internet by signing the petition white House today!

EFF reveals Alarming Crypto policy proposed by the US government

10:17 PM Add Comment
EFF reveals Alarming Crypto policy proposed by the US government -

The Privacy and Technology in the 21st Century: rights, responsibilities and the Bottom Line of fair event today wrapped in Austin, Texas. Hosted by the ACLU, the event brought together technology Austin business leaders and policy makers to discuss the role of technology in privacy and security.

Golden Frog has joined other community leaders in technology to continue to advocate for the technology, such as encryption, which is so essential to preserve the confidentiality and security of online users and in communications personal.

one of the speakers of the event was Lee Tien, senior staff attorney for the EFF and President Adams for internet rights. During his speech, he revealed some of the items reflected in the encryption policy that is being developed by the US government. These points have been revealed by a recent white paper that was leaked - that you can find in this Washington Post article. Although still in flux, the proposed policy elements are extremely alarming. They include the following:

Screen Shot 2015-09-30 at 5.36.58 PM

We are very concerned that the US government continues to work on policies that encourage the backdoor encryption. The above described practices represent significant risks to the privacy and safety of consumers. It is as important as ever that we continue to meet with the leaders of the tech community - in Austin and beyond -. And fight for encryption and the right to privacy and security

Learn more about the dangers or the backdoor encryption [

Learn why encryption is essential.

PrimeTel Partners with Golden Frog to improve privacy online for customer

11:18 AM Add Comment
PrimeTel Partners with Golden Frog to improve privacy online for customer -

VyprVPN, VPN fast and stable personal service, is available to customers in a PrimeTel special offer

Limassol, Cyprus - September 18, 2015 - PrimeTel, a telecommunications provider in Cyprus, today announced a new partnership with online privacy and security company, Golden Frog. PrimeTel offer its subscriber base with a special discount for VyprVPN Golden Frog, one of the fastest personal VPN services and most respected in the world.

PrimeTel subscribers can get VyprVPN with 1GB of free data usage per month recurring, and get 25 percent off an annual subscription VyprVPN, which is $ 75 (USD) per year after reducing applied.

"data protection and privacy of our customers is one of the main objectives of PrimeTel. With VyprVPN our subscribers is mandatory for the latest developments in data collection. Offering our customers a increased security from a global provider of services such as Golden Frog provides secure Internet experience while respecting the user's privacy, "said Argyris Argyrou, Digital Marketing Executive at PrimeTel.

VyprVPN encrypts Internet connections of users and allows them to thwart spying data and Internet traffic monitoring that is regularly practiced by others. by encrypting the "last mile" (the connection between the user device and the Internet backbone), users can better ensure their privacy online and open an uncensored Internet and secure, no matter where they are in the world. Golden Frog owns the equipment at each of its VPN server locations and 50+ manages its own network, resulting in fast and reliable connections.

"We are delighted to partner with an innovative telecom provider that puts the customer experience first," said Liz Kintzele, sales vice president at Golden Frog. "By offering VyprVPN, PrimeTel resists the tendency of the user's data collection to make a profit and instead provide their customers a higher level of security, privacy and online freedom."

VyprVPN will be available to customers immediately PrimeTel: http://bit.ly/1hUhqvE

about Golden Frog

Golden Frog is a global supplier services engaged in developing applications and services that preserve an open and secure Internet, a mission that continues to grow in importance as users worldwide threats to privacy of the face. with users in more than 195 country, Golden Frog owns and operates server clusters in North America, Europe, South America, Asia and Oceania. Golden Frog owns and operates 100% of its own servers, hardware and global network to ensure the highest levels security, privacy, and service delivery. Golden Frog offers a comprehensive reseller program that provides the best VPN service and trafficking for resellers and their clients. The company also offers VyprVPN for companies to protect corporate communications, identity and data, and Internet connections secure employees in the office or on the road.

More about Golden Frog's vision for a free and open Internet by reading our "peace, prosperity and the case for the Open Internet" guidance document located www.goldenfrog.com /vision.

about PrimeTel
PrimeTel PLC is a telecommunications company in Cyprus that offers and develops voice, data and video services. The company owns and operates a truly regional network, spanning Cyprus, Germany, Greece, Russia and the United Kingdom, providing city connectivity to city data communications, fixed optical fiber network infrastructure and IP-based services between key European and Middle Eastern markets them. PrimeTel is one of the few telecom operators in the region that can provide a full range of services and connectivity.

In June 09, PrimeTel has announced the launch of its fiber cable landing station submarine in Yeroskipou and Reliance Globalcom had terminated its submarine cable system HAWK 2.7 terabit in her. This makes PrimeTel the first private operator with such facilities that have traditionally been the monopoly of CYTA.

In May 2011, PrimeTel launched the first MVNO in Cyprus, making it the third mobile operator on the island. As the first MVNO operator in Cyprus, PrimeTel has recently launched Mobile telephony services, becoming the first telecommunications company in Cyprus able to offer Quad-Play services (fixed telephony, Internet-TV- Mobile Telephony) .

In April 2015, PrimeTel launched the third MNO in Cyprus.

learn more about PrimeTel to www.primetel.com.cy

Australia's data retention law comes into force

9:16 PM Add Comment
Australia's data retention law comes into force -

Act of Australia data retention officially goes into effect today. And with it, what many call an end to privacy for Australians.

The Data Retention Act requires telcos and ISPS retain customers metadata for 24 months. As stated in an article in CNET, these data "includes the name and address of a subscriber to a telecommunications service; the source and destination of communications; the date, time and duration of a communication; the type of communication or service used for the connection (think SMS or Wi-Fi) and location of the equipment (such as cell towers) used to make communication "

This law raises extreme privacy for citizens of the country, and leaves plenty of room for the enforcement agencies access legislation and to view data consumers - and abuse this access. Legislation is also confusion among telecommunications operators and suppliers, with reports that many telecom operators are not prepared for the new rules and confused by their responsibilities under this law. In addition, there are concerns about the amount of money budgeted for the law, and the potential future costs to industry and consumers.

The Huffington Post has described Australia which means daily for Australian citizens the law in an article .. - Data retention: what is recorded in a 24 hour period

It is, unsurprisingly, a huge amount of thrust against the law both inside and outside the country

How to protect your data
There some things that can be done to protect your privacy under the new law. A VPN, as VyprVPN encrypts your Internet connection. With an encrypted connection, anyone (including your ISP) can see the contents of your online communications. With VyprVPN you can also change your IP address, choosing from over 50+ sites worldwide. Protect your privacy now - Try free VyprVPN

Updated: January 7, 2016

Government Australia announced a grant program data retention of $ 128 million. This program was launched to address the concerns of costs associated with new data retention laws of Australia. Titled "Conservation Grant Program to industry data," the program will attempt to relive some of the costs of setting up the ISP associated with the new legislation, many of which have fallen on consumers to cover. Despite this investment , there are still many concerns that ISPs (and small particularly ISPs) can go out of business if they are not fully reimbursed for the costs of compliance. as reported by ZDNet, "telecom operators were split almost 50-50 if they have asked the government a partial or total reimbursement of expenses incurred as a result of the implementation of the data retention obligations. "grant applications are due on February 23.

Golden Frog VyprVPN announces the expansion of TV for Android Platforms

8:15 PM Add Comment
Golden Frog VyprVPN announces the expansion of TV for Android Platforms -

VyprVPN is now compatible with Android TV, offering increased dissemination of experience and increased privacy and safety

MEGGEN, SWITZERLAND - October 27, 2015 - Golden Frog, a company that fights for privacy and online security, today announced that its product VyprVPN personal VPN now supports Android platforms TV

VyprVPN for Android. TV allows users to encrypt their Android Internet connection on TV, adding an extra level of protection when surfing, and shows the content stream. VyprVPN for Android TV also greatly enhances the streaming experience by offering faster speeds and enhanced security. With the introduction of VyprVPN for Android TV, Golden Frog is expanding its range of applications already included, making it easy for users to maintain privacy and online security on every device, every time they surf . VyprVPN is also available on Apple TV via the router VyprVPN App.

"We work hard to provide our users with VyprVPN applications that are available across devices and platforms," ​​said Liz Kintzele, sales vice president at Golden Frog. "With the adding VyprVPN for Android TV gives us another way for users to enhance their experience of the Internet -. This time through improved performance continuously "

VyprVPN for Android TV can be downloaded from Google Play, or users can download the APK from the website Golden Frog and sideload the application of their device Android TV.

VyprVPN encrypts Internet connections of users and allows them to thwart spying data and Internet traffic monitoring that is regularly practiced by governments and commercial ISP. by encrypting the "last mile "(the connection between the camera / computer user and the Internet backbone), users can better ensure their privacy online and open an uncensored Internet and secure, no matter where they are in the world. Golden Frog owns the hardware to all their VPN server locations and manages its own network to provide fast and reliable VPN connections

to download TV for Android VyprVPN, please visit :. Https://www.goldenfrog.com/ VyprVPN / mobile / google-play

to learn more about VyprVPN for Android TV, please visit: https://www.goldenfrog.com/ VyprVPN / vpn-for-tv

about Golden Frog

Golden Frog is a global services provider engaged in developing applications and services that preserve an open and secure Internet, a mission that continues to grow in importance as users worldwide face threats to privacy. With users in over 195 countries, Golden Frog owns and operates server clusters in North America, Europe, South America, Asia and Oceania. Golden Frog owns and operates 100% of its own servers, hardware and global network to ensure the highest levels of security, privacy, and service delivery. Golden Frog offers a comprehensive reseller program that provides the best VPN service and trafficking for resellers and their clients. The company also offers VyprVPN for companies to protect corporate communications, identity and data, and Internet connections secure employees in the office or on the road.

More about Golden Frog's vision for a free and open Internet by reading our "peace, prosperity and the case for the Open Internet" guidance document located www.goldenfrog.com / vision

Do Track: The FCC will force sites to Honor "Do Not Track"

7:14 PM Add Comment
Do Track: The FCC will force sites to Honor "Do Not Track" -

You do not want technology giants like Google and Facebook to track you online? Looks like you're out of luck. On Friday, the Federal Communications Commission USA (FCC) announced that it not strength of sites to honor "does not follow."

"Do Not Track" is a feature built into many web browsers that users can use to indicate that they do not want their online activity monitoring. Consumer Watchdog put forward in June a petition to honor these mandatory requirements. "Do not track" has already been done on a voluntary basis - and this is how it will continue

The FCC rejected the proposal stating that it means rejecting the advertising companies ,. "Tomb outside their jurisdiction." technology companies and others can continue to track users' movements around the Internet.The FCC made the following statement at dismissal:

"the Commission was unequivocal stating that he does not intend to regulate the leading vendors, "reads the order. Edge providers are companies like Microsoft and Twitter that provide services related to the Internet, but not the actual Internet connections. "We therefore find that the consumer watchdog petition clearly does not warrant consideration by the Commission."

The decision was described by Business Insider as a "win" for Silicon Valley, but is an unfortunate conclusion for advocates of privacy and those who seek to control and protect their lives private online.

There are a few ways you can continue to protect you online, even though "not detected" will not be applied. You can use a VPN to encrypt your Internet connection, which will protect your IP address, browsing history and other online communications from all snooping sites or third parties.

From Built In Austin: Hackers, trackers and risks: 3 experts weigh safety for your startup

6:13 PM Add Comment
From Built In Austin: Hackers, trackers and risks: 3 experts weigh safety for your startup -

Frog, AOS or Co-CTO Phil Molter was recently interviewed for an integrated Austin safety article for startups. Phil, AOS answers are below, and you can read the full article here

This article was published on Builtinaustin.com, and was written by Colin Morris.

With the mounting threat and the responsibility of security flaws in today, AOS technology landscape, no start can afford to run without a safety plan. And with the privacy, usability and regulation to take into account there, AOS no such thing as a one-size-fits approach.

With Cyber ​​Monday imminent, it, AOS more important than ever to have your command line.

We asked experts from three Austin technology companies focused on security and identity management is most important when you draw your company plan OSA. The Q & A below should help you to find the right questions to ask, constraints to consider and trends you need to know.

What are the safety standards are most important when building an online community?

When building an online community today, the most important standard is simply to encrypt all communication and data. This allows the protection of user privacy and security against eavesdropping. This makes the TLS (Transport Layer Security) protocol of the most important standard for network communication, and (Advanced Encryption Standard) encryption AES ciphers the most important standard for data encryption. Encryption doesn, AOT solve all security problems, but if you start giving, AOT with it, all your other efforts are compromised.

What are the most important questions a company should consider whether the decisions on the features and security guarantees to implement? How do you assess the risk?

Companies really need to ask how they can be compromised and what information can be obtained. Companies tend to focus on external threats, whether They active AORE as malicious hackers or passive like listening government. Companies can also easily be compromised by internal channels. Target, for example, has been compromised by an internal supplier. We call these attack vectors, and ask what they are and work to minimize is the key to safety.

What are the ways to balance security with convenience for users?

The misconception is that security and convenience are mutually exclusive. In fact, improving user convenience can actually improve security, because it is easier for them to protect themselves. Tools like Golden Frog VyprVPN OSA are more pervasive security because they make it more convenient. The best way to balance security with convenience is more convenient to make the security, not to sacrifice some security for convenience.

Tell us about the new technologies in this field. How will they affect safety?

Zero-knowledge protocols, which enable service providers to provide data transfer services without access to the data itself, are really coming to the forefront of the debate on privacy and security. messaging applications like Golden Frog, AOS CYPHER make use of it to provide individual and group conversations secure and private. Even Apple takes this technology to protect their iPads and iPhones latest. This technology and the mentality behind it pushes the security and control of the privacy of end users. People need to trust an intermediary to process their data safely.

2015: a pivotal year in the fight online privacy

5:12 PM Add Comment
2015: a pivotal year in the fight online privacy -

This year has been eventful, with the battle for online privacy - and the battle between governments and consumers in this privacy - to the forefront.

the encryption backdoor issue hotly debated in the United States, the proliferation of the legislation data retention being proposed and adopted in the EU and Australia, governments and the forces of order attempt - perhaps harder than ever - to gain and maintain access to user data. These attempts have met with consumer resistance and high technology enterprises even with strong points of view on both sides of the argument

As we look back to 2015 and look forward to 2016, we should ask :.

?

In this battle with the government in online privacy - which is to win

encryption battle: US

Debate : the government of the United States (FBI and law enforcement officials, especially) wants to have backdoor access to encrypted communications, so that law enforcement can not access information to help their efforts against crime. Technology companies, the community of privacy and many consumers are strongly opposed to such invasive access to their information

Technological Implications :. Encryption backdoors weaken the security and privacy offered in technology products (such as smartphones, for example), banning encryption end to end to be integrated into devices. It would be a dangerous precedent in the technology community, and presents a threat to innovation

Privacy Implications :. Encryption backdoors leave consumers vulnerable to spying and surveillance by the government, and represent a breach of privacy and security. There is no way to create a backdoor that only the government can access; a backdoor for government is a backdoor for everyone, and introduced a vulnerability that can then be exploited

The Verdict :. In October, President Obama has officially announced that the government not be seeking access backdoor in encrypted communications - at least not yet. The debate does not end, however, that encryption is closely monitored renewed this month after the terrorist attacks in Paris. While the reignition debate, many outlets reported the White House may change direction on this issue

The Rise of Data retention legislation :. Australia and the EU

The debate: The data retention legislation has been an unfortunate tendency this year, Australia passed a major law for data retention and many other countries proposed legislation includes provisions for data retention. This increase of legislation on data retention has represented another push by the government to maintain access to customer data - in this case, by mandating telcos and ISPs retain data for specific periods. These laws were adopted and proposed to the law enforcement may request access to the data

Technological Implications :. There has been some concern about the fact that the telephone companies are not prepared for new data retention laws. In addition, there was concern surrounding the high costs associated with the implementation of these laws

Privacy Implications :. The data retention legislation threatens privacy for consumers, because accurate information is subject to retention for the prescribed periods.

The verdict: Although there is no official verdict, recent events suggest governments may be winning this one as more and more countries introduce legislation with provisions for data retention. There was much pushing against this law by consumers and advocates of privacy, but only time will tell if more or less the legislation comes into force.

Who wins the "war on privacy?"

these are just two of the main problems that came this year - in the US, it has also been much debate on the bills CISA and ECPA, and the world many governments enacted laws that others have invaded the privacy of Internet users

Who do you think is winning the war this year on privacy? You can share your thoughts with us and participate in the discussion in the comments section below

More

The encryption battle :.

  • Encryption Fundamentals: you need to know
  • No Backdoors Encryption: Why the government is unacceptable
  • In the encryption debate, is the Tech Community against the government
  • encryption continuous battle

data retention legislation:

  • lien data from Australia comes into force
  • lien Scary new Internet data of Russia
  • data retention happening again, this time in Germany
  • monitoring continues: France ratifies His Own Surveillance Act
  • New UK Bill prohibits "Unbreakable Encryption"

Privacy and Tech Trends :. CES 2016

4:11 PM Add Comment
Privacy and Tech Trends :. CES 2016 -

We are at the Consumer Electronics Show (CES) this week to talk privacy and online safety, and check all the hot technology trends

This year, it is all about the IoT (Internet of Things) - and privacy and security concerns that come with it. As described by USA Today, IoT "simply means that an object has sensors in it and the ability to send the collected data to the outside, usually via Wi-Fi or Internet." With so many new devices, and much of the data collection and transmission, IoT brings many risks to privacy. As such, it is more important than ever that we are aware of these risks and take action to protect our data.

Edward Snowden, speaking at CES via Beam, echoed that sentiment by referring to all high-tech devices to cES: "They do not really think of the safety of these things very well," said -it during his speech -. we were very happy to attend -. He also covered the monitoring and expressed excitement about all the new technologies on display

L IoT and security are not the only trends at CES this week - as reported by Mashable (and the Golden Frog team to the event), here are some other top trends:

  • Drones
  • "next level" streaming
  • virtual reality
  • Smart homes
  • Hoverboards & personal transport
  • health connected devices

Be sure to check our social channels to see what we're at CES, and tell us what you think of this year's show in the comments below !

United encryption Join the battle Push for legislation at the state level

3:10 PM Add Comment
United encryption Join the battle Push for legislation at the state level -

Continuous Encryption battle! And now it makes its way to the state legislatures.

We have written before about the power that individual US states, and how this power can be used to pass laws on privacy. In many cases, this is positive when used to transmit guarantees that are not adopted nationally. Recently, however, two statements have been in the news for something less positive -. Encryption backdoor

New York announced a few weeks ago he was seeking legislation at the state level that would force phone manufacturers to add backdoors in encrypted communications. And last week, California has announced that it is the same. These bills, not surprisingly, are driven by the enforcers of the law stating that backdoors assistance in criminal investigations.

As described by Yahoo, the bill put forward by the New York would "require operating systems to manufacturers or suppliers to decrypt and unlock smartphones for law enforcement and other authorities, creating a backdoor to surpass encryption. "If manufacturers do not comply, they would face a / $ 2,500 fine device. The bill is currently in committee in the Assembly of the State of New York and has a long way to go. It is unclear how much support the bill, but it's existence is disturbing nonetheless.

Also concerning is that California has followed the example of New York this week, when Assemblyman Jim Cooper has proposed a very similar law to require smartphone manufacturers to build backdoors into devices. The bill in California would also impose a $ 2,500 fine for manufacturers who do not comply. The California bill is strongly supported by the DA, who were present at a press conference on the bill.

As indicated in the Verge, the National Association of District Attorneys did not hide his intention to mobilize the local offices of the fight against encryption. They have already announced that they want to "partner" with states for bills requiring encryption backdoors in place.

Although these bills still have a long way to go, they also the seemingly endless debate over encryption backdoors that's been ongoing in the US and worldwide. If these bills were to pass, they created a dangerous precedent for other states to follow. We hope they will not end up moving forward, and we will be watching to see what happens next

Update - March 28, 2016

as reported by USA Today, a bipartisan group of lawmakers in Congress are "pushing legislation" that would prevent states from being able to adopt their own laws at the state level to require backdoors in devices encrypted.

New bill seeks to stop the state bans Encryption

2:08 PM Add Comment
New bill seeks to stop the state bans Encryption -

encryption The battle took another twist this week when a new bill entitled the rights national constitutional ensure your private telecommunications (ENCRYPT) Act 2016, was introduced by two members of Congress USA. This bill is a response to recent efforts by individual states to enact encryption backdoors, and aims to make "encrypting a federal issue and keep the individual states try to ban it."

After becoming frustrated that encryption backdoors haven 't been mandated at the federal level, two states (California and New York) recently introduced the bill to try to adopt at the state level . While these state bills have few supporters (including the National Association of District Attorneys), there are also many concerns that surround them. Aside from the privacy concerns associated with a backdoor encryption, there are also questions about their feasibility as they "would probably force a company like Apple to choose between not sell iPhones encrypted by default in States or the development of a replacement product line with lower security. "

the ENCRYPT bill aims to stop this legislation at the state level, and was highlighted by Ted Location and Blake Farenthold. Location has a degree in computer science and is one of the strongest advocates for strong encryption. We see the ENCRYPT Act as promising news in the ongoing battle over encryption, and we hope that others will join in supporting efforts to protect privacy.

What do you think will happen next in the battle encryption? Tell us in the comments below

Source :. The Daily Dot

Read more on this issue from the US News

Community law raises workplace about privacy

1:07 PM Add Comment
Community law raises workplace about privacy -

A judgment was passed in January by the European Court of Human Rights which may set a precedent regarding whether companies can legally monitor conversations of workers. This decision was in the case of c Bărbulescu. Romania, where a worker was fired for using a mail account for personal purposes. His company controlled its working cats to determine he did not use the messenger as advised. The means to power, in fact, companies have the right to monitor private online communications that occur in the workplace

As pointed out by Mashable, there were two notable points made in this case:.

  1. account has been created for commercial purposes at the request of his employer, to be used as part of his working process
  2. employee was said that the personal communication on this messenger was not allowed

Although this decision does not necessarily mean that all employers will violate privacy or monitor employees in the workplace, it could create a precedent for the future. It highlights the importance of using caution and check your policy when communicating in the workplace. As indicated in TechSpot, "The judgments of the ECHR are binding for countries which have ratified the European Convention on Human Rights, and set a precedent for future cases involving employee surveillance."

Blocking streaming services increases

12:06 PM Add Comment
Blocking streaming services increases -

Nearly two months after Netflix initially announced they would crack down on proxy services, the media is now reporting that Netflix blocks VPN users to access the their services. VyprVPN customers also report more they see the message Netflix "Error flow" when using VyprVPN, but access problems were contradictory. Many customers report that VyprVPN continues to give them links with full access to Internet services, including Netflix.

According to reports, it is still unclear how Netflix blocks VPN services. The blocking can be based on customer behavior, such as multiple connections from different IP addresses in a day or a week, or it can have a big blocking specific network ranges that show a specific connection diagram. Some VPN providers and hosting services can be blocked outright. the VyprVPN users have also reported that other streaming services such as Hulu, BBC iPlayer, and Amazon Prime are not working properly, but similar to Netflix access questions were contradictory. It seems that some other VPN providers are IP switching as a temporary solution, but we feel this approach "Whack-a-mole" is not a sustainable solution.

We are disappointed that Netflix has stepped up efforts to block VPN because it forces customers to have to choose between their own safety and the service for which they have already paid. Netflix certainly understands the value of the open Internet - VPNs are an important tool to their clients use to bypass the restriction imposed by Internet service providers discouraging the use Netflix. VPNs are the best friend of Netflix to help customers accelerate their Internet connections when Comcast was intentionally slowing the Netflix content. But now, VPNs are the enemy? We need a more encrypted Internet connection, not less.

"VPN encryption is an important tool for online privacy. Whenever VPN use is discouraged, even subtly, there are risks relating to cyber security. For example, if I'm travel and planning to watch a Netflix movie in my hotel room, it would be stupid of me to turn off my VPN and open myself to the dangers of Wi-Fi hotel. "

many VyprVPN customers around the world connect to a server location in the country to get past an ISP throttling their streaming traffic. These VPN users are not accessing any geo-restricted content. They are simply proactive in taking steps to optimize their Internet experience

-. Sunday Yokubaitis, President, Golden Frog

As we said in January, Netflix also has better options available to control access to their service. This includes billing information to customers, which is used by companies worldwide to reduce fraud and control access to resources based on location. Here at Golden Frog, we use the same information to help detect abuse of our network. A company like Netflix has the ability both to control access to their service, intelligent selectively while continuing to support private, secure and not strangled at their service. We welcome an open conversation with Netflix and other streaming services on how we can continue to protect the privacy and user security while giving their customers complete their expected service. But in the end Netflix account is in control of their service.

Our mission is to ensure security, privacy and freedom. This means that we work hard to protect people against pirates, provide personal information to people, and open the Internet for people living in restrictive parts of the world. That is our goal and our passion. While we recognize that some users want to use our service to access streaming services, we can not guarantee that VyprVPN work with Netflix and other streaming providers move forward (nor can any other VPN provider) . We will however continue to provide a VPN connection the most capable and fastest possible.

RESOURCE

  • Read our initial response to the crackdown Netflix
  • learn more about how a VPN may increase your speed streaming
  • learn more about how a VPN can enhance your online privacy
  • learn more about the situation with Netflix.
  • Read Golden Frog Vision Paper
  • See the petition for Netflix to stop banning VPN, which now has 45,000 signatures

SXSW 2016 Take Back Your Internet Recap event

11:05 AM Add Comment
SXSW 2016 Take Back Your Internet Recap event -

On March 12, during SXSW Interactive 2016, we hosted our 4th Annual Take Back Your event on the Internet. In addition to a party, we organized a panel with the business thought leaders, policy and sides of government. Our panel, entitled " Have you the right to privacy? The Backdoor Encryption Debate, " covered encryption, encryption backdoors, and related privacy issues. Of course, the battle Apple with the FBI was also an important theme.

the panel was moderated by Jim Cardle, publisher and CEO of TexasInsider.org, and our panelists included (left to right in photo below):

  • Nuala O'Connor - President and CEO of the Center for democracy and technology
  • Alan Fairless - Co-founder and CEO of SpiderOak
  • Congressman Will Hurd - 23th District of Texas
  • Philip Molter - Co-CTO at Golden Frog
  • Daniel Schuman - policy Director demand Progress

SXSW 2016 Take Back Your Internet

the event was sponsored by . Golden Frog, Data Foundry, SpiderOak, Anonabox and i2Coalition It was a great evening - thank you to everyone who came

panel Highlights

Some quotes our panelists are presented below

[

At CDT, we believe that your data is not only your property - it is part of you. It is part of your digital self.

-Nuala O'Conner, CDT

it's not just for privacy, it is our economic competitiveness.

-Alan Fairless, SpiderOak

Everything enforcement agency law has no right to tell a company what to do. Period.

-Congressman Will Hurd

the thing that surprises me most is how misinformed the government is on the technology and process. Encryption itself is really, really hard.

-Philip Molter, Golden Frog

when you create a hole for someone, you create a hole for everyone. Regarding this kind of technology there is no middle ground.

-Daniel Schuman, Demand Progress

Photos

some photos of highlights of the event are included below. Thank you all for attending!

SXSW 2016 Take Back Your Internet

SXSW 2016 Take Back Your Internet

SXSW 2016 Take Back Your Internet

SXSW 2016 Take Back Your Internet

SXSW 2016 Take Back Your Internet

Justice Department Sues Microsoft Over Data Applications

9:03 PM Add Comment
Justice Department Sues Microsoft Over Data Applications -

Microsoft sued the Ministry of Justice of the United States, during a common practice that the tech force companies to deliver data about their customers to the government without the knowledge of the client.

The case was filed last week to fight against a law allowing agencies the opportunity to request to read e-mails or files online without the permission or knowledge of the owner. That, in the opinion of Microsoft, violates the United States Constitution. The power-house technology company firmly believes that the US government can not prevent technology companies to tell customers when their data has been compromised or reviewed by federal agents.

Microsoft chief counsel Brad Smith said the company filed this lawsuit because it was a matter of fundamental rights, "it is becoming routine for the US government to issue orders requiring email providers to keep these types of legal claims secret. We think it goes too far and we ask the courts to resolve the situation. "Microsoft argued in defense of the Fourth and the First Amendment.

This is not the first time the federal government has the fire object to these gags oriented technology companies. In 2013 a California judge declared that these rules are in violation of freedom of speech and expression. Twitter is also struggling now the government for the right to disclose the number of national security letter they receive (which, currently they are only allowed out in batches of 1000).

We believe that customer privacy and data security are two of the most important values ​​of a company must comply, and will look to see how it unfolds.

The evolution of the encryption debate

8:02 PM Add Comment
The evolution of the encryption debate -

Encryption has been in the news a lot recently. Whether Apple vs the FBI, Microsoft continues the Department of Justice, senators or the drafting of bills to require mandatory encryption backdoors, encryption and cyber security are hot topics recent. We take a look at the key events in the past two decades, which have helped shape the debate of whether encryption is a necessary tool or a dangerous roadblock.

Take a jump to the 20th century, 1993 was a great year for the encryption technology. The Clipper chip is an encryption technology developed and promoted by the NSA, with integrated backdoor. The Clipper chip aroused considerable game when it was tied to the illegal government surveillance and was found to contain several key vulnerabilities and flaws. In 1996, it was more relevant, but it would not be the last time the government tried to load an encryption backdoor.

Four years later, in 1997, a report related to security entitled "Key Recovery Risks, Escrow Key, and Trusted Encryption third" highlighted the risks, costs and implications of systems allow government access to encrypted keys deployment. Many technology professionals, including Cryptographer Bruce Schneier, have stressed the importance of activating the encryption types that do not allow government interference or the access. the paper has collected a considerable amount of discussion and is still cited in today's encryption debate.

more than a decade later, in 2013, former employee of the NSA Edward Snowden leaked thousands of documents classified NSA to many journalists. the documents presented details of secrecy "Bullrun" project NSA created to decipher the encryption codes and monitor mass communications. Snowden currently lives in Russia, a country which has granted him temporary asylum. Called a whistleblower, a hero, a villain and much more, Edward Snowden is on his decision to flee the private documents of the NSA, and is currently active in the debate on privacy on the Internet.

Today, the encryption debate rages with high profile cases such as Microsoft and Apple vs FBI against the Department of Justice. Apple was ordered to help unlock iPhone shooter San Bernardino, which they refused to do so because it would compromise the privacy of all Apple users. The case was eventually dropped when the FBI decided to turn to a third source to unlock the iPhone. Microsoft is suing the Ministry of Justice of the United States during a common practice that the tech force companies to give data about their customers to the government without the knowledge of the client. Adding oil to the fire, a recent bill introduced by Senators Richard Burr and Dianne Feinstein called for high-tech companies to create mandatory backdoors in their technologies.

The encryption debate will surely continue to evolve and progress, and we hope that the conversation continues help spread more awareness and education surrounding the issue. We support strong encryption, unbreakable, because it is the only way to ensure that private online life is really protected. We hope the US government will adopt encryption as a tool to protect people, not harm them.

Yahoo se débarrasser des mots de passe [1945001

7:01 PM Add Comment
Yahoo se débarrasser des mots de passe [1945001 - ] 17
Mar
2015
Yahoo To Get Rid of Passwords

Les mots de passe ont toujours été un inconvénient, en essayant de créer une expérience mémorable qui est à la fois sécurisé et facile à retenir, puis essayer de se rappeler en fait le mot de passe. scanners d'empreintes digitales sont venus et repartis avec peu de succès. Maintenant, il semble y avoir une bonne alternative que d'essayer de se rappeler une série de lettres et de nombres complexes. Yahoo de se débarrasser des mots de passe en supprimant la nécessité d'entrer un mot de passe, mais ont plutôt un mot de passe temporaire de quatre chiffres envoyé sur le téléphone de l'utilisateur pour accéder aux comptes.

Yahoo a dévoilé leurs plans au festival SXSW de cette année à Austin, Texas. En utilisant un processus d'autorisation en deux étapes, l'utilisateur doit d'abord entrer un mot de passe fixe, puis connecter un téléphone mobile au compte. A partir de là, un mot de passe «à la demande» peut être mis en place. Tous un utilisateur a besoin est leur téléphone portable et ils peuvent simplement demander un mot de passe temporaire à envoyer à eux via un message texte et entré en ligne. Cela évite la nécessité de se rappeler un long mot de passe qui peut être craqué par des pirates et au lieu d'un simple mot de passe est envoyé en toute sécurité.

Un problème avec cela pourrait être le fait que si un voleur a obtenu le téléphone, puis tout ce qu'ils doivent faire est d'envoyer le mot de passe temporaire au téléphone et ils seront en mesure d'accéder au contenu en ligne. Mais au moins à cet égard, les pirates distants trouveront presque impossible de se fissurer. Cette décision pourrait ouvrir la voie à d'autres entreprises de sauter à bord dans le développement des moyens nouveaux et plus pratiques pour protéger notre vie privée et des données. Yahoo va déployer la nouvelle fonctionnalité de mot de passe aux États-Unis sans un mot sur le reste du monde.

Jusque-là, assurez-vous que tous vos mots de passe sont forts et difficiles à pirater, en utilisant une série de mémorable, mais sans rapport mots. En utilisant Le VPN vous pouvez être sûr que personne ne sera fouiner sur votre activité en ligne en cryptant votre connexion Internet où que vous soyez. Inscrivez-vous pour Le VPN aujourd'hui et profitez de la vraie liberté et la sécurité de l'Internet.

Le grand pare-feu de la Chine [1945001

6:00 PM Add Comment
Le grand pare-feu de la Chine [1945001 - ]

Comme le Grand Prix de Formule 1 à Shanghai se déroule du 12 au 14 Avril, Reporters sans frontières exhorte les autorités chinoises à accepter la liberté d'expression et d'arrêter la censure.

la Chine est actuellement classé 173e sur 179 pays dans le classement mondial de la liberté de la presse. Le contrôle de l'information se fait par la censure des médias, les représailles contre les personnes impliquées dans l'information et une résurgence de blocage de sites Web et la surveillance d'Internet.

À ce jour, 30 journalistes et 69 internautes sont emprisonnés. Les autorités chinoises ont encore durci la répression pour un peu plus d'un an: détentions arbitraires, procès inéquitables et des peines sévères ont augmenté et cybercensure a été particulièrement sévère

Le harcèlement et la pression sur les dissidents et leurs familles sont très fréquentes.. Le Bureau de la publicité (aka l'ancien Bureau de la Propagande) donne chaque jour des directives très spécifiques pour les médias chinois, y compris les sites d'information sur des sujets ou des événements qu'ils ne sont pas autorisés à parler en se référant à une agence de nouvelles Xinhua, et ce qu'ils sont autorisés et même encouragés couvrir. Une fois un cas mobilise l'attention des médias, que ce soit sur Internet ou dans d'autres médias, les agents leur rappellent l'importance de la stabilité politique et sociale en Chine.

La nouvelle année de rédaction de la revue réformiste Southern Weekend hebdomadaire qui a parlé des espoirs de changement en 2013, a été censurée par le Département de la propagande, ce qui a provoqué une mobilisation sans précédent de journalistes et net-citoyens pour la liberté d'information.

les autorités pratiquent la désinformation et la censure pour contrôler leur image, également au niveau international . Cela peut avoir des conséquences graves: le gouvernement chinois a attendu trois semaines après la mort de personnes qui ont contracté le virus H7N9, à Shanghai, pour discuter du risque d'épidémies. Une douzaine de cyber-utilisateurs qui ont parlé de cas d'infection sur l'Internet ont été arrêtés pour avoir distribué soi-disant «fausses informations».

Le grand pare-feu est le surnom donné au système de censure et de surveillance du Net en Chine, qui est parmi les plus sophistiqués au monde.

Sur l'Internet, des mots-clés tels que «droits de l'homme" ou "Tiananmen" sont bloqués. Les autorités chinoises, même enrôler les entreprises privées comme les réseaux sociaux ou Sina Tencent pour surveiller sur les utilisateurs et supprimer des références sur des sujets délicats

Le gouvernement cherche également à contrôler la couverture par les médias étrangers. Après la censure en Juin 2012 du site de Bloomberg, à la suite de son enquête sur la fortune de la famille Le président chinois, le New York Times a également été censurée et menacé de poursuites après avoir publié un article sur la fortune accumulée par la famille du Premier ministre Wen Jiabao. La BBC a également confirmé que "des pannes de courant intermittentes (des programmes) ont été identifiés (...) et intensifié en Février". En Mars, deux journalistes britanniques de Skynews ont été arrêtés. Et la Chine continue de refuser plus de visas et accréditations.

Pour éviter la censure et être en mesure d'accéder aux sites de votre choix, choisissez un service VPN qui rend votre connexion Internet totalement anonyme. Il vous suffit de sélectionner un serveur VPN dans l'un des 100 pays disponibles. Vous pouvez accéder à des sites bloqués et de protéger votre activité sur l'Internet avec un tunnel VPN sécurisé qui comprend un cryptage militaire virtuel. Installation Le VPN est assez simple et prend moins de 2 minutes. Acheter un service VPN ou aujourd'hui notre offre de VPN sans test.

VPN for China