Act to protect your privacy; Saying "NO" to a global surveillance state!

2:33 PM Add Comment
Act to protect your privacy; Saying "NO" to a global surveillance state! -

Privacy In previous posts, we discussed that the US Privacy Act on Electronic Communications (ECPA) and the need is update. We also talked about the direction of Texas has shown through its amendment of ECPA to ensure the confidentiality of messages in Texas and how it provides a legislative model that sends a strong message to Washington DC that the time to get the federal amendment now.

While a bill to amend ECPA is before the Congress of the United States (S. 607) as we speak, he is far from finished. To get it passed, everyone who cares about keeping private electronic communications needs to make their voices heard. But the issue is bigger than that, and much needs to be done other invasions of privacy by the United States and other governments continue to make the news.

Continuing threat to the amendment ECPA

The United States Securities and Exchange Commission (SEC) is looking for an exception to the law on the reform of the ECPA that weakens legislation seriously. The SEC is seeking access to electronic data of all citizens without a court order. The application of the SEC has an impact on the progress of the bill and there is not date set for a Senate vote on S. 607.

More than the 4th Amendment

while most of the focus on privacy was on the 4th amendment to the United States Constitution, others are equally relevant, especially to other parts of the Bill of rights. The Constitution protects against government seizure of property without due process and compensation. Electronic communications are data; your data is your property. Therefore, data entry without due process and compensation is unconstitutional. What the National Security Agency (NSA) has been violating our constitution; SEC proposes that all civilian agencies should also be able to violate our constitutional rights.

The world is watching

Around the world people wonder where their data is stored. The United States is considered a dangerous place for data. With the growth of cloud computing in the balance, the United States must provide assurance that the data in the world can be safely and securely stored within its borders. continuous gaps in protection of privacy will severely limit the role of the United States on the world market of cloud computing.

What can you do?

We gave you two ways to protect yourself online by encrypting your communications in transit and on disk. VyprVPN encrypts your content while in transit. Despite recent reports that the government has found a way to intercept encryption technologies and decrypt them, we do not believe they can do with VyprVPN. If you store your content with us, you can also go further and encrypt your content stored so that neither we nor the government can read it.

We have, and will, do everything possible to ensure that the Internet remains open and free and no government - if the United States or any other - can steal your private information. Internet users around the world are facing threats of censorship and privacy. VyprVPN and our other Golden Frog products are designed to counteract these threats to freedom, privacy and freedom of expression worldwide.

We can not do much. Each of you can and must do more. It's time to stop your rights to privacy of the disappearance, visit vanishingrights.com to learn. You can also enjoy reading an article on the Daily Sheeple on how widespread espionage and became an article on reason.com entitled "How can we accept supervision."

We will all tell our elected officials that they need, right now, to stop this progression to a global surveillance state. trust needs to be restored not only the American people but the world. the things you do and the things you create are your property. do not let our government, or any other, you take it. they will if you do not act now. Use our VyprVPN and other encryption products. But now pronounce before they are prohibited and privacy, and therefore all our freedoms and liberties are lost.

Ron Yokubaitis, co-CEO, Golden Frog

Spotlight on our new VyprVPN App for Mac 2.0

1:32 PM Add Comment
Spotlight on our new VyprVPN App for Mac 2.0 -

VyprVPN for Mac We are almost ready to unveil our new series, re-imagined VyprVPN 2.0 applications for Windows, Mac, and Android iOS. Using VyprVPN on any mobile and desktop device will be easier, faster and intuitive than ever. You will discover why our beta testers have told our 2.0 applications are the most beautiful, elegant and reliable VPN applications they have ever used.

For our Mac users, we wanted to throw the spotlight on our new VyprVPN App 2.0 for Mac and all the great new feature we added to it. You will love all the time-saving features like one-click connect, a selection tap the server location, easy access from the menu bar, and the ability to ping test and find the fastest server.

What's new in VyprVPN for Mac 2.0?

Sleek New Interface 2.0

The VyprVPN App for Mac 2.0 has a sleek and clean look to match your experience of the operating system. Plus, get powerful new features and customization options.

Easy One-Click Connect

Easy One-Click Connect

to connect and disconnect VyprVPN with one click. easily encrypt your Internet connection and secure your personal data.

Faster Server Selection

Selecting the fastest server, switching and the ability to Add Favorites

easily switch between 40+ locations across North America, Europe, Asia Pacific, and specific servers favorites for easy access.

Ping Test

ping test to find the fastest server

Ping test VyprVPN server to find the fastest server.

Easy Menu Bar Access

Easy Access Menu Bar

Connect and locations server switching, and display your IP address the Mac Menu Bar of the connection speed.

Want an overview of our 2.0 applications? We are still allowing sign ups for our beta programs. We are always happy to get a more candid feedback. As always a big thank you to all our beta testers for your suggestions. We are always listening, and the continuous improvement of our products.

We will update you on new media applications on this blog and our social media channels so stay tuned! Subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+.

If you have an idea or feature request product, please share it with us on our ideas about our Golden Frog Ideas microsite.

Privacy and selfie: Words of the Year paradoxically define our new generation

12:31 PM Add Comment
Privacy and selfie: Words of the Year paradoxically define our new generation -

Privacy There A few weeks ago, the Oxford Dictionary named "selfie" the word of the year . However, earlier this week, Dictionary.com countered with "Privacy" as word of the year.

People of Snapchat should be very happy, but selfie and confidentiality are two words that often contradict each other.

Various surveys show that Internet users want more privacy online. However, their actions often indicate that they care very little about it. We often hear people complain about the NSA surveillance scandal and they want to regain control of their lives and digital data. These same people then proceed to chronicle every detail of their life every day on Facebook, Twitter, Instagram and many other social sites

The paradox of the present era is that we want both :. The ability to set our own digital identity freely sharing private information, and the right to keep our privacy and security where it matters. People take a new sense of self if they can train and build their own digital identity. At the same time, there is a growing awareness of the unwarranted surveillance, risks of cybercrime and to lower net freedoms worldwide.

In a world where everyone from Google and Amazon to your local stores collect data on you, each "selfie" has universal significance. Emails and text messages were once thought to private communications. However, we learned governments to access and regularly collect this data, even without a warrant.

From PRISM and scandal Edward Snowden, the popularity of Google Glass, 2013 was the year when the need to be seen and heard has been turned on its head. Now more than ever, people are looking for tools such as secure Web sites, and a personal VPN to encrypt their data and take control of their Internet experience.

Protecting your privacy on your terms

What is indisputable is the enormous impact technology can have on society. Sharing and communication via the Internet is a satisfying part of our modern lives, and very few people are willing to significantly change their habits online. At the same time, people make value privacy, but they want on their own terms.

This means that companies such as Golden Frog to provide privacy solutions that are not binding or inconvenient. Privacy solutions that work on all modern appliances and in all countries. Our hope is that while Internet users can not secure all of their online communications, they will be careful enough to use a VPN to protect their identity and personal data on financial transactions, purchases online with a credit card, or sending sensitive business emails.

Golden Frog's commitment to make the simple privacy and accessible to everyone why we continually strive to improve our products VyprVPN. Our in-house engineers have worked exceptionally hard to create advanced VyprVPN 2.0 Applications for Windows, Mac, Android and iOS so you're protected on every desktop and mobile device. Besides providing the fastest service, VPN the most stable on the market, the 2.0 applications are incredibly easy to use.

We are on a mission to educate consumers that take your digital privacy is more important than ever. Even if you do not think you have something to hide.

Tech In Asia: VyprVPN slides on iOS and Android, but can he jump Great Firewall of China more nimbly than its competitors

11:30 AM Add Comment
Tech In Asia: VyprVPN slides on iOS and Android, but can he jump Great Firewall of China more nimbly than its competitors -

Chameleon "packet metadata scrambles for OpenVPN ensure it is not recognizable via deep packet inspection "and specifically" designed to hide the Internet traffic to defeat blocking VPN in restrictive environments such as China "

Read the full article :. VyprVPN slides on iOS and Android, but can he jump the Great China Firewall more nimbly than its competitors?

SXSW 2014: "Take Back Your Internet" Party Recap Video Privacy Panel +

10:29 PM Add Comment
SXSW 2014: "Take Back Your Internet" Party Recap Video Privacy Panel + -

We had a lively discussion covering the cultural, political and technological factors affect online privacy . We co-sponsored a Take Back Your Privacy on the Internet and the Panel Party with Giganews and Data Foundry 9 March in Austin, Texas during SXSW. The event honored the global fight for online privacy and uncensored Internet for all.

A big thank you to all who participated. We had a house full of people who clearly cared about these issues and engage the panelists making a crisp and lively debate

The panel :.

  • Kevin Bankston - Policy Director, Institute of Technology Open New America Foundation
  • Evan Greer - Campaign Manager, Fight for the Future
  • Representative Bryan Hughes - Texas House of representatives, District 5
  • Ali Sternburg - public policy Advisor to the ICC
  • Ron Yokubaitis - co-founder and co-CEO of Golden Frog, Giganews and Data Foundry Texas.net

The panel was moderated by Stacey Higginbotham, senior writer at GigaOm.

more people in the room, we had viewers around the world who watched the live panel on our website and sent us questions via Twitter. We also thank our diverse panel of experts for a truly informative and enthusiastic discussion.

You can see the full report here.

PROTECTION OF VIDEO PANELS

If you don 't catch the panel in person or online, you can watch now:

Thanks again for making our annual celebration unforgettable! Here are some pictures of our "Take Back the Internet" Privacy Panel:

The Panel

The Turn Out

The Party

The Site

Netflix vs Comcast - Peering

9:28 PM Add Comment
Netflix vs Comcast - Peering - problem

online streaming services are getting slower and major ISP's are more powerful. 2014 was a controversial year in terms of the architecture of the Internet, and unfortunately it seems that things will not get better in the near future.

One of the most controversial topics this year was the throttle streaming services by major ISP they take for payments services like Netflix, which produce a high part of the bandwidth their networks. This process has been brought to the forefront when Netflix and Comcast have designed a transit agreement paid in February, which gives direct access to Netflix Comcast network for an undisclosed amount of money.

The details of this agreement are wrapped complexity, but the bottom line seems to be a lose - lose situation for the average Internet user paying the ISP bandwidth and streaming services for TV shows, video chat, music, and more. Not only does this agreement sets a dangerous precedent, but it could pave the way for a compromise version of Net neutrality in the future. "Peering problem" examines the past, present and potential deals with the impact of the future as the agreement Comcast and Netflix could have on the shape of the Internet.

The Peering Problem

The Hidden Dangers of DNS

8:27 PM Add Comment
The Hidden Dangers of DNS -

Our computer graphics, "the hidden dangers of DNS" explains how your DNS requests can be captured and stored by third parties. Learn how you can prevent these violations privacy using VyprDNS, which is integrated into VyprVPN, and increase your online security.

DNS Infographic

Myth # 5 :. Although my VPN provider uses VPN servers hosted or cloud-based, I can still be Anonymous

7:26 PM Add Comment
Myth # 5 :. Although my VPN provider uses VPN servers hosted or cloud-based, I can still be Anonymous -

Myth 5

myth is presented today "Even though my VPN provider uses VPN servers hosted or cloud-based I can still be anonymous." many VPN providers say they "do not connect", but do not have their servers . This unnecessarily exposes your data to 3rd parties Learn the reality behind Myth # 5 and stay tuned for the myths 6 and 7 of our last article, I'm Anonymous When I use a VPN - .. 7 myths Debunked

  • Myth # 1 :. I can be anonymous on the Internet
  • Myth # 2 :. Anonymity and confidentiality are the same
  • Myth # 3 :. When my VPN provider announced a "limited" service, which means they will connect any identifying information about me
  • Myth # 4: When the Privacy policy of my VPN provider said they "do not connect", that means I'm anonymous
  • Myth # 5 :. Although my VPN provider uses Hosted or cloud-based VPN servers I can still be anonymous
  • Myth # 6: - 16th July .. Although my VPN provider has and not exploit the network I can still be anonymous
  • Myth # 7 - July 17 Everything Logging VPN is Bad

I When I use anonymous VPN - 7 myths Debunked is the last article in our "Take Back Your internet." political microsite. The "7 myths" article addresses a disturbing trend in the VPN industry during the past year. Increasingly VPN providers perpetuate the myth of a VPN or service "anonymous" "no logging", while providing minimal or no transparency on how they actually manage your data. This diverted conscious VPN user privacy to concentrate on the false promise of anonymity instead of focusing on what really matters when choosing a VPN provider :. Transparency, trust, ease of use, performance and reliability

To keep up with Golden Frog, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+.

From ExtremeTech: How to use a VPN to boost your performance Netflix - even if you're not a Verizon customer

6:25 PM Add Comment
From ExtremeTech: How to use a VPN to boost your performance Netflix - even if you're not a Verizon customer -

The system has degraded to the point that yes, it is now logical to buy a service like VyprVPN because it is the only way to effectively use the bandwidth that you buy in the way you see fit

Read the full article :. How to use a VPN to boost your performance Netflix - even if you're not a Verizon customer

VyprVPN server is now available to New York!

5:24 PM Add Comment
VyprVPN server is now available to New York! -

We added a new VyprVPN server location in New York, New York, USA! This is our fifth location of the US server. You can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

VyprVPN New York

How to access the location of the New York server: .

  • VyprVPN office -. If you use VyprVPN App Desktop, the new location of the server is automatically available when you choose the location of your server
  • VyprVPN mobile - if you use mobile VyprVPN App, simply log out of the application and reconnect to allow New York as an option
  • manual configuration - If you manually adjust VyprVPN on your operating system, you can update your hostname to VyprVPN :. us5.vpn.goldenfrog.com

You have unlimited access to the following VPN server locations:

  • Asia - Hong Kong
  • Australia - Melbourne
  • Australia - Perth
  • Australia - Sydney
  • Austria - Vienna
  • Brazil - São Paulo New
  • Belgium - Brussels
  • Canada - Toronto
  • Czech Republic - Prague
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki
  • France - Paris
  • Germany - Frankfurt
  • Iceland - Reykajvík
  • Indonesia - Jakarta
  • Ireland - Dublin
  • Italy - Rome
  • Japan - Tokyo
  • Lithuania - Vilnius
  • Malaysia - Kuala Lumpur
  • Mexico - Mexico City New
  • Netherlands - Amsterdam
  • New Zealand - Auckland
  • Norway - Oslo
  • Philippines - Manila
  • Poland - Warsaw
  • Portugal - Lisbon
  • Romania - Bucharest
  • Russia - Moscow
  • - Singapore
  • South Korea - Seoul
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Thailand - Bangkok
  • Turkey - Istanbul
  • Vietnam - Hanoi
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Miami
  • US - New York New
  • US - Washington

We have additional server locations lined up for launching any the year so stay tuned! Visit Golden Frog ideas to share your product ideas, feature requests and recommendations for the location of our next server.

If you want protection for your Internet connection while at home or on the road, try VyprVPN with our free 3-Day trial. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

Keep up to date with VyprVPN by subscribing to the Golden Frog blog or follow us on Facebook, Twitter and Google+.

New VyprVPN server location in San Francisco!

4:23 PM Add Comment
New VyprVPN server location in San Francisco! -

San Francisco

We added a new VyprVPN server location in San Francisco, California, USA! This is our location of the server 7 in the US. You can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

How to access the server location in San Francisco

  • VyprVPN desk - If you use. VyprVPN Desktop, the location of the new server is automatically available when you choose the location of your server
  • Mobile VyprVPN -. If you use mobile VyprVPN, just log on and get back to turn San Francisco as an option

You have access to 46 server locations across North America, America South, Europe, Asia and Oceania.

Blog World New SF

We have server locations. Additional aligned to run all year so stay tuned! Visit Golden Frog ideas to share your product ideas, feature requests and recommendations for the location of our next server.

If you do not have VyprVPN, and want protection for your Internet connection while at home or on the road, try VyprVPN with our free 3 day trial. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

Keep up to date with VyprVPN by subscribing to the Golden Frog blog or follow us on Facebook, Twitter and Google+.

The battle for the Open Internet Came to Texas

3:22 PM Add Comment
The battle for the Open Internet Came to Texas -

Earlier this week, we had the pleasure of traveling to Texas A & M University in College Station, Texas for a discussion of FCC group and open forum. He was welcomed by Commissioner Ajit Pai FCC, and featured Edward Henigin, CTO of our sister company Data Foundry, on the panel. Read the story of Edward Henigin on regulation of the Internet and to maintain an open Internet, or watch the live recording of the round table and forum.

commissioners rarely leave Washington to meet the public, and now, this event was the only one of its kind on the calendar. It was supplemented by a rally organized by our friends of the free press which attracted media attention and many people in favor of an open Internet.

During the discussion, Ed strongly argued that in the context of promoting an open Internet, the Commission should promote open access by reclassifying the transmission component of broadband "networks last thousand "as a Title II telecommunications service.

Although some on the panel joined with major telecommunications and cable companies to resist the push for Title II reclassification, nearly everyone in the audience accepted!

Finally, the discussion goes beyond the need for Title II reclassification. Unfortunately, the proposed open Internet rules currently under consideration by the FCC will allow service providers such as AT & T, Verizon, Comcast and Time Warner to manage their networks at a "commercially reasonable". This would include allowing them to charge content providers for "fast lane" access. While this might make Netflix flow a little faster, it ends effectively any hope of a truly open Internet. For example, the proposals would not prevent ISPs to block encryption or other technologies to improve confidentiality. This will allow ISPs to Snoop and follow their habits of Internet users to provide "relevant contextual" ads and help government oversight. The proposed rules will leave us with the same broken Internet where users do not need to have options, and where ISPs will not compete on price, quality of service and the overall service and customer satisfaction.

Golden Frog opposes the telecommunications and cable because the simple fact is that high-speed Internet access in the US is currently subject to any real competitive forces and the abuse actually occurred. Golden Frog does not support Internet / proposed rules open "net neutrality" because they eviscerate the rights of privacy of Internet users. The rule "non-discrimination" presented by some advocates would actually need of discrimination, and they are definitely not "neutral."

We believe means an open and free Internet traffic should be transmitted without special treatment, unless the user has specifically requested a priority review for a application or a service. We strongly disagree that telecommunications and cable companies should be able to charge special fees for delivery "priority." We certainly do not agree that they should be allowed to make you give up all privacy and effective encryption ban so they can inspect your traffic. - Who is the only way they can implement their plan

Austin American Statesman: Ted Cruz has technicians with anger "Obamacare for the Internet," notes

2:21 PM Add Comment
Austin American Statesman: Ted Cruz has technicians with anger "Obamacare for the Internet," notes -

Description US Senator Ted Cruz of net neutrality as "Obamacare for Internet "has sharp partisan divide on a complex issue and caused a torrent of criticism of technicians across the ideological spectrum

Read full Article .: Ted Cruz draws anger with technicians" Obamacare for the Internet, "notes

How NSA stole the keys to your phone

12:19 PM Add Comment
How NSA stole the keys to your phone -

(Editor's Note :. The following is a guest blog by Julian Sanchez, Senior Fellow at 'Cato Institute It appeared originally on the site Cato Institute, February 20, 2015. the Cato Institute is a research organization on public policy - a think tank - dedicated to the principles of individual liberty, limited government, markets free and peace)

julian_sanchez

Julian Sanchez

senior Fellow Cato Institute

a the Intercept success story revealed Thursday that a joint team of pirates of the national security Agency and its British counterpart, the Government communications Headquarters (GCHQ), broke into the systems of one of the largest manufacturers SIM mobile phone card world to steal the encryption keys that provide wireless communications for hundreds of mobile carriers- including companies like AT & T, T-Mobile, Verizon and Sprint. To perform the heist, agencies, employees of the Dutch company Gemalto target, scouring emails and Facebook messages to obtain information that would allow them to undermine the SIM card manufacturer networks to surreptitious copies of keys before they are transmitted to the carriers. Many aspects of this should be extremely disturbing

First, this is a concrete reminder that, as the former director of the NSA recently recognized Michael Hayden, intelligence agencies do not spy on "bad people". they spy "interesting people." In this case, they spied extensively on respectful technicians of the law employed by a foreign company law abiding and hacked this company in apparent violation of Dutch law. We know that it was at hardly a single case a pirate, NSA touted in released documents Snowden there nearly a year on "sysadmins hunting", but it seems particularly poetic in the wake of the recent Sony hack, properly condemned by the US government. Dutch lawmakers named in the story are outraged, and they should be. citizens and companies in allied countries, engaged in any peaceful private fault, should not have to fear that the United States trying to break into their computers .

Second, the indiscriminate theft of mobile encryption keys bypasses one of the few checks on government surveillance allowing eavesdropping without the help of mobile phone operators. The typical pattern of wiretapping, the government has the support with some form of law specifying accounts or process lines are targeted for surveillance and the company then provides these communications to the government. As European telecommunications operator Vodafone leaked last summer, however, some governments insist on giving "direct access" to the flow of communication so that they can conduct their wiretapping without going through the carrier. The latter architecture, of course, is much more likely to abuse because it removes the non-governmental layer of truly independent review of the collection process. A spy agency who wanted to abuse his power under the old model by conducting wiretaps without lawful authority or invent pretexts to target political opponents, would at least have to fear that lawyers or technicians the telecommunications operator can detect something wrong. But any armed entity mobile encryption keys effectively has direct access: they can aspire cellular signals from the air and listen to all or part of the calls they intercept, subject only to internal controls or guarantees

There. are, to be sure, times when going to the door of the target legal process is not a viable option, because the company is outside the jurisdiction of the United States or our allies. Stealing bulk phone keys is definitely a much easier solution to this problem that the development of strategies tailored to interception is the specific target or specific uncooperative foreign carriers. Unfortunately, the most practical solution in this case is also a solution that gives the United States (or at least the intelligence community) a direct interest in the systematic uncertainty of the global communications infrastructure. We hear a lot lately about the value of sharing for information Cybersecurity: Well, here's a case where the NSA had information that US citizens and technology enterprises rely on to protect their communications was not only vulnerable, but had actually compromised. Their mission is supposed to be to help us secure our networks, but communications have chosen the easy solution to the problem of driving cellular telephone tapping, institutional incentives should do exactly the opposite.

Finally, it is a demonstration that the proposals to require telecommunications providers and device manufacturers to build law enforcement backdoors in their products is a terrible, terrible idea. As security experts have rightly insisted throughout, forcing companies to keep a key repository to unlock these backdoors makes the key repository itself a target of choice for the most sophisticated attackers as NSA and GCHQ. It would be both arrogant and reckless in the extreme to assume that only "good" attackers will be successful in these efforts

About the author :.

Julian Sanchez examines issues at the busy intersection of technology, privacy and civil liberties, with special emphasis on national security and intelligence monitoring. In addition to his work as a Senior Fellow at the Cato Institute, is the founding editor of the political blog Just security and contributing editor for Reason magazine. You can follow him on Twitter at @normative

Router VyprVPN secures all your home devices

10:17 PM Add Comment
Router VyprVPN secures all your home devices -

After a very successful public beta, the VyprVPN App Router is available now! encrypt quickly and easily all the devices on your home network by equipping your router with VyprVPN. Our App Router even lets you choose which devices use the VPN and those who do not.

Getting started is easy

  1. Follow these instructions step by step to equip your router with VyprVPN *
  2. Sign in with your username and password
  3. Golden Frog

* You must have a VyprVPN pay the account to use the Application Router

router_gf_blog
made protection! VPN for all your Devices

We are committed to provide VPN security on all your devices. Our VyprVPN App Router takes a big step towards this goal by expanding the VPN encryption to all your devices, regardless of platform, operating system or device type.

Watching Netflix via Apple TV or Google Chromecast? Keep your ISP to identify your streaming traffic and slow down.

Like to play video games? Connect your console to VyprVPN and DDOS defeat.

Having children browsing the Internet throughout the house? Protect with VyprVPN.

By protecting yourself from the source, your router, we have eliminated the need to set up VyprVPN on any device in your home. You can now also get the VPN devices that lack native support. Start and see what devices you can secure!

Share your comments with us

The VyprVPN App router is a new and exciting territory for us and we need your feedback. It is currently only compatible with routers on the framework Tomato MIPS / ARM and you must already have an active VyprVPN service to use.

Due to hardware limitations of consumer-class routers supported by the Tomato firmware, encryption speeds to be slower than when you use your unencrypted connection. If you are experiencing slow speeds, we recommend using the camera settings by limiting the number of devices using the encrypted connection.

Try today and let us know what you think! For more information on the VyprVPN router please visit our forum.

Do not have an account VyprVPN? Try VyprVPN with our free 3 day trial. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

Dashlane and partnership form Golden Frog to increase online security for customers

9:16 PM Add Comment
Dashlane and partnership form Golden Frog to increase online security for customers -

main password management and personal VPN companies create special offers for their respective services

NEW YORK - June 29, 2015 - Dashlane, leading password manager in the world and electronic purse, and Golden Frog, a company that fights for life private online, have teamed up to encourage people to take essential steps to better themselves and protect their data online.

Through this partnership, Dashlane offer all Golden Frog customers six months free access to its high-end password management service. In turn, Golden Frog will offer customers its Dashlane VyprVPN service with 1GB of free data and 500 MB recurring in subsequent months.

"Almost every newspaper article that lists tips for being more secure online recommends using passwords and a VPN service," said Sunday Yokubaitis, President of Golden Frog. "Through our partnership with Dashlane, we allow their clients to the private life of mind to try our VPN service so they can determine if it is the right tool for them to further protect against hackers and snoops from data. In addition, we are delighted to offer our customers access to the first password management service in the industry. "

Dashlane securely stores passwords and other common personal information such as email addresses and phone numbers, providing users a seamless browsing experience with fast connections and easy filling form . with Dashlane Premium, users can synchronize and back up data across an unlimited number of PCs to peripherals, Mac, iOS and Android, share passwords with trusted contacts and get support from VIP. Dashlane does not recognize the "master password" or hash / derivative thereof on its servers, so that data can only be decrypted by the client.

VyprVPN encrypts Internet connections of users and allows them to thwart data espionage and inspection of Internet traffic that is regularly practiced by governments and commercial Internet service providers. By encrypting the "last mile" (the connection between the camera / computer user and the Internet backbone), users can better ensure their privacy online and open an uncensored Internet and secure, no matter where they are in the world. Golden Frog owns the hardware to all their VPN server locations and manages its own network to provide fast and reliable VPN connections

"Dashlane Golden Frog and share a common mission :. To offer people a flexible way easy to protect themselves online, no matter what device they use, and no mattter where they are in the world, "said Dashlane CEO Emmanuel Schalit." customers who take advantage of this partnership to arm two the best services to the dangers of the online world "

customers who are interested in enjoying the partnership can register at:. http: / /bit.ly/dashlaneVPN

About Dashlane

Dashlane is the identity and single payments with its password manager and secure digital wallet application. Dashlane enables users to manage passwords, credit cards, IDs and other important information securely via advanced encryption and local storage. Dashlane has helped more than three million users to manage and secure their digital identity, and allowed more than $ 3.3 billion in e-commerce transactions. The application is available on PC, Mac, Android and iOS, and received rave reviews by leading publications including The Wall Street Journal The New York Times and USA Today . Dashlane is free to use on a device and costs Dashlane Premium $ 39.99 / year for synchronization between an unlimited number of devices. Dashlane was founded by Bernard Liautaud and co-founder Alexis Fogel, William Maron and Jean Guillou. The company has offices in New York and Paris, and received $ 30 million in funding from Rho Ventures, FirstMark Capital and Bessemer Venture Partners. Learn more about Dashlane.com.

About Golden Frog

Golden Frog is a global services provider engaged in developing applications and services that preserve an open Internet and secure, a mission that continues to grow in importance as users worldwide threats to privacy of the face. With users in over 195 countries, Golden Frog owns and operates server clusters in North America, Europe, South America, Asia and Oceania. Golden Frog owns and operates 100% of its own servers, hardware and global network to ensure the highest levels of security, privacy, and service delivery. Golden Frog offers a comprehensive reseller program that provides the best VPN service and trafficking for resellers and their clients. The company also offers VyprVPN for companies to protect corporate communications, identity and data, and Internet connections secure employees in the office or on the road.

More about Golden Frog's vision for a free and open Internet by reading our "peace, prosperity and the case for the Open Internet" guidance document located www.goldenfrog.com / vision

Twitter blocked in Turkey Today :. Maintain access to VyprVPN

8:15 PM Add Comment
Twitter blocked in Turkey Today :. Maintain access to VyprVPN -

Twitter Blocked Turkey Access with VPN

News broke this morning that Twitter is blocked in Turkey today

block was adopted in response to a terrorist attack that took place on Monday, as the government hopes to prevent users from Twitter to rally support for protests following the event.

This is not the first time that social media was blocked in the country. It was blocked for a crisis of hostages earlier in 2015, and when a band suggesting the corruption of government officials was leaked

Here at Golden Frog we believe in a free and open Internet for everyone -. Without restriction or censorship. Our VPN product, VyprVPN, allows users to keep this experience by connecting to one of our more than 50 server locations worldwide

Continue to use Twitter from Turkey today - Try VyprVPN now ..

We must stop CISA

7:14 PM Add Comment
We must stop CISA -

Stop CISA

Image Credit: Electronic Frontier Foundation

update: September 2015

Several amendments were submitted to CISA since we reported on the bill. As described FEP, most of these amendments do not address the fundamental issues and do not create enough link between the "cyber" as claimed by the government and monitoring. Although some of the amendments are positive, many of them are not favorable and it is imperative that we continue to push against CISA. You can view the proposed amendments to the CISA here and continue fighting

Original Post :. We must stop CISA

CISA, the Act respecting the sharing of information on cyber security, will be voted on soon by the US Senate. While the bill is expected on the platform of cybersecurity, it is actually a draft monitoring law. If passed, it would greatly expand the power of governments and companies to spy on people by accessing their user data and communications.

The CISA bill would give companies the right to monitor data of their users, including emails, passwords and IP addresses. In addition, the bill encourages companies to share "indicators of cyber threats" with the government - and to do so generously. - In return for certain protections laws surveillance

CISA give companies like Facebook and Google almost unlimited access to personal data, and encourage them to share more with the government. What's worse, all this would happen without the knowledge of the user, which has virtually no control over the place where their data can be found.

Golden Frog is categorically opposed to this bill. neither the companies nor the government should have this scan, unprecedented access to user data. this is a flagrant violation of the right to privacy, and a dangerous direction for the industry of information technology as a whole.

We are not the only ones who feel this way. The battle for the future organization created the #FaxBigBrother campaign, using the hashtag to send millions of faxes to US senators to protest against the bill. Other organizations also spoke strongly against the bill and work to combat it, including the Electronic Frontier Foundation, the ACLU, and the Sunlight Foundation.

It is important that we unite to end the Cyber ​​surveillance and arrest CISA.

This is what you can do to help:

  • Send a fax to protest against the bill
  • Email your representatives EFF Action page
  • Use #StopCISA hashtag on social media

Golden Frog and partnership form Personal.com to offer users greater security when online communication

6:13 PM Add Comment
Golden Frog and partnership form Personal.com to offer users greater security when online communication -

The partnership includes special offers for Golden Frog and Personal. com customer

MEGGEN, SWITZERLAND - August 18, 2015 - Personal.com, a cloud service that allows users to organize and collaborate on data and of privately and safely information and Golden Frog, a company that fights for privacy and online safety, have teamed up to provide users with secure tools to protect their online communications.

Throughout the partnership, Golden Frog will feature in their privacy Personal.com market and Personal.com will feature Golden Frog in their storefront application. As part of this agreement Personal.com users can get 1 GB free data usage for VyprVPN product of Golden Frog. Golden Frog users can sign up to receive one of 10,000 free subscriptions to Personal.com.

"This year, Golden Frog has focused on identifying the services and organizations that support online privacy, security and freedom," said Liz Kintzele, VP Sales Golden Frog. "We are excited to add to our privacy Personal.com market and provide our customers with a tool that helps them take control of their privacy and their data."

"Personal. com and Golden Frog provide two essential parts of a new infrastructure for a private secure digital life at home, at work and everywhere in between, "Personal.com CEO said Shane green.

Personal. com provides security Personal Cloud & data Vault that allows users to organize their data and the most important information and keep it in tune with those who also need access, such as assistants , work colleagues and family. It replaces spreadsheets, email and non-secure means to store and share sensitive information such as passwords, Wi-Fi, credit cards, and critical files such as passports, end of life documents and more.

VyprVPN encrypts Internet connections of users and allows them to thwart spying data and Internet traffic monitoring that is regularly practiced by governments and commercial Internet service providers. By encrypting the "last mile" (the connection between the camera / computer user and the Internet backbone), users can better ensure their privacy online and open an uncensored Internet and secure, no matter where they are in the world. Golden Frog owns the hardware to all their VPN server locations and manages its own network to provide fast and reliable VPN connections

Golden Frog customers who are interested in enjoying the partnership can register at :. Https: / /www.personal.com/s/partners/vyprvpn-registration/

Personal.com customers can sign in to VyprVPN: http://bit.ly/1N5zAa5

about Personal.com

Personal.com is the biggest cloud service for individuals to organize safe and collaborate on their data at work, home and play . Available directly to consumers or through subscriptions sponsored by partners, the Personal Cloud offers a suite of tools for collaboration and productivity applications, including the Data Vault and Fill It. Built on a platform of privacy and security design which has been internationally recognized, the Personal Cloud helps individuals take control of and benefit from their data.

About Golden Frog

Golden Frog is a global services provider engaged in developing applications and services that preserve an open Internet and secure, mission continues to grow in importance as users worldwide threats to privacy of the face. With users in over 195 countries, Golden Frog owns and operates server clusters in North America, Europe, South America, Asia and Oceania. Golden Frog owns and operates 100% of its own servers, hardware and global network to ensure the highest levels of security, privacy, and service delivery. Golden Frog offers a comprehensive reseller program that provides the best VPN service and trafficking for resellers and their clients. The company also offers VyprVPN for companies to protect corporate communications, identity and data, and Internet connections secure employees in the office or on the road.

More about Golden Frog's vision for a free and open Internet by reading our "peace, prosperity and the case for the Open Internet" guidance document located www.goldenfrog.com / vision

Public Wi-Fi: Think Before connecting

5:12 PM Add Comment
Public Wi-Fi: Think Before connecting -

Public Wi-Fi Dangers

There has been much discussion about the dangers of public Wi-Fi recently. In a recent article Digital Trends describing these dangers, the report of the latest AT & T week using an airport hotspot to serve ads to the recent study of Skycure on unsecured connections to main tourist attractions worldwide, it's hard to ignore the issue.

And it's not just buzz - the dangers are real. Public Wi-Fi networks are often "open" or unsecured, which means that your communications are not encrypted. These hot spots are an easy target for hackers trying to steal your passwords, login, credit card information or other personal information.

What is even more disturbing is the willingness of people to use these networks despite being aware of the risks . A recent McAfee survey found that a large percentage of people are opting still use Wi-Fi, "According to Intel, 38 percent of 2,000 people they asked were happy to use unsecured Wi-Fi" Combine this with. a convenience Statistics AARP Versus safety report that "a quarter of adults who use the Internet via Wi-Fi once a week or more," and you get an idea of ​​how common the use of non networks is secure.

A recent study by Skycure examined the safety of Wi-Fi hotspots at tourist sites around the world. They reveal the riskiest tourist attractions using your mobile device include first places like Times Square, Notre Dame, Disneyland Paris and the Golden Gate Park. Meaning of information for millions of people who connect daily through these networks may be at risk.

And there is not the pirates over insecure networks to worry. As shown in the example AT & T above, ISPs can also create vulnerabilities. By injecting ads on pages on the airport hotspot, AT & T not only affected the user experience and speed, but also introduces additional security threats

Public Wi-Fi can be practical, and sometimes necessary -. What can you do to reduce risk?

The first step is awareness. It is essential to realize that when you connect to a Wi-Fi network in a public place, especially one marked "free", you are at risk. It is also important to understand what you agree to. When you accept the terms and conditions of a Wi-Fi hotspot, it is likely that you authorize service to collect information about you or what you are watching.

The most important thing you can do is use a VPN every time you connect. A VPN encrypts your Internet connection, protection of your browsing activity, personal communications and data from hackers or third ferret -. You log

Learn VyprVPN encrypts your Internet connection and on any wireless public network, and try VyprVPN free.

See the complete list of the riskiest tourist attractions for using your mobile device.

Read convenience AARP Versus safety report.

Read more tips to protect yourself when using Wi-Fi.

Get an email account Encrypted Tutanota to protect your mailbox letters

4:11 PM Add Comment
Get an email account Encrypted Tutanota to protect your mailbox letters -

Golden Frog and Tutanota Partner

exclusive agreement to VyprVPN customer

Golden Frog is proud to announce that our partner Tutanota, offers its customers an exclusive special VyprVPN. Customers can upgrade to premium Tutanota VyprVPN for just 1 € per month. When you upgrade, Tutanota give you 5 GB of storage instead of the usual 1 GB! This special offer is valid until September 24th. Try Tutanota now and take your email privacy.

Tutanota is a free and open source e-mail service based in Germany, which encrypts all of your mailbox automatically. Tutanota lets you send from end to end encrypted emails to anyone with a tip of your finger.

With Tutanota you get

  • A mailbox automatically encrypted only you can decipher
  • 1 GB of free storage (no date expiration), 5 GB if you upgrade to premium now
  • End-to-end encrypted emails to anyone
  • normal emails protected with / PFS / DANE
  • IP TLS addresses stripped of all emails sent and received
  • Available webmail, Android and iOS Apps
  • code Tutanota is open source and available on GitHub

Take your email privacy. Try Tutanota now and get 5 GB of storage in our special offer.

Offer valid until September 24, 2015 24:00 CET / 7:00 EST.

Golden Frog Privacy market

Tutanota is a trusted service that fights for online privacy. Tutanota and all our partners can be found in the privacy of the market Golden Frog. Confidentiality market is our collection of recommended services and organizations that support online privacy, security and freedom, and is an excellent place to go when looking for additional tools to protect yourself online.

If you have a recommendation about a service or partner that you think Golden Frog should work in the future, let us know! Visit Ideas Golden Frog to submit your idea.

Program Overview Golden Frog brand advocates

3:09 PM Add Comment
Program Overview Golden Frog brand advocates -

Do you like Golden Frog? Did you share our content, we talked about or engaged with us online? If the answer is "yes", you might be interested in our new brand Advocates program!

What is a brand advocate?

Brand Advocates are people who love gold Frog brand, our products - and VyprVPN CYPHER - and all that we represent. Golden Frog trademark lawyers are our biggest fans.

What the brand advocates do?

Brand lawyers share our content, write or speak to us (both on and offline) and create a buzz about Golden Frog in general

Why should you join

trademark lawyers receive a variety of special benefits including:.?

  • VyprVPN Special offer code
  • Early access to beta Golden Frog program
  • The possibility of submitting guest blog posts
  • Swag
  • quarterly virtual meetings
  • A special forum to interact with the team Golden Frog and other brand advocates

the brand defenders program open to all current users VyprVPN.

It is awareness National Security Cyber ​​month!

2:08 PM Add Comment
It is awareness National Security Cyber ​​month! -

October is National Cyber ​​Security Awareness Month (NSCAM). This month was created by the US government to provide Americans with the information and resources they need to stay safe online.

A Golden Frog we are committed to privacy and online safety, and we wanted to participate in the effort by sharing some tips to stay safe and be aware online:

  • always use https when browsing online. Make sure to connect using https (as opposed to http ) to ensure your connection is secure. Learn more.
  • Beware of Wi-Fi. Often these connections are not secure, and connecting you leave you vulnerable to snoops. Learn more.
  • Using a VPN. A VPN encrypts your Internet connection to protect your privacy and security while browsing and communicating online. Learn more.
  • Use the trusted service providers. It is important to read the privacy policy and understand how your provider can access and use your information. Learn more.
  • encryption and support devices and services use which are encrypted. Encryption is one of the best ways to stay safe when online communication. Learn more.
  • Use two-factor authentication. Two-factor authentication requires you to enter two sets of credentials when connecting to an account, providing an additional level of security. Learn more.
  • Visit the National Cyber ​​Security Month official website for more info! Visit the site now

Participate in awareness of National Security Cyber ​​Month

#cyberaware Follow on Twitter to see other tips organizations share -. And join the conversation yourself!

Tell us how you stay cyber awareness in the comments below, or ask us any questions you have about privacy and online safety.

VyprVPN overview Android TV

1:07 PM Add Comment
VyprVPN overview Android TV -

We are delighted to announce that VyprVPN is now compatible with Android platforms TV!

Now you can use VyprVPN to encrypt your internet connection and improve your privacy and online security to your Android TV. VyprVPN for Android TV significantly improves your streaming experience by offering improved speed and safety while you stream content

The installation is easy -. Just download and install VyprVPN for Android from Google Play Store on your Android TV, connect your VyprVPN account and connect! Or you can download the APK file from the Golden Frog website and sideload the app on your Android TV.

VyprVPN is also available to other TV platforms chip, including OpenELEC / Kodi and Apple TV (via the App VyprVPN router). Visit our VyprVPN for TV page for details.

Did you know that we VyprVPN Apps for all your devices? Visit our VyprVPN Apps to see how you can protect the Internet connection on any device with VyprVPN.

Why is it not a VyprVPN App for Apple TV?

12:06 PM Add Comment
Why is it not a VyprVPN App for Apple TV? -

Apple has recently introduced its new Apple TV in October, and tvOS allows developers to create applications. Consequently, we had some questions about whether we intend to build a VyprVPN App for the new Apple TV.

Although tvOS allows developers to create applications, Apple controls VPN connections to their platforms and did not provide VPN functionality to Apple TV. Specifically, Apple locks networkextension API, and since we do not have the ability to change network settings, we unfortunately can not build a VyprVPN App for Apple TV. This problem is not unique to us -. Many other VPN providers have encountered the same problem

Using VyprVPN with Apple TV

The good news is you can still use VyprVPN with your Apple TV! There are 3 ways to do this:

1. The router VyprVPN App - also protects all devices connected to your home network

2. sharing your Mac to your Apple TV Connection Internet

3. Configuration manually in your VyprVPN DD-WRT or Tomato router

All About ECPA

11:05 AM Add Comment
All About ECPA -

ECPA, the Law on the Protection of Personal Information Email Communications, will be discussed at the US Congress on December 1, 2015. In anticipation of this, we wanted to give an overview of the ECPA - what it is and how we'd like to see reformed.

What is it?

ECPA defines the rules when the police and the government can read our e-mail, watch our photos and access other content that is stored in the cloud

ECPA is unchanged since its adoption in 1986 - .. despite the incredible technological advances of recent decades

Why does it need reform?

ECPA has remained unchanged since 1986, which left our communications open to unwarranted government intrusion.

As the law is currently written, the government and responsible for enforcement can access personal documents and communications in remote storage in the cloud with only a subpoena, which means no screening of a judge is required. This massive vulnerability in private life opens the door to espionage and government in defiance of our Fourth Amendment rights.

The last Congress, much progress has been made to update ECPA to the digital age, but the reform did not come to the function. Congress must act this year to adequately protect the privacy and property of Americans for our rights on the internet will finally be equivalent to the physical world.

We are not the only ones calling for reform of the ECPA. As reported in an article in the Washington Post, 77% of surveyed voters believe "a warrant should be required to access emails, photos and other private communications stored online." In addition, 86% of voters said they believed ECPA should be updated, and 53% expressed that they support a candidate to support "strengthening in online privacy." It is important noted the survey was conducted by a group advocating for the law to be amended, the law is up for debate on December 1. You can read the full article here Washington post, "the government does not often need a warrant to get your emails. But most think it should. "

Tell Congress to reform ECPA

10:04 PM Add Comment
Tell Congress to reform ECPA -

Last week, we wrote about the bipartisan support for encouraging the reform of the Law on the Protection of Electronic Communications (ECPA), and progress towards a vote on updating legislation.

ECPA defines the rules when the police and the government can read our e-mail, look at our photos and access other content that is stored in the cloud. The law has become obsolete because it was adopted in 1986 -. Despite the incredible technological advances of recent decades

  • ECPA needs to be updated in order to protect the rights of privacy online Americans
  • reform must include a requirement for government agencies to obtain a warrant to access all online communications -. regardless of age

However, it was reported Wednesday that the SEC, representing the interests of civil organizations who would lose access to your private messages if ECPA has been updated, are strongly opposed reforms and are diverting the Congress vote.

is Golden Frog we are strongly in favor of the ECPA reform and we want to send a message to Congress that the law should go ahead.

So what can you do?

To participate in this call to action by emailing or tweeting your representative to call on them to support reform of the ECPA now!

eMail IT

The following is a sample email you can copy and send. Consult the e-mail address of your representative by entering your zip code in open Congress https://www.opencongress.org/people/zipcodelookup

Subject line: If please support the urgent reforms to ECPA

body:

Dear Congressman / Congress

as your constituent I care my private life and I believe that the protection needs electronic communications Act (ECPA) urgent reform. This obsolete legislation has left our communications open to unwarranted government intrusion

I ask you to support reforms to ECPA to require a warrant to access all online communications -. Regardless of their date - passing S. 356 (ECPA amendments to the Act) and HR 699 (e Protection Act).

I wish you reach the vast majority of Americans who support this reform and will push for the adoption on this issue as soon as possible.

Accept

[ YOUR NAME ]

[ YOUR ADDRESS – This is important so that the representative recognizes you as a constituent ]

Tweet it

Tweet directly to your representative. Watch their Twitter handle in the list of members: https://twitter.com/gov/lists/us-house/members[1945002~~number=plural]

Then, copy and paste this tweet to send directly to them:

"It is time for the reform of the ECPA! I ask (INSERT REP TWITTER HANDLE) to support reform of #ECPA and protect my privacy!"

Thanks make your voice heard on this important issue. You can learn more about ECPA here: All About ECPA

ECPA by the numbers: a 4th Digital infographic

The Netherlands Officially Rejects Encryption Backdoors

9:03 PM Add Comment
The Netherlands Officially Rejects Encryption Backdoors -

This week, the Dutch government has publicly announced its support for encryption as an essential tool to protect online privacy. This announcement has reinforced the importance of encryption, encryption and rejected the "backdoors" that are being pushed in the US and other countries worldwide.

In a letter that was published Monday, the Dutch Ministry of Security and Justice, Ard van der Steur, said: "The government believes that it is not desirable at this time to take restrictive regulatory measures regarding the development, availability and use of encryption in the Netherlands. "

Van der Steur stressed the importance of people being able to communicate privately and confidentially, and said encryption is protected by the Dutch constitution. He also stressed the importance of encryption for government in securing their information and communications "The Minister has recognized the need for encryption in securing correspondence and government data, and the how the lack of such protection could make the country vulnerable to criminals and terrorists online. "

This statement is particularly impactful because many countries (including the US) defender encryption backdoors as a tool to fight against crime and terrorism . recognizing that these backdoors are a threat themselves, the Minister of Security and Justice is a very important point -. backdoors open a variety of vulnerabilities and risks to citizens and the government as well

This announcement does not include a caveat: "violation is allowed " given "a legitimate aim" but is still great news for defenders of privacy and a victory for encryption

We hope that this move by. the netherlands sets a precedent, and other countries around the world follow their example and recognize the importance of strong encryption practices

Sources :. Fortune and The Next Web

Some low use 1024 bit keys providers - why VyprVPN its strong Matter buttons

8:02 PM Add Comment
Some low use 1024 bit keys providers - why VyprVPN its strong Matter buttons -

Recently, in the news, Tech In Asia reported that the VPN provider ExpressVPN and Astrill were using the certification authority (CA) certificates generated from the 1024-bit keys. In 03, the keys of 1024 bits were shown to be crackable by 2010, and the current research estimates that the keys of 1024 bits can be brute-force today by the resources available to the State actors -nation. Since the service offering OpenVPN and IPsec VPN in 2010, Golden Frog has always used the 2048 bit keys for both CA certificates and keys used to encrypt the VyprVPN connections. Security researchers predict that 2048-bit keys will be sufficient until about 2030.

So, specifically, what is wrong with the key used by ExpressVPN 1024 bits and why should he worry about VPN clients? To encrypt the connection VPN ExpressVPN using 2048-bit keys, so that the data has been protected to a higher level. As with all things related to security, however, the answer comes down to trust.

In an OpenVPN connection, the certificate authority (CA) certificate allows the OpenVPN client that the VPN server is who he claims to be. The identity of the VPN server is signed by the CA key, and the CA certificate, the client can verify that a third party, trusted (certificate authority) has vouched for it. This confidence is based on the authority that the only access to the key CA. If someone unrelated authority also had access to the key, they could create and sign their own server certificates - and the servers would be just as reliable as the authority. No one could tell the difference, so that nobody could trust the server is really who he says he is.

Accordingly, the CA key is very important to the VPN server trust chain, and it is equally important for all those who want to pretend to be the VPN server. One way for someone else to get the key is to guess. If someone guesses all possible keys, one of them will be the right key. We call this a brute force attack, and large key sizes, brute force attacks are computationally huge. A 1024-bit key requires 2 1024 , or 1e + 308 (1 followed by 308 zeros), guess. Even for clusters faster computers we have today, it would take longer than the current age of the universe. algorithmic attacks can substantially reduce the number of necessary assumptions, however. Researchers now believe that for a few hundred million dollars, someone could set up a system powerful enough to break a specific 1024-bit key in a year or less computer. With the key guessed, that person or group can create their own VPN servers claiming to be the real VPN servers and decrypt all traffic. Since the same CA key is usually used for all VPN servers from a vendor they can effectively decipher all VPN traffic to all servers, without the user's knowledge. This is called a man-in-the-middle attack, and it is the most effective method for large scale monitoring encrypted data.

Thus, although your data is encrypted in transit, data can go to a malicious third party can decrypt the data upon arrival using attack man-in-the-middle. Data encryption is worthless if the CA key can be cracked. It is the equivalent of putting all your documents in a secure mailbox, then sending the lockbox to your enemy who stole the key.

keys to low AC are even worse than weak encryption keys, because they control the whole kingdom. Tech In Asia rightly questions whether VPN Chinese users of these providers should be worried, because China is easily capable of performing both calculations of gross and subsequent strength man-in -the-middle attacks needed to decrypt the VPN traffic. VyprVPN is immune from that at the moment, and we will continue to update our systems and configurations follow the current best practices to stay safe in the future.

More in this blog by former Google engineer Mark Brevard.

Update - February 16, 2016

ExpressVPN reported on their blog that they were rolling on new security settings for all of their applications to address the key issue CA.

Beta Introducing VyprVPN Server: Cloud VPN server You can trust

7:01 PM 4 Comments
Beta Introducing VyprVPN Server: Cloud VPN server You can trust -

since the beginning of VyprVPN, we have provided excellent customer VPN service to capture the privacy and security of our users everywhere - from your local coffee travel worldwide. We work hard to own and operate the fast, secure VPN servers that are used by our customers. However, it has always been our decision where we placed the servers and what we used networks, and what hardware they run. This all changes we are introducing enthusiastically beta version of our new product - VyprVPN server

We are entering a whole new world for you, our customers VyprVPN provide with the opportunity to use your own VyprVPN server and place it where you want. You can place it in the cloud. You can place it in a data center. You can place it at home. You can place it, literally, all over the Internet that you need and use our easy to use applications to connect to your server. We worked hard to fill a gap in the cloud VPN market, and build a cloud VPN server that is simple, flexible and secure. VyprVPN Server was built with you in mind, and is compatible with multiple platforms, including Digital Ocean, AWS and Virtual Box. additional platforms such as VMWare, are on our roadmap and will be soon.

Why we created VyprVPN Server?

It is simple, so the days of fighting with your VPN is over. We recognize that the VPN can often be messy, with a complicated configuration for IT professionals and end users. VyprVPN Server simplifies this process and allows quick and easy configuration so you can get up and running in minutes. The interface of modern server provides easy, friendly service, instead of the clumsy user experience you're used to. Even better -. This device works on the mobile

It is flexible, so you do not have to invest in expensive hardware. Many other VPNs lock you into proprietary hardware systems, forcing you to use their system and associated programs they have selected. VyprVPN server with no material investment, and you are not locked. This means you can configure and customize your server but you want. Just turn up VyrpVPN Server in the cloud, just like your other applications, it integrates into your existing workflow seamlessly.

Surely, so you can be assured that your network and all the important connections to it are safe. Stop leaving SSH or other remote access opening where the public can analyze your servers! VyprVPN Server reduces the exposed entry point into your network, protecting you from many dangers. Server offers the OpenVPN protocol of confidence, but also includes our exclusive Chameleon protocol so you can even take advantage of the global network of Golden Frog (owned and operated by Golden Frog), which includes over 700 servers worldwide.

How to use VyprVPN server

We wanted VyprVPN Server to meet a variety of needs. Here are some of the ways you can use:

  • Corporate Server: VyprVPN Server is an ideal solution for companies looking to lock their environment, while offering access for employees on the road
  • Personal VPN server :. Configure your own personal VPN server and monitor forestry policies or IP location. Running your own VyprVPN server in a public cloud like Digital Ocean is a great way to test this with server locations in many countries
  • In the cloud :. Since VyprVPN is built for the cloud, you can secure your cloud deployments so that your servers are not exposed to the public Internet. This allows you to feel confident your cloud environment is protected

Specs VyprVPN server

  • Applications :. Windows, Mac, Android, iOS
  • number of servers: business customers - unlimited number of servers. Pro clients / First - a server
  • Hardware Server Minimum : 1 GB
  • Protocols: OpenVPN, Chameleon, IPSec

involved

We are still developing VyprVPN Beta, and would like your input along the way! Here's how to participate:

  • Get exclusive access to VyprVPN Beta server now
  • Join the conversation in the VyprVPN Server forum - share your ideas and tell us what offer you! want to see in VyprVPN server
  • product development of the track in the roadmap of the VyprVPN server

Please note VyprVPN server is available to Beta VyprVPN Pro and Premier customers at that time.

We at Mobile World Congress 2016

6:00 PM Add Comment
We at Mobile World Congress 2016 -

We at Mobile World Congress (MWC) in Barcelona this week, talk privacy, security and mobile.

As a company that promotes privacy and Internet freedom for everyone, everywhere, we are excited to offer our staff VPN product, VyprVPN, across platforms and devices. We worked hard to create an ecosystem of applications and services to private life, and make VyprVPN apps available on all devices. With everything going mobile, it is more important than ever to protect your Internet connection any time -. Both at home and on the road

MWC's theme this year is "mobile is everything." Some of the best trends expected to be presented at the event

  • Smartphones. - new models, pricing and battery life, the camera innovation
  • Tablets
  • media and entertainment
  • the augmented reality
  • virtual reality
  • ideas about connecting to the future

Be sure to follow our social channels for live updates during the event!

Golden Frog, industry partners File Amicus Brief in Support of Apple

4:59 PM Add Comment
Golden Frog, industry partners File Amicus Brief in Support of Apple -

Internet privacy company supports Apple in their struggle against the FBI, joins to other file an amicus brief to stand up for strong encryption

MEGGEN, SWITZERLAND - March 3, 2016 - Golden Frog and company data Foundry sister and several other organizations, today announced that they have filed an amicus curiae brief in the case of Apple against FBI. The brief was submitted to a California court in support of Apple, and demonstrates the commitment to privacy and online safety, and the belief that everyone has the right to protect themselves with strong encryption companies.

"This has the potential to be a historic event, which could set a precedent for the rights of privacy in the future," said Sunday Yokubaitis, President of Golden Frog. "Encryption is the second amendment to the internet, and we strongly support Apple and their efforts to fight against the request of the FBI encryption backdoor. We put this amicus curiae to show our support, and fight for encryption fort which is so essential for Internet users across the country. "

This filing comes in response to the widely publicized decision in which the US government demanded that Apple make it possible to access to an iPhone encrypted with their efforts in the case of terrorism San Bernardino.

Golden Frog says three main points in their filing. First, the use of the Act All Writs is too broad, and contradicts the limits Congress previously established to govern how the application of the law can force companies to help in their investigations. Second, the law All Writs can not create a new authority in contradiction with existing communications for law law enforcement (CALEA), it can not make an exception to CALEA and require companies to break encryption. Third, the way the case was conducted, and the urgency with which it was conducted, irrespective of due process. In addition, Golden Frog supports the decision would have enormous and devastating impact on small businesses across the country that could not afford the additional costs to build new technologies at the request of the government.

Golden Frog and Data Foundry joined with several other organizations to submit the filing. These companies include: AVG Technologies, Computer and Communications Industry Association (CCIA), the Internet Association, the Coalition of the Internet infrastructure ( "i2Coalition") and TechNet. Many other companies and rights groups around the country have filed separate briefs in support of Apple

You can access the full text of deposit here :. Https://www.goldenfrog.com/blog/wp-content/ uploads / 2016/03 / Amicus-Brief_Golden-Frog.pdf

You can read the position of Golden Frog at the Apple v issue FBI here .: https://www.goldenfrog.com/blog/we-agree-with-apple-we-cant-set-the-precedent-of-an-iphone-backdoor

About Golden Frog

Golden Frog is a global services provider engaged in developing applications and services that preserve an open Internet and secure, a mission that continues to grow importance as users around the world face threats to privacy. With users in over 195 countries, Golden Frog owns and operates server clusters in North America, Europe, South America, Asia and Oceania. Golden Frog owns and operates 100% of its own servers, hardware and global network to ensure the highest levels of security, privacy, and service delivery. Golden Frog offers a comprehensive reseller program that provides the best VPN service and trafficking for resellers and their clients. The company also offers VyprVPN for companies to protect corporate communications, identity and data, and Internet connections secure employees in the office or on the road.

More about Golden Frog's vision for a free and open Internet by reading our "peace, prosperity and the case for the Open Internet" guidance document located www.goldenfrog.com / vision

Show your support Encryption - Sign the petition Save Security Now

3:58 PM Add Comment
Show your support Encryption - Sign the petition Save Security Now -

Do you care about the Apple v battle FBI.? you support strong encryption without backdoors? Do you care about your privacy? If the answer to any of these questions is "yes", it is time to take action. Fight for the Future launched Save security campaign, which allows you to add your voice to the discussion of Apple FBI and up for strong safety. You can sign their petition here: https://savesecurity.org/

Background

There are about a month, the US government ruled that Apple should provide access to encrypted iPhone as part of a terrorist investigation. Apple responded with a strong letter opposing the order, and in the days since, the battle between the government and Apple (and all high-tech companies and citizens that support them) has become increasingly warm.

Apple will go to court on March 22. Show your strong security support by adding your voice to the debate and by signing the petition now.

What can you do?

  • Sign the Petition
  • Use photos Save security on your social networks and join the conversation with the hashtag #savesecurity
  • Read memory amicus curiae, we presented to support Apple
  • Learn about the ongoing battle between Apple and the FBI

Take control of your network with VyprVPN server

2:57 PM Add Comment
Take control of your network with VyprVPN server -

Last month, we introduced the beta version of our new product, VyprVPN Server. VyprVPN Server is a highly secure cloud server VPN that is easy to implement. As our continuous beta, we wanted to highlight some key features and uses for VyprVPN Server. If you are not yet a member of the beta do not worry - there is still time to register! Start now.

VyprVPN Server Features

VyprVPN Server was designed to eliminate the frustrations traditionally associated with VPNs. Our flexible, highly secure, easy to implement and includes the following features:

  • Your own dedicated server: VyprVPN Server is your own dedicated server. This means that you are in total control of the entire stack
  • Quick deployment and easy :. You can get up and in minutes. VyprVPN server even gives you feedback during deployment, so you can stay updated on what is happening throughout the deployment process
  • unparalleled security :. VyprVPN is highly secure, locking your cloud infrastructure to protect your connections at any time
  • seamless connection to existing applications: .. VyprVPN Server is flexible, so you can connect to your existing applications and programs (eg Salesforce, Confluence)

What can you use VyprVPN Server for?

  • security infrastructure
  • Access to resources
  • Test / QA
  • [1945008iPS] whitelisting?

Who should use VyprVPN server

VyprVPN Server is ideal for a variety of business uses, including:

  • access to network resources when trips
  • Securing point for all employees who work at home [access
  • independent and remote workers
  • developers, designers, creative agencies , makers website, e-commerce testers
  • Anyone looking to lock their
  • network infrastructure

learn more about VyprVPN server, and register for VyprVPN server beta now.

Feinstein / Burr Project Backdoor Encryption Bill Causes Concern

1:56 PM Add Comment
Feinstein / Burr Project Backdoor Encryption Bill Causes Concern -

Update - April 20, 2016: Four main coalitions of tech industry wrote an open letter to the US Congress yesterday on Burr-Feinstein bill. The letter expressed their strong opposition to the bill, citing the consequences of the proposed law for negative Affairs and Security in the US and abroad, and leave the technology industry in the US " a competitive disadvantage. " You can read more about the letter here, and see the full letter. The groups that signed the letter included the Coalition of the Internet infrastructure, which Golden Frog is a member. Silicon Vally also took a voice declared against the bill, saying it is

Original Post "impracticable" .: There have been many buzz recently about Feinstein / Burr bill circulated by two senators in the United States Wednesday.

This legislation, compliance with court orders Act, was introduced by Senators Richard Burr and Dianne Feinstein. He proposed that the high-tech companies create encryption "backdoor" mandatory within their technologies, so that law enforcement and other government agencies can access the user's data with a warrant or court order appropriate.

The next steps for the bill are that it goes to the Senate Intelligence Committee and could then move to the Senate floor if it passes a vote. It seems unlikely that it will, however, the White House said it would not support the bill "in its current form." The majority of the Congress does not seem to support the bill, and a source recently called "Clueless." Reaction against the bill began even before released when a leaked version last week.

This bill revisits the question of who has the right encryption, in a long-standing debate between government and business technology that was recently made very public in FBI v. Apple.

A Golden Frog, we are for security and are firmly opposed to an encryption backdoors of any kind. Two

take measures

Tell Congress to stop the Burr-Feinstein Backdoor proposal with this tool the EFF.

Sources: Fast Company and Re / code

5 reasons why a VPN is necessary while on vacation

12:55 PM Add Comment
5 reasons why a VPN is necessary while on vacation -

Travelling share some exciting this summer? The amazing part about travel in the 21st century is that we can stay connected to all that is happening at home, even though we are halfway across the world!

However, this luxury comes with apprehension. Whether wireless insecure connection, a prohibitive government policy that censor your access to, or other international restrictions, there are many reasons to use a VPN while traveling. We are here to break the top 5 reasons why you need a VPN when on holiday this summer.

1. Protect your privacy on Unsecure Wi-Fi

It is a known fact that hackers and snoops can infiltrate your connection while traveling, especially if you use a Wi-Fi hotspot. Whether you are in a café, airport or even your hotel, a VPN is required to encrypt your connection and avoid any type of fraud or espionage activity to occur. Think twice before doing business abroad, too, as unsecure Wi-Fi can compromise your email communications and other sensitive information.

2. Improve the speed

VyprVPN helps you bypass congested networks to your ISP and to reach speeds much faster while surfing sites such YouTube. This is very useful when traveling, especially if you're on a congested network with other travelers. With a VPN, you can enjoy your favorite show or movie from abroad without having to worry about lag connection speeds.

3. Avoid censorship

If you are traveling in countries with censorship laws known, such as China or Egypt, you may be prohibited access to sites that are blocked by the government. Particularly in China, The Great Firewall blocks access to many popular sites such as Google and Facebook. With a VPN, you can bypass the restrictions and access to these sites and Internet completely unrestricted abroad.

4. Loss Data Retention

Many countries have data conservation laws in place, which means they store data or Internet information for a certain period of time telecommunications. For example, Australia currently maintains user information for 2 years. Avoid data retention with a VPN like VyprVPN. I do not know if the country you're traveling to store your data? We have compiled a list of conservation of information active and inactive data for popular countries.

5. Save money on flights and rental cars

Some companies use location data to determine how much to charge for flights, car rentals and more. With VyprVPN, you can choose from more than 50 server locations around the world on five continents.

Conclusion

A VPN will help relieve some of the stress associated with international travel, and keep your privacy protected at all times. VyprVPN is here to help! - Start today

FCC net neutrality rules upheld by the Federal Court of Appeal

10:53 PM Add Comment
FCC net neutrality rules upheld by the Federal Court of Appeal -

Earlier this week, the federal appeals court in Washington DC in the USA "confirmed the legal authority "behind the FCC open Internet Order, also referred to as net neutrality rules. This decision represents a "great victory" for those who advocate the Internet Open. Internet ruling forces service providers (ISPs) to treat all traffic web too, and prohibits broadband providers from "Internet blocking or traffic degrading." Means The decision that the high speed internet service can be "defined as a utility, "indicating how important broadband is in today's life, and it should be available to everyone in America.

This decision is a blow for large companies cable and telecommunications. Some carriers are not a fan of these rules, and aT & T have announced they will appeal the decision and expects the Supreme Court to rule. they have opposed similar efforts in the past.

Tom Wheeler, FCC Chairman and one behind the decision, described as "victory for consumers and innovators who deserve unlimited access to the entire web." Other industry groups were also happy. The CEO of CCIA Ed Black said the following on their website: "This is a huge historic victory for all Internet users This affirmation of the Open Internet Order FCC guarantees that. Internet remain an open platform that allows consumers supercharges competition and serves as a catalyst for economic growth ... "( read more).

A Golden Frog, we firmly believe in the Open Internet and believe the court ruled correctly. We are in support of this decision, and you can learn about our position on the open Internet in our Vision Paper

Resources :. The Verge, Politico, New York Times

QNAP Partners with VyprVPN

11:54 AM Add Comment
QNAP Partners with VyprVPN -

We are delighted to announce that we have expanded our range of applications and VyprVPN VyprVPN will soon be available on QNAP QTS 4.2.2 devices. QNAP is a quality network equipment supplier that provides advanced NAS solutions for business and home.

QNAP NAS is the first provider to offer VyprVPN, and this partnership further expands the ecosystem of Golden Frog applications and partners. We work hard to VyprVPN in a wide variety of devices and platforms, and we are delighted to offer QNAP QTS 4.2.2 users with an extra layer of privacy and security of their devices. VyprVPN will be available on later versions of QNAP QTS in the future . VyprVPN for QNAP was built on the SDK VyprVPN, which allows for the safety of the outstanding platform with easy integration.

About QNAP

QNAP Systems, Inc., its brand promise "Quality Network Appliance Provider," aims to offer global cutting deals (SIN) advanced network solutions featured with ease of use, robust operation, large storage capacity, and trustworthy reliability. QNAP integrates technologies and designs to produce quality products that effectively improve efficiency companies on file sharing, virtualization applications, storage management and surveillance in the business environments, as well as enrich entertainment life for home users with the offer of experience fun multimedia center. Headquartered in Taipei, QNAP offers its solutions in the global market with nonstop innovation and passion.

Get VyprVPN for QNAP