Dump Truck Update Allows file Shipments to Giganews users

1:32 PM Add Comment
Dump Truck Update Allows file Shipments to Giganews users -

Dump Truck Golden Frog developers are working on adding new features to Dump Truck Online Storage. The new Dump Truck most asked for the function of the Giganews members is the ability to download files while retaining the same subfolders and structure of the original file.

Today we are happy to announce that we implemented a new file uploader based on Java for Dump Truck Giganews to allow users to upload files ! The Web browser interface Dump Truck now has the functionality to download files while retaining the same subfolder structure and internal files. Giganews users can also drag and drop files directly from the desktop into the Dump Truck Web interface for easy download

Dump Truck web interface new features :.

Upload button supports folders and subfolders uploads

  • upload folders, including subfolders, in a single click! * required * Java
  • Available for all browsers and operating systems.

Drag and Drop files and subfolders uploads (Windows only) .

  • Download files, including subfolders by dragging the files from your computer to your browser. * Java required *

Improved Download File

  • New badge download notification in the menu bar.
  • easy access to the download queue by clicking the download button.

Dump Truck Online Storage is currently only available for Giganews members. To start using Dump Truck today, simply register with Giganews. The commercial version of Dump Truck for Golden Frog customers then will come soon so stay tuned!

Please subscribe to Golden Frog Golden Frog blog and follow on Facebook, Twitter or Google+ to stay updated on Dump Truck Online Storage.

VyprVPN Installation Instructions for Windows 8 using PPTP and L2TP / IPsec Now Available

12:31 PM Add Comment
VyprVPN Installation Instructions for Windows 8 using PPTP and L2TP / IPsec Now Available -

Windows 8 Logo We added Windows 8 manual configuration instructions for PPTP and L2TP / IPsec VyprVPN our support page. For users using the OpenVPN protocol on Windows 8, please download VyprVPN Desktop.

We also recently updated to include VyprVPN Windows 8 Support Office. We always recommend that users VyprVPN jump manual configuration and download free VyprVPN Desktop to switch between VyprVPN server locations and protocol in one click.

If you prefer manual configuration, please visit our support page to view Windows 8 manual configuration instructions.

Windows 8 PPTP manual configuration instructions

Windows 8 L2TP / IPsec manual configuration instructions

to stay updated with VyprVPN, subscribe to the Golden Frog blog and follow us on Facebook, Twitter and Google+.

Facebook Mobile Phone Makes Social Plus (and dangerous) than ever

10:29 PM Add Comment
Facebook Mobile Phone Makes Social Plus (and dangerous) than ever -

There's a lot of buzz surrounding the new HTC Facebook phone. The software is designed to be a simple Android application and a user interface that completely takes on the traditional Android user interface

The initiative of Facebook leads to an important point :. Ranging social on mobile devices is happening more often now than ever before. This should not be surprising given that more and more social media features are designed for mobile users and the real time interaction. While the Facebook phone will increase social easier, it does very little to address privacy and data security.

A More Social Mobile Phone Met risk sensitive personal data

Mobile phones often connect to the Internet via Wi-Fi hotspots. Unfortunately, most of these hot spots have little security or protection. It is trivial for a malicious hacker or data thief to steal personal information during its passage through the Wi-Fi hotspots. Even secure Wi-Fi hotspots are increasingly vulnerable.

To compound the problem, Facebook is known for not respecting user privacy and makes it difficult for users to understand and edit privacy settings. Over 13 million users have never changed the default privacy settings and 28 percent of all shares on their wall with the public. In 2012, more than 10 percent of households (7,000,000) using Facebook had compromised their personal information

The simplest solution :. Personal VPN

A VPN (Virtual Private Network) is a simple, but effective safety measure. The majority of information from mobile devices flights occurs when unsecured Wi-Fi networks use. To secure Internet communications, a VPN encrypts all data that passes from the mobile device to the VPN server . This adds a layer of security to mobile browsing, and prevents others from intercepting your data.

Golden Frog offers a "One Tap" VPN Solution

Manually configure a VPN connection takes time and discouraged many equipment users of mobile devices with VPN. To overcome this problem, Golden Frog has developed a simple VPN solution "faucet" VyprVPN for Android. After installing the application, users can activate VyprVPN with a "single tap" and access to servers in North America, Europe and Asia. To make it even easier, users can automatically select the location of the nearest server. This maximizes the speed of the Internet, provides Internet security and grant freedom online.

The New HTC Facebook Phone Makes VyprVPN more valuable than ever

The Facebook phone is designed to bring social media to the forefront of the experience of the mobile device. While he did interact with friends and family on Facebook easier, mobile data can be exposed to security threats. VyprVPN for Android is a solution that immediately makes the connection more secure social media sites by encrypting your connection and protect your sensitive personal information. Learn more about VyprVPN for Android

Welcome to Dump Truck: Part 3 - Dump Truck Secure Sharing

11:30 AM Add Comment
Welcome to Dump Truck: Part 3 - Dump Truck Secure Sharing -

Dump Truck We continue our "Welcome to Dump Truck" series to the Blog today part 3 - Dump Truck Secure Sharing. We'll show you how to use the Web application that your seat to share your files with friends and family. In case you missed them, check out Part 2 - Dump Truck Web App or Part 1 -. Dump Truck office

Dump Truck many powerful sharing tools which are accessible via the Dump Truck Web App. You can use the Web App to create a single link or multiple links to a file or folder and protect links using passwords and expiration dates.

How to share with Dump Truck

Link Security

public links

It is easy to link public with Dump Truck. Just click on the box next to the item you want to share and click the "Get Link" icon in the action bar. This will launch the public link window where you can see your new link. At this point, you can share links using any method you choose. We also integrated tools to post links to Twitter, Linkedin, Google+ and Facebook.

multiple supported links

Creating multiple links to the same file or folder is a unique feature of Dump truck. You can assign each link a unique name, track downloads per link, or protect links using passwords and expiration dates.

How to add security options to your links

Link Security Options

password protection

Use protection password for links to provide secure access to a file or a folder. When a public link is protected by a password, users must enter a password before accessing the file or folder.

Expiration Dates

dates

You can set the expiration of restricting access for a limited period of time. Set a shared file expire in a day or whatever time period you prefer.

See Analytics on your links

Public Links

Another unique feature of Dump Truck is the ability to view the number of downloads of a file or folder so that you can track usage. This is useful to see if a shared file has been downloaded or viewed.

We hope that Part 3 of the "Welcome to Dump Truck" series Blog helped you understand how to safely share files and folders using the Dump Truck Web App. We continue our "Welcome to Dump Truck" blog series, Part 4 - Dump Truck Mobile Apps. In Part 4, we'll cover the features of Dump Truck Mobile for iOS and Android.

If you do not already have an account Dump Truck, please register for a free 5GB account today.

to keep updated with Dump Truck, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

Synology NAS PPTP and OpenVPN Setup Instructions for VyprVPN

9:28 PM Add Comment
Synology NAS PPTP and OpenVPN Setup Instructions for VyprVPN -

VyprVPN for Synology In response to your comment about Golden Frog Ideas we added Synology NAS (Network Attached Storage) instructions Installation for VyprVPN! We are committed to providing an excellent user experience for all customers, on all devices, so please continue to share your comments and help VyprVPN even better.

If you already have a Synology NAS device you can connect to VyprVPN using PPTP and OpenVPN

  • PPTP Synology NAS Configuration Instructions for VyprVPN
  • OpenVPN NAS Synology Installation Instructions for VyprVPN

Connecting to VyprVPN allows you to benefit from the speed and security of a VPN using your Synology NAS device.

What Synology NAS?

Synology NAS is a storage device designed primarily for small businesses, but, users with large amounts of data to store to use as well. It is a popular solution because it offers elite performance and is easily expandable. Synology NAS primary function is to provide a centralized location for storing, sharing and backing up data on site that requires minimal ongoing maintenance. Synology NAS allows PC users to back up their device with Synology Data Replicator while Mac users can use Apple Time Machine native.

Why use VyprVPN with Synology NAS?

We want all our users to be able to leverage large storage solutions like Synology NAS without sacrificing security or privacy. When you enter sensitive information online, it is important to secure your connection. VyprVPN uses 256-bit encryption and secure servers to prevent malicious third parties to access your data and secure your end-end connection.

We will continue to provide installation instructions and 24x7x365 support to ensure your safety on all devices. Be sure to leave your comments and suggestions to Golden Frog ideas so we can help you use VyprVPN with your favorite device!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

Golden Frog now accepts PayPal

8:27 PM Add Comment
Golden Frog now accepts PayPal -

PayPal We listened to your comments Golden Frog ideas and we are delighted to offer PayPal as a new payment option for VyprVPN and dump Truck! A Golden Frog, we want to make it as easy as possible for you to use our services. Adding Paypal now offer our members more flexibility in payment

Golden Frog now accepts the following payment options:.!

  • PayPal New
  • Visa
  • American Express
  • MasterCard
  • Discover

This is a great time to refer friends to VyprVPN who prefer to use PayPal. For every friend you refer, you earn one free month! Please connect to the control panel to learn more about the program refer to a friend.

You can also refer friends to Dump Truck and earn up to 16 GB of storage in additional line. More

If you have suggestions for other payment options, please share your comments ideas Golden Frog. We welcome your comments and hope you enjoy the option of using PayPal.

To stay up to date with our services, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

New VPN Server Cluster in Poland!

7:26 PM Add Comment
New VPN Server Cluster in Poland! -

VyprVPN Poland We have added a new VyprVPN server cluster in Poland!

The new server cluster is available for all VyprVPN protocols, including PPTP, L2TP / IPSec and OpenVPN

How to access the Cluster Server Poland :.

  • VyprVPN office -. If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN - If you use mobile VyprVPN, simply log on application and log back in to enable Poland optional
  • manual configuration - If you manually adjust VyprVPN on your operating system, you can update your name 'VyprVPN host :. pl1.vpn.goldenfrog.com

Remember, you can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

You now have unlimited access to VPN following server locations:

  • Asia - Hong. Kong
  • Canada - Toronto
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki New
  • France - Paris
  • Germany - Frankfurt
  • Ireland - Dublin
  • Italy - Rome
  • Malaysia - Kuala Lumpur
  • Netherlands - Amsterdam
  • Norway - Oslo New
  • Poland - Warsaw New
  • Romania - Bucharest
  • Russia - Moscow
  • - Singapore
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Turkey - Istanbul New
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Miami
  • uS - Washington, DC

do not forget to visit our microsite ideas to let us know that the server location you want to side

If you want protection for your Internet connection while at home! or on the road, try it free for 7 days VyprVPN risk. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

New VPN Server Cluster in Indonesia!

6:25 PM Add Comment
New VPN Server Cluster in Indonesia! -

VyprVPN Indonesia We have added a new VyprVPN server cluster in Jakarta, Indonesia!

The new cluster server is available for all VyprVPN protocols, including PPTP, L2TP / IPSec and OpenVPN

How to access the server cluster Indonesia :.

  • VyprVPN office -. If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN - If you use mobile VyprVPN, simply log on application and reconnect to activate Indonesia as an option
  • manual configuration - If you manually adjust VyprVPN on your operating system, you can update your hostname VyprVPN to :. id1.vpn.goldenfrog.com

Remember, you can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available.

You now have unlimited access to the following VPN server locations :!

  • Asia - Hong Kong
  • Australia - Sydney New
  • Austria - Vienna New
  • Belgium - Brussels
  • Czech Republic - Prague
  • Canada - Toronto
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki
  • France - Paris
  • Germany - Frankfurt
  • Indonesia - Jakarta New!
  • Ireland - Dublin
  • Italy - Rome
  • Japan - Tokyo
  • Lithuania - Vilnius New
  • Malaysia - Kuala Lumpur
  • Netherlands - Amsterdam
  • Norway - Oslo
  • Poland - Warsaw
  • Portugal - Libson
  • Romania - Bucharest
  • Russia - Moscow
  • - Singapore
  • South Korea - Seoul
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Turkey - Istanbul
  • UK - London
  • US - Austin
  • uS - Los Angeles
  • uS - Miami
  • uS - Washington, DC

do not forget to visit our microsite Ideas us know what the server location you want to side

If you want protection for your Internet connection while at home! or on the road, try it free for 7 days VyprVPN risk. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

New VyprVPN Place in Perth, Australia Our third!

5:24 PM Add Comment
New VyprVPN Place in Perth, Australia Our third! -

VyprVPN Australia We continue to extend our VPN service in Aussieland! We are delighted to announce the launch of our new location VyprVPN in Perth, our third in Australia! Earlier this month, we launched VPN servers in Sydney and Melbourne.

The new VPN slot is available for all VyprVPN protocols, including PPTP, L2TP / IPsec, and OpenVPN. the VyprVPN users now have access to servers in 41+ locations across North America, Asia, Europe and Oceania

How to access the server cluster Perth :.

  • VyprVPN office -. If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN - If you use mobile VyprVPN, simply log out of application and reconnect to activate Perth optional
  • manual configuration -. If you manually adjust VyprVPN on your operating system, you can update your hostname to VyprVPN: au3.vpn.goldenfrog.com

Remember you can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

You now have unlimited access to the following VPN locations:

  • Asia - Hong Kong.
  • Australia - Melbourne New
  • Australia - Perth New
  • Australia - Sydney
  • Austria - Vienna
  • Belgium - Brussels
  • Canada - Toronto
  • Czech Republic - Prague
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki
  • France - Paris
  • Germany - Frankfurt
  • Iceland - Reykajvík New
  • Indonesia - Jakarta
  • Ireland - Dublin
  • Italy - Rome
  • Japan - Tokyo
  • Lithuania - Vilnius
  • Malaysia - Kuala Lumpur
  • Netherlands - Amsterdam
  • New Zealand - Auckland
  • Norway - Oslo
  • Philippines - Manila New
  • Poland - Warsaw
  • Portugal - Lisbon
  • Romania - Bucharest
  • Russia - Moscow
  • - Singapore
  • South Korea - Seoul
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Thailand - Bangkok
  • Turkey - Istanbul
  • Vietnam - Hanoi
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Miami
  • US - Washington

If you want protection for your Internet connection while at home or on the road, try for seven days without risk VyprVPN. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Do not forget to visit our microsite ideas to share your product ideas, feature requests and recommendations for the location of our next server!

Only 4 days Enter The Giveaway VyprVPN 2.0!

4:23 PM Add Comment
Only 4 days Enter The Giveaway VyprVPN 2.0! -

VyprVPN Giveaway Happy Holidays from Team Golden Frog! We just wanted to remind you that our 2.0 Launch Giveaway VyprVPN ends in four days. We have received thousands of entries and comments of users on our precious 2.0 applications for Windows, Mac, iOS and Android. This is your last chance to enter the gift to win an Xbox One, the Nexus 7 tablet, and free service VyprVPN Premier for a year!

VyprVPN Giveaway 4 Days Left

The Giveaway closes midnight CST on December 26 so make sure you enter today. Remember, if you have already entered, you can always earn more chances of winning by sharing the gift on Facebook, Twitter and Google+.

Thank you for your participation. The response was overwhelming and we look forward to announcing the winners on January 2, 2014.

Enter the VyprVPN 2.0 Giveaway "

Good luck and have a wonderful holiday season!

The team of Golden Frog

PS The free VyprVPN 2.0 Applications for Windows, Mac, iOS and Android is available for download.

New VyprVPN server location in Brazil, our first in South America!

2:21 PM Add Comment
New VyprVPN server location in Brazil, our first in South America! -

We added a new VyprVPN server location in Sao Paulo, Brazil, our first in South America! The 2014 World Cup in Brazil begins 12th June and many of you may be traveling to see the games. Now you can secure your connection on unknown WiFi hotspots, access to your favorite sites and keep fast Internet connections while connecting to our server location in Brazil. In the most recent Winter Olympics, many of our members went to Sochi, and were able to use VyprVPN to remain secure. Connect to our VPN server in Brazil this June and secure your Internet during the World Cup

How to access the location server from Brazil:

  • VyprVPN Desk - If you Desktop use VyprVPN, the location of the new server is automatically available when you choose the location of your server
  • Mobile VyprVPN - .. If you use mobile VyprVPN, simply log on the application and log to enable Brazil as an option
  • manual configuration - If you manually adjust VyprVPN on your operating system, you can update your hostname to VyprVPN: br1.vpn.goldenfrog. com

Remember, you can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

You now have unlimited access to VPN following server locations:

  • Asia - Hong. Kong
  • Australia - Melbourne New
  • Australia - Perth New
  • Australia - Sydney
  • Austria - Vienna
  • Brazil - São Paulo New
  • Belgium - Brussels
  • Canada - Toronto
  • Czech Republic - Prague
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki
  • France - Paris
  • Germany - Frankfurt
  • Iceland - Reykajvík
  • Indonesia - Jakarta
  • Ireland - Dublin
  • Italy - Rome
  • Japan - Tokyo
  • Lithuania - Vilnius
  • Malaysia - Kuala Lumpur
  • Netherlands - Amsterdam
  • New Zealand - Auckland
  • Norway - Oslo
  • Philippines - Manilla
  • Poland - Warsaw
  • Portugal - Lisbon
  • Romania - Bucharest
  • Russia - Moscow
  • Singapore - Singapore
  • South Korea - Seoul
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Thailand - Bangkok
  • Turkey - Istanbul
  • Vietnam - Hanoi
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Miami
  • US - Washington

We will continue to add other server locations throughout 2014, so stay tuned! If you want protection for your Internet connection while at home or on the road, you can try VyprVPN with our free 3 day trial. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Do not forget to visit Golden Frog ideas to share your product ideas, feature requests and recommendations for the location of our next server!

Get Your Own Private Key - If you

1:20 PM Add Comment
Get Your Own Private Key - If you -

Private Key

Last summer, the government demanded that lavabit an encrypted email provider, return the private decryption keys so that the government could carry out real-time email tracking a specific user lavabit. All parties concerned assume that the user in question was Edward Snowden. Instead of turning the key private SSL required by the government, owner lavabit Ladar Levison decided to close the business. He did it because the keys would have allowed the government to monitor all lavabit of users, not just Snowden. The District Court held Levison contempt of court for refusing to hand over the keys.

Last week, a federal appeals court upheld the contempt order. The appeal decision was based solely on procedural grounds: lavabit did not properly "protect" its challenge to the order during the proceedings of the district courts. Due to an error lavabit procedure, the court unfortunately did not reach the bottom of whether the federal government has gone too far its statutory authority when it required private keys for encrypted e-mail clients lavabit.

The substantive debate relates to whether the "technical assistance" required by the US "pen register" and "trap and trace" the law can be used to require a service provider to restore the encryption keys to the US authorities. the assistance and technical information required by law is to "install" the device, "quietly" and "without interference." We believe that nothing in the law says that provider may be required to run also on the private keys that will allow law enforcement to crack so it can effectively interpret information.

Both the "pen register" and "trap and trace of "laws were written to allow the government to obtain" metadata "for a single, identified user. For lavabit, however, exposed private communications key to its entire user base - not a single user. Moreover - even if the order in the case of lavabit and status both expressly limited the information that the government was authorized to capture only "non-content" "metadata" and only for Snowden - the government if lavabit was handed the keys in question is. had free access to all email content as well as user names, passwords and other sensitive information for each user lavabit

This is a theme increasingly recurring: the government claims it does not capture the content and requirements for metadata specific to discrete individuals, but when the truth comes out, it becomes clear that they get (or want to get) the actual contents of private communications sent to and from many innocent and law-abiding citizens who are not covered either in all that relates to national security. The government claims then they reject all information "unauthorized" they gather, but it is more likely that they actually "throw" by sending in their "trash" in Utah, where they conveniently forget to never "empty ".

This question will inevitably arise in the future, in a case where the background of the dispute is preserved. Meanwhile, we strongly suggest you whenever possible using a service provider that provides you your own unique private key personally found that the supplier does not maintain itself. In this way, the service provider can be compelled to secretly help the government unencrypt your personal and private information. If the government wants your property, they will come to you and you will be able to contest the claim.

Formerly called the draft law the Act FREEDOM USA

12:19 PM Add Comment
Formerly called the draft law the Act FREEDOM USA -

(Editor's Note: The following is a guest blog from Amie Stepanovich, the main board of policies Access)

Today, the House of representatives passed a watered-down version of the Act FREEDOM USA. How watered down? The revised bill won half of its co-sponsors.

The USA FREEDOM bill was introduced last year to reform the NSA's surveillance activities. Access approved the bill when it was introduced, but it has undergone significant changes in the last week and the current version of the bill is far from advancing meaningful protections for US and international users of 'Internet.

In today's floor debate, Representative Lofgren, one of the co-authors of the bill, dissented with the current text. Rep. Lofgren noted the bill may still allow the bulk collection in some cases, because of the ambiguity, and further argued that its transparency provisions have been significantly weakened. She explained that the two groups and digital rights of companies withdrew their support for the proposal gutted. Representative Sensenbrenner, sponsor of the bill, expressed disappointment in the measures taken to sweeten the bill, but said it would be a first step towards reform of the NSA.

House leaders and the Obama administration met earlier this week to further amend the bill, which was already weakened before passing on to the Judicial Chamber and committees intelligence ago two weeks. It is greatly disappointing to witness the parliamentary leaders succumb to the pressure applied by the Obama administration and others, turning their backs on the compromised US version FREEDOM that so initially supported

The last minute changes weaken the reform by NSA .:

  • Introducing the ambiguity in the definition of "terms of specific selection," which was the key to the proposal of the bill to end the collection bulk
  • Removing a provision prohibiting reverse targeting of communications US persons
  • Give the intelligence community control over internal review for declassification
  • Appearing to tolerate NSA practice to review the content of international communications on targeted individuals
  • permissions transparent reporting
  • water down to business and communications services

As the bill preparing to go to the Senate for further consideration, access will continue to fight for meaningful reform of the NSA practices that are not transparent, not accountable and not in line with the standards of rights man.

(Amie Stepanovich is Senior Advisor access policies. She is an expert on domestic surveillance, cyber security, and the right to privacy. In Access, Amie has projects on digital due process and responds to threats at the intersection of human rights and monitoring communications).

The Golden Frog Comments Filed with FCC

10:17 PM Add Comment
The Golden Frog Comments Filed with FCC -

GF Seal

last Friday, Golden Frog has filed comments with the US Federal Communications Commission in support of open Internet. We've included feedback from our own customers to show how the ISPs broadband are taking advantage of the current landscape of denying regular users of the open service, neutral and without interruption on which the Commission says they are entitled .

Friday, Colin Nederkoorn CEO Customer.io wrote a blog post and posted a YouTube video of a test he played on his supposed blazing fast 75 Mbps Verizon FiOS service. It was extremely slow when watching Netflix. But when Colin will connect to VyprVPN and watches Netflix speed increase ten times from a meager 375 Kbps to 3000 Kbps. The tenfold increase in speed resulting encrypt its traffic and using the network of Golden Frog instead of Verizon. This speed increase is consistent with other reports VyprVPN customers. We are competitive in the VPN industry we are constantly working to manage and optimize our network so that we can provide the fastest speeds VPN in the world. It seems that Verizon is deliberately ignore congested Internet backbone links to get Netflix to pay them. the ISPs are intentionally mismanage their networks to the detriment of their own users due to the lack of competition in the US ISP.

Colin's blog went viral on social media and created more awareness about the degradation of service resulting lack of competition. We are grateful to Colin to help expose and Verizon decided to include his example in our FCC filing. We urge the FCC to standup for consumers and to reclassify broadband transmission component as a telecommunications service Title II.

In our FCC filing, we also show that high-speed Internet provider Wireless interferes with the ability of its users to encrypt their SMTP mail traffic. The broadband provider is by overwriting the content of user communications and actively blocking the STARTTLS encryption. This is a man-in-the-middle attack that prevents customers from using the applications of their choice and prevents users from directly protect their privacy.

The Commission shall establish effective rules to prevent this type of behavior. Unless broadband service providers wireless and wireline receive a strong message that they can not block the accelerator and Internet traffic of their users, these actions will continue, develop and become the norm. Golden Frog Calls on the Commission to truly restore the open Internet, enhance competition, protect user choice, and ensure that users can keep the nosy ISPs to intercept their private information.

Summary of our submission to the FCC

Since there is no open Internet rules enforceable, the ISPs broad band are currently throttling and blocking of Internet users traffic. These comments are discussing two recent examples that show that users do not receive the service open, neutral and without interruption on which the Commission says they are entitled.

In the first case, a customer of Golden Frog VyprVPN encrypted VPN service has proven that its Netflix traffic is throttled on the Verizon FiOS services. Colin Nederkoorn recently posted a video on YouTube of a test he played on his serve 75 Mbps from Verizon showing its connection Netflix rose a meager 375 Kbps to 3000 Kbps when VyprVPN employed. This represents a tenfold increase that resulted from encrypting its traffic and using the VyprVPN routing. This type of speed increase is consistent with reports from other customers. the ISPs mismanage their networks to their own detriment users.

In the second case, Golden Frog shows that a high-speed wireless Internet service provider is interfering with its users to encrypt their traffic SMTP emails. The broadband provider is by overwriting the content of user communications and actively blocking the STARTTLS encryption. This is a man-in-middle attack that prevents customers from using the applications of their choice and prevents users from directly protect their privacy.

The Commission shall establish effective rules to prevent this type of behavior. Unless broadband service providers wireless and wireline receive a strong message that they can not block the accelerator and Internet traffic of their users, these actions will continue, develop and become the norm. Golden Frog Calls on the Commission to truly restore the open Internet, enhance competition, protect user choice, and ensure that users can keep the nosy ISPs to intercept their private information.

Read the full text of our deposit.

PCLOB new report on the NSA surveillance is a disappointment

11:18 AM Add Comment
PCLOB new report on the NSA surveillance is a disappointment -

(Editor's Note: The following is a guest blog Kevin Bankston, Policy Director Open Technology Institute at New America)

earlier this month, privacy and civil liberties oversight board (PCLOB) released its long awaited report on the monitoring of the national security Agency of the Internet and telephone communications under Article 702 of the FISA amendments to the Act 08.

This is the second report of the independent executive branch agency on monitoring the NSA, following a report in January by the Board recommending an end to bulk collection of NSA phone records under section 215 of the USA PATRIOT Act.

If the latest report of the Council on the bulk collection of phone records was a bomb, this one is a dud. The supervisory authority the Council examined in this report, article 702 of the 08 Act FISA amendments, is in many ways much more worrying that the bulk collection program. As explained by the Commission itself, this law has been used to authorize the tapping of the NSA of the entire Internet backbone, so the NSA can analyze our countless emails and other messages online for information on tens of thousands of targets that the NSA chooses without the approval of individual court. Yet the reforms of the Council now recommends about this awesome power monitoring are much lower than those in their last report, and essentially boil down to suggesting that the government should do more and better paper work and develop protocols stricter domestic as a check against abuse.

In the words of Chief Justice Roberts last week, "the founders did not fight a revolution to get right to the protocols of the government agency," they fought to require search warrants are based on probable cause and to identify precisely who or what can be searched. Yet, as we know from documents published earlier this week, government officials are looking through the data they have acquired in this surveillance authority, an authority that was sold to Congress as being for people outside the United States, tens of thousands of times a year without obtaining a warrant first.

that the Council approved this mandate rummaging through our communications, only weeks after the House of Representatives voted almost three to one to defund the searches of Americans "backdoor" NSA "data is a striking disappointment. The Council is supposed to be an independent watchdog which aggressively seeks to protect our privacy against government overreach, rather than undermine privacy by proposing reforms that are even lower than those of a large bipartisan majority the House has already approved.

We are grateful to the Council his latest report and are grateful to them now for the laying of the clearest and most comprehensive we've seen so far, exactly how the NSA uses its supervisory authority. But Congress should not wait for the NSA to take small set of recommendations of the Commission and get its own house in order. Congress should instead move forward with strong reforms that protect our privacy and that tell the NSA, as the Supreme Court told the government last week :. If you want our data you need to come back with a warrant

We are making progress with the VyprVPN - Fix iOS 8

8:15 PM Add Comment
We are making progress with the VyprVPN - Fix iOS 8 -

Update: A fix is ​​now available for VyprVPN for iOS 8. Please read our blog for instructions.

With the release of iOS 8 last week, the latest version of VyprVPN App for iOS does not function properly, causing your Internet connection being temporarily broken. We appreciate the patience of our users iOS and we are committed to fix the problem. We worked hard on a solution and we start testing at the end of this week. We hope to present our new construction with Apple soon be available in the App Store next week. Please note that manual set up to VyprVPN for iOS still does . If you are using iOS 8, please remove your profile and follow the VPN iOS manual setup instructions in our Support section

For more updates on matters iOS 8, please join the conversation in the VyprVPN -. iOS category gold Frog Forum recently launched. Joining the forum is easy, simply create an account using your email address or via Google, Facebook, Twitter, Yahoo or Github and start posting.

Yosemite (OS X) Update

In other Apple news, during the past month, we tested against several VyprVPN for Mac builds of OS X Yosemite Overview. Good news! VyprVPN works with OpenVPN protocols and Chameleon Yosemite. For people using the X Yosemite Beta Program Public OS, please connect using OpenVPN or Chameleon.

However PPTP and L2TP protocols are not currently working on Yosemite. We suspect Key issues, but we are actively working on the issue. We are confident that we can provide a working version of VyprVPN before the upcoming release of Yosemite. For the fastest updates on Yosemite questions, please join the conversation in the VyprVPN -. Mac category in the Golden Frog Forum

Golden Frog Ron Yokubaitis Co-CEO to speak at the Open Internet Press Conference Senator Ted Cruz

6:13 PM Add Comment
Golden Frog Ron Yokubaitis Co-CEO to speak at the Open Internet Press Conference Senator Ted Cruz -

Ron Yokubaitis, a pioneer champion of the Internet, the contractor and longtime online privacy has been invited to address the audience during the press conference of Senator Ted Cruz in Austin, Texas on Friday 14 November. During the event, Senator Cruz unveil its Internet program for the next legislative session.

Setting the scene for Senator Cruz, Yokubaitis explain how the government relies heavily on private third party service providers for individual customers data, transactional data and even content, rather than getting this information directly from the individual. He will argue that gathering that includes personal data of Americans must stop. Individually and collectively, these efforts give rise to privacy issues threaten liberty and individual property and violate the Constitution.

Yokubaitis also noted the Federal Communications Commission (FCC) must prevent Internet service providers (ISPs) to block encryption technologies. Neither current options FCC to regulate the Internet, or the current rules that are in place to protect the privacy of consumers and Internet service providers companies.

The event starts at 14:30 CT on November 14th in Austin, Texas.

We have people on the ground to take pictures and live updates from @Golden_Frog, or follow #takebackyourinternet

Information about server problems for VyprVPN customers in China

5:12 PM Add Comment
Information about server problems for VyprVPN customers in China -

We are aware of recent network problems affecting our VyprVPN customers in China. If you are in China and problems connecting to many different parts of the VPN server, including the US and Australia servers, please use the following locations

  • Netherlands
  • Hong Kong

connections in these places have been successful, but can not have a 100% success rate. In case one of these places fails, please try another.

Thank you for your patience in this matter. We study the issue and provide you an update once we have more information.

You are invited to our "Take Back Your Internet" Panel and the Party at SXSW 2015

4:10 PM Add Comment
You are invited to our "Take Back Your Internet" Panel and the Party at SXSW 2015 -

tbyi_gf_blog

There are a lot of things with the Internet these days: the commissioner of the FCC Tom Wheeler presented his plan, the FCC will vote next week, the major Internet service providers have promised to fight against the decision in court, and the Republicans are trying to get their act together to limit the power of the FCC

[

that's a lot to digest, and this is what we will discuss in the third year "Take Back Your Internet" Golden Frog panel discussion and networking party .. during SXSW Our panel will focus on all the issues, challenges and gaps regarding Net Neutrality and Open Internet We have assembled a fantastic group:

pANEL TOPIC: "Is Net Neutrality Really Open Internet?"

PANELIST:

  • Marvin Ammori, Ammori Group
  • Chip Pickering, CEO Comptel
  • Edward Henigin, CTO of data Foundry
  • Gigi Sohn, Special Council for external Affairs, FCC
  • James Waterworth, vice president of CCIA Europe

the panel will be followed by music and networking with your peers. We hope you can join us. RSVP for the event here: https://www.goldenfrog.com/sxsw2015

EVENT INFORMATION:

WHAT: Take back your Internet Party - 2015
WHEN: Monday, March 16 6:00 p.m. -12am
WHERE: The Palm door, Palm door on Sixth Street, 508 Old Pecan Street, Austin, TX

SCHEDULE:

6 - 19:00 open and networks
7 - 20h30 Group experts on the Open Internet
20h30-0 hours Music, Party, Networking

we hope you can join us. RSVP for the event here: http://www.goldenfrog.com/sxsw2015

COST: No cost to you - just RSVP for the event while the last tickets

(Note :. This is an unofficial SXSW event, and a badge is not required to attend)

If you are in town, the event is free and does not require a SXSW badge . Our space is limited, so please do not delay in RSVPing. We hope you will join us.

The Verge: Call to Arms "Edward Snowden issues for high-tech companies secretly meeting SXSW

3:09 PM Add Comment
The Verge: Call to Arms "Edward Snowden issues for high-tech companies secretly meeting SXSW -

Snowden held a continuous session of questions and answers with about two dozen people across the technology and the world of politics, that participant Sunday Yokubaitis, President of the online privacy company Golden Frog, described as a "call to arms" for high-tech companies to thwart espionage with better privacy tools.

Read the full article: Call to Arms "Edward Snowden issues for high-tech companies in the secret meeting SXSW

FCC Chairman Wheeler Texas Data Foundry Tours 1 to discuss the Open Internet

2:08 PM Add Comment
FCC Chairman Wheeler Texas Data Foundry Tours 1 to discuss the Open Internet -

TX1_Tour_Group

Golden Frog

Today, Golden Frog and data Foundry society sister had the privilege to host the FCC Chairman Tom Wheeler, Texas 1 data Foundry's data center in Austin, Texas. We looked forward to thank the President for his courageous work in defense of monopoly FSI and leading the FCC to adopt new rules of the Internet opened earlier this year. To our delight, the President led the meeting by thanking the two Golden Frog and Data Foundry for their support in the fight for an open Internet for many years.

During the meeting, we indicated that many Golden Frog customers use VyprVPN for better Netflix performance, and how it is proof that Internet service providers are the best, do not treat traffic congestion and, at worst, packet inspection and traffic throttling intensive bandwidth.

We discussed how the Great Firewall in China uses DPI to identify and inspect VPN traffic (but VyprVPN thwarts with its Chameleon Technology). We would be sorry to see Internet service providers in the country are beginning to act as the great firewall where they identify and attempt to restrict encryption technologies.

Sunday_with_Tom
Golden Frog Sunday Yokubaitis President and Chairman Wheeler encryption conversation.

We also talked about the role of the FCC in the fight for online privacy as they will in the near future the program "supercookies" Verizon evaluate. They will also hold a workshop to come on broadband consumer privacy. We are pleased to see the FCC will fight for consumer privacy online.

Finally, although the president has traveled many data centers, we joined in his tour of Texas 1 Data Foundry's data center that showcases the redundant power supply, the cooling and robust physical security of a facility state-of-the art. The President also visited the fiber room, where18 carriers fibers connect to Texas 1. This is where open Internet begins!

VPN study highlights the importance of a VPN Trustworthy

1:07 PM Add Comment
VPN study highlights the importance of a VPN Trustworthy -

vypr_no_3rd_parties_v4

By Philip Molter, Co-CTO Golden Frog, GmbH

VPN industry is abuzz with talk of a recent study, "a look through the Looking Glass VPN IPv6 and DNS Hijacking leaks in Business VPN clients. "Led by a group of Sapienza University researchers and Queen Mary University, this study explores shapely attack vectors against many of the most popular VPN providers, including Golden Frog VyprVPN.

although such a study may seem at first like a VPN using a deterrent, "perfect is the enemy of good." the use of a VPN is still safer than using nothing at all. in response to the study, here are 3 things Golden Frog wants you to know.

VyprDNS 1. Golden Frog offers strong protection of DNS hijacking.

A DNS administered by the VPN provider is really important. A DNS run internally on own provider network, as Golden Frog fact, is even better. VyprDNS is hosted and controlled by Golden Frog as part of our mission to reduce dependence on third parties such as DNS 3rd party services. VyprDNS ensures privacy and exceptional security for users and is included with every VyprVPN account. External networks more you remove the system, as the third party DNS, plus the attack vector becomes.

2. apps VyprVPN IPv6 protect against leaks.

vendors with self-developed applications can provide better control over security. Golden Frog applications take active efforts, if possible, to avoid leaks IPv6, which is difficult for vendors that only provide customers third party or simple configuration packages.

3. You are NOT anonymous when using a VPN.

Golden Frog was frustrated by the VPN companies that advertise an anonymous VPN service. That is why we published our "I'm Anonymous When I use a VPN - 7 debunked myths" article, and it's good to see researchers echo our concerns. Even when using a VPN, you need to trust your VPN provider with the data exposed by your use. Transparency creates trust. For over 6 years, we have been open and honest about the information we do and do not accrue to maintain a fast VPN, reliable and how we protect customer information.

Although the study reveals potential vulnerabilities in VyprVPN, it also notes that our attack profile is very small . We are currently studying the issues raised in the study, and we expect short-term solutions to be released as quickly as possible.

We argue with the researchers say digital is a better option than a VPN. Golden Frog's vision is to provide privacy and security for everyone, not just the technical elite. We focus on creating a modern easy to use service that anyone can use. Just sign in and sign. TOR is difficult to implement, has low speeds and does not make you anonymous. Even Tor admits he can not solve all anonymity problems. We do not want that Internet users sacrificing performance or ease of use to protect themselves on the Internet.

Watch the recording of our Google Hangout to discuss this topic!

European Commission sends VPN providers Survey asks about Indirectly Bypassing content Geo-restricted

12:06 PM Add Comment
European Commission sends VPN providers Survey asks about Indirectly Bypassing content Geo-restricted -

VPN Provider Survey from European Commission

There

a few days, a survey was sent to select VPN providers by the European Commission. The survey included questions about the services provided and the geographic locations served by each company. The survey also asked for information on user base in order to determine the number of users of EU Member States in relation to the outside of them. He concluded with questions relating to why customers use the service, how often, and the amount of media traffic (steaming video, audio and audiovisual content).

"W e suspect that [survey] is bound to try to ban the geo-restricted content within and between EU countries," said Sunday Yokubaitis President of Golden Frog, "but we suspect content heavy opposition if we are right."

Matt Schruers CCIA also weighed on the question :. "I think Sunday's hypothesis is correct," he said

"under" digital Single Market initiative of the European Commission, European policymakers have criticized the content geo-blocking line as incompatible with the ideal of a "single market" unit for intra-European trade in the EU. geographic restrictions may also result in Europeans turning to piracy, because it is difficult to find legitimate services licensed in their jurisdiction. These problems may explain the basis of the questionnaire, "he said. "But if the policy will be implemented on the basis of the answers is a separate issue."

Starting today, Golden Frog not received the questionnaire of the European Commission. This is probably because we are incorporated in Switzerland, which is not part of the EU. We will certainly keep an eye on how the issue of geo-blocking plays.

AT & T, Shame on you to help the NSA spy on us

10:04 PM Add Comment
AT & T, Shame on you to help the NSA spy on us -

NSA AT&T Spying on User Data

The New York Times revealed some disturbing news this weekend - the aT & T telecommunications giant is a willing partner with the US National Security Agency (NSA), and helped the NSA spy on Internet traffic of a massive number of users aT & T

section details the particular relationship of the company with the NSA, that was. "cooperation" described as This partnership was heavily funded by the NSA during the last 10 years and, according to the article, aT & T provided the NSA with access to billions of emails that were sent on their network in the United States:

" aT & T gave the NSA access by several methods covered by different legal rules, billions of emails as they sank through its domestic network. It has provided technical assistance in the execution of a secret court order permitting the interception of all Internet communications at United Nations headquarters, a customer of aT & T "

the partnership includes several classified operations, surveillance equipment installations at many US aT & T and hubs testing of new surveillance technologies. To make matters worse, the NSA has tried to keep the identity of their partner AT & T (and other partners in the telecom space) a secret. There was much opposition to these spy techniques among technology companies, with many turning to encryption as a solution. But telecommunications providers have been more reluctant to speak.

Shame on you, AT & T. But what is really new. We know AT & T was voluntarily cooperated with the NSA since 07, when AT & T has diverted the customer Internet traffic infamous 641a chamber NSA in San Francisco. Room 641a is one of the reasons Golden Frog was founded. When we saw the news on 641a House have filed papers with the FCC to bring this alarming activity to their attention. The FCC has ignored us, then Golden Frog was founded to build privacy and security of online tools to protect against this very type of behavior.

continued abuse of AT & T's right to its customers privacy only underlines the need for the FCC Open Internet Order to consider privacy and the prevention of "expressways. " Open Internet Order will allow consumers to "go where they want, when they want," but what is the point if they are spied on by their ISP at multiple points in their internet connection in cooperation with the government?

AT & T violated the right of clients to privacy in a big way, and this news underscores more than ever the need to provide people with the tools to protect themselves online. People have the right to communicate on the Internet - without fear of NSA looking over their shoulders. We need more than encryption and we must fight against the encryption backdoors so that service providers such as AT & T can not abuse our privacy without our knowledge

We will look at this evolution close and we're curious to see how AT & T -. And customers - will respond.

For more details on the partnership with the NSA AT & T, read the NYT article.

Full Document describing the Partnership is also available.

Learn how to protect your online communications using encryption and VPN on our Why use a VPN page.

Tor: You're not as anonymous as you think

11:05 AM Add Comment
Tor: You're not as anonymous as you think -

There is some talk of this week Tor

Yesterday, an article was published with the alarming ,. yet surprisingly, the title :. MIT researchers understand how to break the anonymity of Tor without cracking the encryption

MIT researchers used a form of traffic footprints to determine the identity of the user, all without breaking the encryption . They set up a computer connected to the Tor network as an input node, and once the requests were sent through it and connected via Tor they used "machine learning algorithms to monitor the data and count packages. " The researchers were then able to determine the type of users had access resources. They then used the fingerprints of traffic to determine further that the hidden service users had access. All without break the encryption

An article Ars Technica has also made another discovery related Tor this week, revealing: How the way you type can break the anonymity - even on Tor

in this case, security researchers used a profiling technique that collects keystrokes that users enter data into websites. With this profiling up after a short period of time, it is possible to determine "when the same individual leads of the following line sessions." By measuring the tiny differences in the ways people type and the unique way they press the keys, monitoring program each user's fingerprint. Meaning - even if your IP is protected - you are not anonymous. Sites could use this technology to identify users - even if they do not have access to their IP addresses. This research was conducted through a Tor browser, which means that all the "Tor-anonymous websites - - either because their operators are malicious or cooperate with the law enforcement agencies can use scripts Similar profiling that follow people through both public and darkweb destinations. " article points out that some banks are already using this technology to provide an additional layer of authentication for users. But it is a threat to online privacy, nonetheless.

None of this is good news for Tor, but it does not come as a surprise. We have already noted that Tor does not make you anonymous, and we reinforced this point in our newly updated I Am Anonymous When I use a VPN - 10 Myths Debunked item that we published in the section Take Back Your Internet our website this week.

Learn more about Tor and other threats to online anonymity. Read I Am Anonymouse When I use a VPN -. 10 myths debunked now

Encryption Principles: What everyone should know

9:03 PM Add Comment
Encryption Principles: What everyone should know -

Encryption Fundamentals

Encryption is an essential tool and a fundamental right. It should be easy to use and available to the entire population, and should not contain backdoors. Golden Frog strongly advocates for encryption, and we have defined four key principles of encryption below.

1. Privacy is a right and encryption is the right to defend yourself

Tim Cook said Apple's famous "Privacy is a right" and we agree. Everyone has the right to privacy - both on and offline. Taking this concept further, we believe that if privacy is a right then Encryption is the second amendment to the Internet. Encryption is your ability to protect and defend you online. Golden Frog offers tools to ensure such protection, and we are incorporated in Switzerland, where privacy is a fundamental constitutional right.

2. Encryption must be easy to use

Encryption should be easy to use and accessible to everyone - not just the technical elite. It should be enabled by default rather than a particular feature, and should be activated on a user device. Think the days of dial-up, when users had to complete several manual steps to connect to the Internet. Technology has advanced far to make the Internet more accessible for everyone, and this should also be the case for encryption. The technology certainly exists, and we have built in VyprVPN. Our users simply connect and press the connect button - it's easy

3. Encryption must be omnipresent and undetectable

Encryption should function as a utility, such as water or electricity pipe. Ubiquity can be obtained by encryption available to everyone as part of a standard service, as opposed to an additional "add on". If availability is widespread, there will be mass adoption of encryption. When we move towards mass adoption, it will be more difficult for governments to detect or identify that uses encryption.

But the widespread adoption of encryption is not enough. Encryption should be undetectable, and we need the technology community to work in this direction. As Edward Snowden explained at SXSW 2015 VPN providers must develop new technologies to hide their services to VPN traffic can not be identified as being encrypted. He also affirmed the need for greater efforts to randomization to the other services that we, as a community of technology can overcome monitoring at the network level. These suggestions were encouraging as Golden Frog has already built our own VPN technology called Chameleon that blurs OpenVPN packet metadata to ensure it is not recognized as a VPN connection. Chameleon allows people all over the world, especially China, to defeat the tactics of deep packet inspection and other network monitoring efforts.

4. No encryption backdoors

There is an ongoing debate in the US as the government and other officials to push backdoors in encrypted communications . This initiative is not only wrong, but also represents a serious threat to consumer privacy and corporate security and an obstacle to technological innovation. Fortunately, history is on our side. Backdoors were beaten during Crypto wars of the 190s, and this helped to create the modern Internet. Today, we all use encryption in our daily lives, often without knowing it. Encryption is used to facilitate transactions online retail, banking online, social media and other online communications. Companies rely on encryption to secure their communications and sensitive financial information, protect trade secrets and to provide reliable services to their clients. We are strongly opposed to encryption backdoor, and have outlined several arguments against-the backdoor encryption issue.

Mr. Robot TV Show Highlights Real Life about privacy

8:02 PM Add Comment
Mr. Robot TV Show Highlights Real Life about privacy -

Mr. Robot Highlights Privacy Concerns

A new show on the USA Network called Mr. Robot just wrapped its first season. The show is a cyber security expert (Elliot) who hacks and busts Aubad guys at as a hobby, and eventually recruited to join an underground hacker organization working to lower corporate America. Elliot then meets the anarchist Mr. Robot, and the show follows their efforts in the fight against piracy and the evils together. You can learn more here.

We believe it, AOS great there, AOS a show shed light on privacy issues on the Internet, and the buzz of social media, it received is also exciting. As the show illustrates, once you have someone, AOS personal information you tremendous leverage to manipulate. That we, as AOD people realize is that what is portrayed in the show is also something that is happening in real life . Our private information and the right to privacy is actively encroached by governments, criminals, corporations and other entities. So, the real world is more dangerous than what, AOS portrayed in this TV show.

We hope that the buzz created by the TV show will turn into a real interest and willingness of viewers to take action on these issues. Instead of joining forces in line with a fictional TV why not fight for your freedom and privacy in real life ? One way to stand and fight is with Golden Frog VyprVPN AOS. VyprVPN encrypts your Internet connection to protect your privacy and online business.

Try free VyprVPN and regain control of your data, privacy and freedom.

Learn how Golden Frog fights for online privacy and security.

India proposes a new law Encryption, then quickly retracts

7:01 PM Add Comment
India proposes a new law Encryption, then quickly retracts -

Last week, India has published a draft law surrounding encryption. As reported by the New York Times, the bill "would have required users of social media and messaging applications to register the versions in clear text their messages for 0 days so they can be shared with police. "

The law was removed after a few days, because of criticism and concerns about privacy. The Indian government was not in favor of either law, and has publicly stated the encryption law was simply a draft and did not express the views of the government. The law was proposed by the Department of Electronics and Information Technology. The timing of the situation was bad for the country, because it created embarrassment ahead of the visit of Indian Prime Minister to Silicon Valley.

This is yet another example of legislation on cyber security that threatens the privacy and encryption of law. We saw a similar bill by China and Russia recently, with both countries standing behind their proposals. We are happy that India has rapidly backtracked on their law, and that the public has expressed strong opposition this. It is essential that we continue the fight for online privacy and security for Internet users worldwide.

See the complete political and learn more about retention rules proposed data. Learn more about the importance of encryption

Update - June 2016 :. A dispute of public interest petition that seemed to achieve a ban on WhatsApp was rejected by the Supreme Court Court in India. The petition was put forward because of concerns about encryption on the platform, and it hinders the efforts of the police. This decision seems to echo the theme of India considering enacting restrictive laws, but choosing not to enact.

California Passes Landmark Digital Privacy Law

6:00 PM Add Comment
California Passes Landmark Digital Privacy Law -

The new global law protects digital privacy, including location data, content, e-mail, metadata and even search appliance. It requires a warrant to search for digital documents or other device data, and is described as a "landmark" bill in digital privacy.

Specifically, the Act on the protection of electrical communications California (CalECPA) "bars any state law enforcement agency or other entity investigative convincing business to run on the metadata or digital communications - including emails, texts, documents stored in the cloud - without a warrant it also requires a warrant to track the location of electronic devices such as mobile phones, or pick them " Source. :. Wired

The ACLU praised the law, and is touted by many as the best piece of legislation on the US privacy in existence. This bill represents a positive step in online privacy and sets a precedent for digital laws of privacy in the future. As stated in Wired by one of the senators who drafted the bill: "For too long, the laws on digital privacy California have been stuck in the age of darkness, leaving our personal emails, text messages, photos and smartphones increasingly vulnerable to warrantless searches, "said Senator Mark Leno in a statement." Those days are gone. "

We hope that this law will be a model for other states, and similar legislation in online privacy will follow. the California law is compatible with most of the issues that we strongly support and advocate for here Golden Frog, and we are very encouraged the passing of the law.

Learn more about the vision of Golden Frog for a free and open Internet.

more on power to pass legislation at the state level.

Per Connection App Now Available for VyprVPN for Mac

3:58 PM Add Comment
Per Connection App Now Available for VyprVPN for Mac -

Want your apps to connect to VyprVPN trigger whenever will you launch em? Now you can!

Per Connection App is now available for VyprVPN for Mac. Just like we VyprVPN for Android, Per Connection App lets you control your VPN connection behavior was per-app basis. Once you set up Connection Per App to your preference, this will make it easier for you to know That you will never be online without VPN protection.

For VyprVPN for Mac, Connection Per App offers 3 different settings:

  • Use VPN - all apps run through the VPN connection
  • Require VPN - if VyprVPN is not connected When you launch the app, it will not be ble to send unprotected traffic up to the VPN is connected
  • Bypass VPN - Even When VyprVPN is connected, thesis apps will not use the VPN connection

Separately VyprVPN set to automatically connect whenever will you open Any app so you do not-have to remember to manually connect Each time.

Per Connection App is a new feature in the latest 2.8 release of VyprVPN for Mac. We also included OpenVPN Advanced settings For Those That want extra control of the protocol settings. Read the full changelog here.

Bangladesh Government Bans Social Networking After Unrest

2:57 PM Add Comment
Bangladesh Government Bans Social Networking After Unrest -

The Bangladesh government has imposed bans on Facebook, WhatsApp and other social networks following protests that were triggered by the execution of two men accused of war crimes during the civil war of 1971 that led to Bangladesh's independence from Pakistan.

A Minister of Government Telecommunications said that the ban was put in place to protect the security. He said: "The government blocked Facebook and online messaging services WhatsApp and Viber indefinitely for security reasons,"

This is not the first time that the Government of Bangladesh has resorted to blocking social media sites .. in 2010 Facebook and YouTube were blocked after the controversial images were downloaded from these sites.

it is unclear at this time how long these bans will be in place Minister of Interior Asaduzzaman Khan Kamal said. "the prohibition of different social networking platforms is temporary." Goes to say: ". The suspension will be lifted once the tense situation changes underway"

Many people have turned to VPN technology to avoid censorship. VyprVPN allows you to access your favorite social media sites from all over the world - Try it free

Sources :. The information in this article is from the BBC News, The Daily Dot, The Dhaka Tribune and The Daily Mail.

China blocks completely Wikipedia ... Again

1:56 PM Add Comment
China blocks completely Wikipedia ... Again -

As reported by the International Business Times, China has blocked Wikipedia in "full" - and it is not the first time. Chinese version of the site has been blocked, but now all versions of Wikipedia are blocked in China.

China has made a practice of blocking the site and off over ten years, as part of its censorship of the Internet sweep called the Great Firewall. This most recent blockage may be the result of Wikipedia to change its "default HTTP protocol to HTTPS, which made it harder for great Chinese firewall to filter specific pages and information." As it is now more difficult to select specific pages to filter, blocking the site became "all or nothing". and the government has decided to block everything.

Wikipedia was blocked in China in 04. know more about the Great Wall of China.

Source: China's government has blocked Wikipedia in its entirety again

Microsoft reveals that it is Spying on Windows 10 Users

12:55 PM Add Comment
Microsoft reveals that it is Spying on Windows 10 Users -

Microsoft, in a blog post on Monday, shared some statistics on the popularity of its Windows platform 10. Besides showing the success of the platform, the post also pointed out some serious privacy issues associated with Windows 10 - concerns that have been previously reported in July. . In short, Microsoft collects vast amounts of data and spying on Windows 10 users

As BGR summarizes the blog included "milestones" following Microsoft

  • The people spent more than 11 billion hours of Windows 10 in December alone.
  • more than 44.5 billion minutes spent in Microsoft Windows 10 between edge devices in just the last month.
  • more than 2.5 billion questions to Cortana since its launch.
  • Approximately 30% of over Bing search queries by Windows 10 device against earlier versions of Windows.
  • over 82 billion photos viewed in Windows 10 camera app.
  • Gaming continues to grow on Windows 10 - in 2015, gamers have spent more than 4 billion hours playing PC games on Windows 10.
  • players have listened to more than 6, 6 million hours of Xbox one Windows 10 PC games

clearly Microsoft collects a large amount of information about its users and their behavior. As described by Forbes, "This is a crazy amount, but what's even crazier is the revelation that Microsoft is tracking exactly how long each user uses Windows 10."

Microsoft admit some of these practices openly in their privacy policies, but these data, they shared willfully is alarming nonetheless.

this again illustrates the large amount of user data businesses have access to, and the importance of reading and understanding the privacy policies and take measures to protect your privacy online.

VyprVPN encrypts your Internet connection to protect your privacy and data when browsing the Internet. With VyprVPN, nobody can see the content of your communications, the sites you visit, how long you visit or the files you download or open.

Warning VyprVPN Beta for Android users! We move to Google

11:54 AM Add Comment
Warning VyprVPN Beta for Android users! We move to Google - Community

Our product team is working hard to improve our products, particularly VyprVPN. This would not be possible without the help or feedback from our loyal users, including those using the beta version of the application to give us quick feedback.

We'll go to the version Android VyprVPN Beta in our new community page Google and removing therefore the Beta application for the Google Play Store on 02/08/2016.

Google Join our new Community page if you want to use the beta versions of VyprVPN for Android. VyprVPN is automatically updated whenever a beta version is available so you can test new features - no separate application installation required. Be part of the Community also gives you direct access to our product team and other users VyprVPN Beta, so check!

If you use VyprVPN for Mac or Windows, you can opt-in to the Beta releases of the Application Settings area.

China Legalize Finally, the Great Firewall?

10:53 PM Add Comment
China Legalize Finally, the Great Firewall? -

China seems to change his tune in how it recognizes the great firewall. In recent months, several events indicate that China moves to publicly legalized large firewall - both by their efforts to promote Internet sovereignty and attempts to stop the use of proxies

Internet sovereignty

As the New York Times described the Chinese government has worked hard to adopt a concept of "Internet sovereignty" they believe. they promoted this concept at a UN meeting in December, which was created 'to define the policies and frameworks of how the Internet is governed in the future. "At the meeting of China tried to influence and pushed hard for the word "multilateral" to be included in the frames (which means that each state or country, can make rules for Internet use):

"China has been very active in the negotiations to push for more state control over the way people get online and who has access to data" and "the inclusion of the word has largely been conducted China, which has worked to enshrine the state control over the Internet in the document ".

most other countries opposed to this terminology and it was left out of the final document, but China held its own global Internet conference shortly after the course which they promoted the concept to new Internet sovereignty.

circumvention tools

It was also recently reported that China is making efforts to block "circumvention tools" with "using cloud providers. " Chinese regulators require these intermediaries, including cloud storage providers to eliminate such circumvention tools (IE proxies, VPN) that are hosted on their servers. This effort includes an electronic message sent to Microsoft Azure users:

"In response to the recent pressure from the Chinese regulatory authorities, Microsoft Azure China, which provides cloud storage to carry CDNs, issued a letter to its customers recommending that they remove all circumvention services, proxy and VPN illegal hosted on their server. "

Azure is a target because many virtual private servers (wall escape proxies) are placed on Azure.

Why it is important

China seems to work for publicly justify the Great Firewall - this is a big deal. By pushing so hard for the sovereignty of the Internet, they are not only admitting the Great Firewall exists, but also moving towards legalization. E-mail to Microsoft Azure users further illustrated this, as the term "illegal on the wall" site was used. Employing this language and bringing these to light circumvention tools also shows that the Chinese government attempts to regulate and legalize great firewall.

This is a big change for China, which has even denied the existence of censorship and the great firewall. If China legalizes the great firewall, they legalize extreme Internet censorship, which is a threat to freedom of the Internet to users in the country. more about censorship in China here.

President of Golden Frog is hosting an AMA on reddit

9:52 PM Add Comment
President of Golden Frog is hosting an AMA on reddit -

Update 3 March 2016

Our AMA yesterday was a success! We received many great questions, on topics encryption, logging, how we got our start as a business. If you are not able to attend, you can read all the answers by looking at the entire AMA on reddit.

Original Post

Have a question for us? You are lucky! President of Golden Frog Sunday Yokubaitis will host an AMA (Ask Me Anything) on ​​reddit Wednesday, March 2 at 14 pm EST.

This is your chance to ask him all the questions you have about Golden Frog, our personal VPN VyprVPN product, or anything else you like!

We will post the link to the AMA on our social channels to 2nd, so be sure to check back then and join the conversation. In the meantime, visit our Vision and About Us pages to learn more about Golden Frog and mission for the privacy of the Internet, security and freedom. You can also follow us on Facebook and Twitter.

Golden Frog is a Gold Partner of reddit, and our VyprVPN for the business service is provided to all employees reddit. More

recent articles Sunday :.

  • You are the product: The Price of Free in the growing industry of privacy
  • If Netflix Cracks Down on proxies, access to content is not the only thing you will lose
  • your ISP slows your streaming. Using a VPN to stop

recent Golden Frog Updates :.

  • VyprVPN overview Android TV
  • VyprVPN Presentation Server Beta
  • Golden Frog in the Privacy Day 2016 data
  • Some suppliers use weak keys of 1024 bits - why VyprVPN its strong Matter buttons

Golden Frog Submits Amicus Brief in Support of Apple

8:51 PM Add Comment
Golden Frog Submits Amicus Brief in Support of Apple -

Golden Frog and our sister company Foundry Data is pleased to announce that we have introduced amicus brief to the court in the Apple case against the FBI. Our memory is in favor of Apple.

Why we presented the memory

We submitted the brief because we believe that everyone has the right to privacy and security and to contribute strong encryption for protection. A Golden Frog, we believe encryption is the second amendment to the internet and we fully support Apple's decision to fight against the request of the FBI to provide access to encrypted iPhone. This case is huge, and we want to be a part of it.

Highlights of our memory is included below, and you can access the full document here.

Introduction and Background

There is a clear and present danger posed by hackers and organizations financed by the state are trying to surveil citizens. As such, companies to build security into their products and devices to protect both their operations and their clients. In many cases, including the case of Apple, the decryption key is in the hands of users only.

What the government ordered

In an investigation surrounding the San Bernardino case of terrorism, the FBI has asked Apple to design new software to defeat existing security protections in place in iPhones. It was under cover the government to access a single device only once. All Writs Act (which is over 0 years old law) was used to justify this decision. The order specifically the Apple forced government to provide "reasonable technical assistance", including. 'Signed phone software file, and a binder recovery files or other software file (SIF) to load on the device object 'This information would allow the government to "crack" the encryption and access communications on the device, which Apple does not have access now.

Why we oppose

the use of the Act All writs here is too expansive. It contradicts other limitations Congress has established to govern how the application of the law can not (and can not not) require companies to assist in their investigations. in addition, the Act All writs can not create a new authority in contradiction with existing communications for law law enforcement (CALEA), it can not not make an exception to CALEA and require companies to break the encryption. The way the case was conducted, and the urgency with which it was made, apart due process. Furthermore, this decision could have huge and devastating implications for small businesses across the country.

Details filing

ARGUMENT 1: order of the Court is incorrect and unprecedented extension of the reach of all brief Act

the current government's position is not supported by the historical context of the Act All writs. the current interpretation of the Government of the Act All Writs is too wide, and there is no precedent for providing "assistance" to ensure that the government is looking into the case Apple.

  • the historical context in which the Act All writs was adopted weighs against the broad interpretation of the Government
  • context original Act All writs was to support a limited reading of commands that have been "nice" to the principles of law. The next day it was passed, the Congress approved the Fourth Amendment, in direct response to the aversion of employees Brief of the Act All Writs. The law has not been at its creation, the intention to authorize conscription orders private citizens serving in government.
  • The courts have not applied the Act All Writs to Compel companies to create new technologies to Undermine Basic characteristics of their businesses
  • Act All writs says a federal court may order as "necessary or appropriate." - but in this context, the government has gone beyond any historical use of this "aid" the Act All writs has never been used to force the invention of technology that did not exist before, or that a company does not create otherwise. nor has forced the creation of technology that is harmful a company and its customers.
  • Requiring a company to develop technology that affects safety is "offensive" and against the important interests of the company
  • beyond the above argument, the law Any wrist included a caveat - that the aid was not necessary if it was "offensive" to the activity of the business or imposed "undue burden." In this case, a convincing business to create a technology that affects the security is both offensive and goes against the interests of society. Cyber ​​threats are real and increasingly common in today's world, and the implications for individuals and businesses (including the financial implications) are enormous. In addition, the Executive has already called on US companies to strengthen security and to innovate to protect consumer information. The FTC urges same "privacy by design", including encryption of data both in transit and at rest.
  • An order to invent and create new technology to help law enforcement is too heavy, particularly on small and emerging technology companies
  • the cost and burden of complying with an order like this is too great for small businesses that do not have sufficient resources. earlier requests under the Act All Writs were much easier for companies to comply. Creating a new technology involves further costs and if this is a burden to Apple - one of the largest companies and most valuable in the world - it would certainly be an "undue burden" for small businesses. The alternatives are all negative: going out of business, choosing not to innovate, or construction of permanent insecurity in devices

ARGUMENT 2 :. CALEA (Communications Assistance for Law Enforcement) limits the application of the Act to Require All writs of assistance out encryption controlled by the user

courts can not use the Act All writs to grant powers that Congress has already considered and refused to give. In short, it can not be used to create a new authority. This authority has been denied in CALEA, which describes the terms to help the security forces who do not understand the requirement regarding encrypted communications.

  • CALEA imposes strict limits on the government's ability to Compel Access to Encrypted command Communications Particularity Tech design
  • demand CALEA was narrowly defined to apply to a set of "common carriers." This list later included Internet broadband and VoIP, yet information services "excluded" - or Internet-based services. This means things like cloud storage services, social networking and chat applications would be excluded. Congress also wrote CALEA equilibrium can the security needs of privacy, and included two exceptions to compliance. The law did not require that they adopt any "specific design of the equipment, facilities, services, features or configurations of the system," nor does it mandate suppliers to "decrypt or to ensure the ability of governments to decrypt "all communications of the user.
  • the government's attempt to distinguish CALEA CALEA creates an exception to this rule would swallow
  • Using the law All writs to create exceptions to CALEA would minimize the existing law and have negative consequences. the law states that the probable cause must be used. in addition, it is said that cases serious and urgent may receive an exception, such as those with sensitive data in time. this is not true in the case of Apple, indicating the government's logic is flawed

ARGUMENT 3 :. Ex parte nature of the government's request and order of the Court is incorrect and involves the procedural rights of companies obligated under all writs Act

a disturbing process was used in case Apple - the one where the decision came from a judge without all parties present. There was no proper notice to Apple, which should have been heard first and had the opportunity to respond. However, their input was missing. There was no need to use this procedure. The government acted too fast, without a good reason to override due process. The phone - and information - have always been there. Also, when you think about it in the context of the size of the company, Apple had trouble keeping up, so we have to ask - how a small business would be able to

Read the full? Briefly, we submitted for details.

who joined us in the memory

We joined with several other organizations to submit this amicus curiae, including AVG Technologies, data Foundry, Golden Frog, the Computer & Communications Industry Association (CCIA), the Internet Association, and the Coalition of the Internet infrastructure ( "from i2Coalition")

Many other businesses across the country - . including giants like Facebook, LinkedIn, Twitter, Google, EFF and ACLU also submitted amicus briefs in support of Apple in this case. We are encouraged that so many influential groups and businesses are standing together, and hopes that this fight will be successful and the right to privacy and encryption is confirmed.

Read our position in the case of Apple

do you want to fight? Sign the petition Access Now to support Apple

Obama drew criticism More Encryption Comments SXSW

7:50 PM Add Comment
Obama drew criticism More Encryption Comments SXSW -

The President of the United States visited Austin last week to talk about technology and innovation at SXSW this year. It was a historic visit, marking the first time a sitting president attended the event. His appearance certainly helped to cement that legacy as the leading 'Tech President' Leader of the Government in a new era of technology, having started the digital service in the United States to upgrade the antiquated technology that was in place when came to power.

However, such a president of tech-savvy, it is worrying to many it seems not fully grasp the importance of strong encryption. Speaking to a crowd of more than 2,000 technology enthusiasts, Obama said: "If, in technology, it is possible to make a device or an impenetrable system where encryption is so strong that he does there is no key, no door at all, so how do we apprehend the pornographer? How can we disrupt a terrorist plot? "His comments seemed to call for some kind of compromise. Addressing the issue in a diplomatic way, he said firmly," I would caution against taking an absolutist perspective on this. "Indirectly referring to the FBI vs Apple case, President Obama said that if the government has no way in a smartphone "so everyone walks around with a Swiss bank account in your pocket."

the technology community has been Quick to respond to his comments, with Congressman Darrell Issa stating "There is no way to create a special key for the government that could not be exploited by the Russians, the Chinese, or other who want to have access to sensitive information that we all carry in our pockets every day. "Matt Blaze, a professor of computer science and cryptography researcher at the University of Pennsylvania, agrees on the controversy, saying it was a waste of time to assume that people will not flow abroad is encrypted products: "try to put a mandate on the encryption software is really quite desperate, it will not prevent people to use open software source or foreign-made software, even in the United States. "

Golden Frog has us believe in the importance of strong encryption, unbreakable. That's why we create products like VyprVPN to help increase the security of online users. In fact, we organized a SXSW panel on the encryption of this year, with speakers such as Congressman Will Hurd, which weighed on the question of the excessive reach of the government: "All enforcement agency law has no right to tell a company what to do. Period. "

While continuing battle encryption, we'll be sure to keep our eyes on the complex issue at hand, and we will continue to stand with Apple in their fight against the FBI.