Internet censorship in Africa

6:26 PM Add Comment
Internet censorship in Africa -

Censorship is increasing in Africa. Recent social media blocks at elections in Uganda, Congo and Chad to control more and more of Ethiopia on the Internet, it appears censorship is on the rise across the continent. In many cases, the state-owned telecommunications have full control over the Internet and can pass the censorship accordingly. In this post, we take a deep look at several African countries and Internet restrictions they face.

A Censored not free experience of Internet in Africa

There are many African countries that do not have a free Internet experience

Eritrea :. Eritrea would be the most censored country in the world, and their repressive climate develops the internet and journalism which are heavily censored :.

government controls the Internet and all media in Eritrea, creating a restrictive environment for the press

- Committee to protect journalists

the media is under tight control, and the state media can not share news. Others run the fear of arrest, and the Internet is controlled by only the EriTel telecommunications company in the country. All mobile communications must go through EriTel, and all ISPs should use the gateway controlled by the government. Internet access in the country is also very limited, with less than 1% of people going online

Ethiopia :. Ethiopia is one of the most censored country in the world, frequently appearing on the lists of countries that suffer from extreme censorship. Recently (March 2016), it was reported that Ethiopia continues to rage against journalists and censorship of information. Restricted aggravation "Some social media sites were blocked, and the first security officials in March arrested two international journalists during the night while trying to report on events." In July 2016, Ethiopia has blocked several major social media sites, including Instagram, Facebook and Twitter - as well as the messaging application Viber - amid a flight of the final exam university. The block lasted 5 days and was said to prevent students from "distraction" of their studides.

Ethiopian journalists to choose between self-censorship, prison or exile.

- Foreign Policy in Focus

In early April, Twitter & WhatsApp were blocked in Ethiopia for more than a month, while the region known events. Facebook messaging has been blocked by the state monopoly Ethio Telecom and mobile data connections have also been targeted.

This type of censorship is in progress for some time. In 2015 Ethiopia has blocked a large number (over 100) of news and opposition websites before the elections. Bloggers and activists were arrested, and some have even been accused of terrorism. The state-controlled Ethio Telecom telecommunications company is the only Internet provider in the country and regularly suspends critical information websites

Sudan :. In 2015, the slow Internet speeds were reported during periods "politically contentious." In other words, it seems that the government was strangling these connections. Sudan also has a Freedom of Access to Information Law , which classifies 12 types of information that is limited by the citizens. The law legalizes censorship and censorship of news, so people are not aware of what was happening. In addition, online journalists and activists were arrested and taken new hacked (and intimidated) before the elections

Egypt :. Egyptians have long fought for their government less oppressive censorship, and in recent years, Egypt has witnessed many types of media censorship. You can learn more about our previous blog post.

A "partly free" The Internet experience in Africa

According to Freedom on the Net 2015, many African countries enjoy an Internet experience that is "partially . free "These countries are: Morocco, Libya, Tunisia, Nigeria, Uganda, Rwanda, Angola, Zambia, Zimbabwe and Malawi

Nigeria . regarding [duNigeria Act 2015 cybercrime was signed into law last year and may violate the right to privacy and freedom of expression in Nigeria. however, social media is generally used as a positive tool for communicating during the elections. And in May 2016, Nigeria withdrew its bill on anti-social media, as it was considered the bill violates the citizens' rights (among other things) - definitely a "win" for freedom of expression in the country

Rwanda. Rwanda implemented when blocking the BBC showed a documentary about the country they deem questionable. private WhatsApp monitoring and Skype messages of a popular singer was conducted, and led to the prison sentence of the singer

Zambia :. Censorship in Zambia improves without blocked sites. However, there are threats of blocking blogs and websites, spyware and Zambia have bought to use for monitoring

Zimbabwe :. The Facebook page of a whistleblower was taken down, and two people were arrested at the same time. A citizen who has initiated a protest on Facebook also disappearances. In July 2016, Zimbabwe has blocked websites and social media applications such as WhatsApp. . The country is also reportedly looking to build a "single Internet gateway," or what we call a "firewall" to filter all content in the country

Uganda: Uganda recently blocked social media on election day. Visit our website for detailed more

An Internet experience in Africa

Africa South :. Although South Africa was ranked "Free" for their Internet experience (one of the few African countries to be classified as such) to the end of 2015 a new censorship law was proposed by the film and the Council of publication that "regulate online content" and impose a lot of censorship. The law would apply to games and movies distributed online publications that include "forms of sex, violence, hate speech," with implications for the distribution of content. It is disturbing to see a law like the one proposed in a country free elsewhere

Kenya :. Kenya is a good example of a free Internet experience. Blogging is popular, and there is a defined legal process to remove "defamatory." There are still moderate censure reported, however, that bloggers and social media users critical of the government were arrested for "misuse of equipment telecommunicaitons under license."

Conclusion

As you can see, many African countries suffer from a kind of censorship or lack basic Internet freedoms. This censorship seems to be increasing in some places, causing concern for Internet users in the region and for Internet freedom around the world. Also read this excellent article on the BBC how governments in Africa social media block.

In addition to the related sources, freedom on the Net 2015 was used as a reference to this position.

The Internet Privacy concerns affecting online shopping, banking habits

5:25 PM Add Comment
The Internet Privacy concerns affecting online shopping, banking habits -

Americans spend a lot of time and money online. In fact, according to Forrester Research US consumers will spend $ 327 billion on the Internet in 2016. However, security and privacy could discourage people are spending their hard earned money online?

According to a new survey conducted by the Ministry of the National Telecommunications and Information Administration Trade almost half of American Internet users are discouraged by the lack of online security the choice not to engage in online transactions because of privacy issues. The study asked 41,000 households about their online business last year, and 45% of households reported that they abstained from at least one of the activities identified in the survey, 30% by avoiding the two activities. The main concern owned by Internet users from identity theft, followed by privacy on data collection by the government and other online services.

The widespread feeling that our Internet must be made safer is not a new concept, but it is clearer than ever that the encryption and other forms of protection should be implemented to ensure confidentiality and online safety. According to the NTIA, "Besides being a great concern problem for many Americans, issues of privacy and security can reduce economic activity and hamper the free exchange of ideas online."

Whether fraud monitoring, identity theft and data collection, Americans are clearly concerned about the current state of the Internet. Encryption is a way to better protect yourself online, and VyprVPN is there to help you. With more than 50 server locations worldwide and 0,000+ global IP, achieving in privacy online has never been easier. VyprVPN encrypts your Internet connection to protect your sensitive information when buying, banking or conducting any other online activity - so you never have to worry about someone you monitor or steal your information

as the internet continues to infiltrate every aspect of our lives, it is crucial that we maintain our privacy for us and our families to protect at best.

Coalition Groups Call for the end of the FISA Section 702

4:24 PM Add Comment
Coalition Groups Call for the end of the FISA Section 702 -

Changes to the FISA expires in December 2017 - but for many groups in the coalition behind a new website, it is not too early to start thinking about what will happen next. An effort led by the struggle for the future calls for the end of the article 702 Changes of FISA, which is the section that allows mass surveillance programs in the United States. This change allowed the PRISM and UPSTREAM programs the government uses to spy on electronic communications that take place on major platforms (eg Google, Yahoo). This monitoring occurs without a warrant, and applies to both US citizens and others around the world.

The site calls for an end to 702 next year as scheduled by its expiration date, or for the government to adopt significant reforms this law if it is not obsolete. The groups aim to end any extension of the law that can be put into action, that this bill was to uncontrolled surveillance. You can learn more in the EFF briefing.

Resources

  • See website End 702
  • More details on the
  • examiner

Poland promulgates new law

3:23 PM Add Comment
Poland promulgates new law - monitoring

Last week, Poland has signed new anti-terror rules in the law, in an effort to increase security in the country. As with many similar laws, Poland cited terrorism as a result of legislation - but it poses major risks to privacy and civil liberties. The law allows the government to monitor foreign citizens for up to three months without court approval - opening the door to increased surveillance of its citizens. The police can collect metadata without a court order (which includes information about the Web sites visited online, the location of cell phones). The law includes provisions for blocking Internet content, as well.

Additional provisions of the bill are threats beyond online monitoring and include threats to civil liberties such as relaxed regulations on foreigners for deportation, detention of suspects and the regulation of sale of SIM cards for pay-as-you-go.

Amnesty International said the new rules give "apparently unlimited powers" Polish intelligence services. A European group Human Rights also criticized the law surveillance. A Golden Frog we believe that everyone has the right to privacy, and are opposed to government surveillance and intrusive legislation

Source :. Reuters, RT, Panoptykon

Bill Brazil plans to regulate access to digital data

2:22 PM Add Comment
Bill Brazil plans to regulate access to digital data -

As the approach of the summer Olympics, all eyes descend on Brazil as they host this important event. However, in addition to news surrounding the Olympics, it was also about recent press censorship WhatsApp Brazil and a new bill.

In May, we reported that WhatsApp was blocked in Brazil again for 72 hours as the Facebook-owned company refused to "cooperate with a police investigation." This sparked international outrage and put Brazil on the spot when it came to the violation of data rights. Last week, a judge ordered WhatsApp be locked again when the application failed to provide information requested by the Brazilian authorities in a criminal investigation.

Now it is being reported that the Brazilian government plans to draft a bill to simplify the collaboration between authorities and companies like WhatsApp, to address these types of situations and avoid resulting judgments. Ideally, the bill will protect the digital data and limit the mass stops. The Attorney General of Brazil, the judge suspended WhatsApp was misinterpreted an Internet law in 2014 when he took the decision to block WhatsApp. The new law aims to mitigate situations of this kind, which reduces the impact to a large number of users WhatsApp country.

Starting today, there are over 100 million WhatsApp users in Brazil, creating a law that brings clarity to the issue of data requests made by the Brazilian authorities how those requests are processed seems appropriate. The messaging application is a major means of communication in the country, and recurring shutdowns pose a huge problem for those who communicate via the application. A Golden Frog, we are for the unbreakable encryption, user privacy and Intenret without restriction. We will look to see if the law proposed by Brazil addresses these issues to avoid future stoppages WhatsApp and other essential communication platforms.

UK server is now available for VyprVPN customers!

11:19 AM Add Comment
UK server is now available for VyprVPN customers! -

Here at Golden Frog, we work hard to respond to customer feedback and deliver privacy and superior security solutions in a way that fit our changing customer needs. Since we launched VyprVPN, the most requested feature was a UK VPN server location. You asked; we listened. Today we are proud to announce our new UK VyprVPN server!

You can now access the Internet from anywhere in the world and appear as if you are browsing from the UK. This is perfect for British travelers who need to access the Internet in their native language while traveling.

Our new VyprVPN UK server adds to our existing server options on the east and west coasts of the US, Amsterdam and Hong Kong. The UK server is ready for connections from one of our robust VPN protocols available, including PPTP, L2TP / IPsec, and OpenVPN.

To enter your new VyprVPN UK server, Golden Frog existing customers simply need to update their host name to VPN :.

uk1.vpn.goldenfrog.com

for more configuration information, see our VyprVPN configuration page, or contact Golden Frog support

If you are not already a Golden Frog VyprVPN customer, you can sign up today!

Thank you for your continued support of privacy, security and freedom on the web!

VyprVPN App Updated to Version 1.3

9:17 PM Add Comment
VyprVPN App Updated to Version 1.3 -

VyprVPN App Today we are pleased to release version 1.3 of VyprVPN App for Windows!

VyprVPN App Version 1.3 updates:

  • When the VyprVPN App for Giganews checks for available updates, files associated with this action are signed digitally anti-virus software a message that the files are safe
  • [
  • application prevents connection problems due to malicious DNS poisoning third party.

You can apply this update directly in the app or download VyprVPN VyprVPN App v1.3.

Please note that VyprVPN App is currently only available for Windows. The VyprVPN App for Mac will be available soon!

To stay updated on the App VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter or Google+.

Photo 500 terabytes of storage Dump Truck online!

10:18 AM Add Comment
Photo 500 terabytes of storage Dump Truck online! -

Unlike many storage providers, Golden Frog owns and operates the hard drives and servers and manages the network, so we can provide the best security and performance our customers. In other words, we do not rely on third parties to store your data. When you download Dump Truck, Golden Frog is the only company that handles your information so your privacy and security is ensured.

The photo below is a rack of online storage server cluster Dump Truck in the new mastodon 130,000 SF data Foundry data center called Texas 1 in Austin, Texas.

This rack storage servers is about 500 terabytes of storage space (or half petabyte). We have deployed several law like this to provide plenty of storage space for Dump Truck online storage.

Only Giganews members are currently able to access Dump Truck online storage, but look for a commercial version of Dump Truck Golden Frog customers in the coming months.

500 Terabytes of Dump Truck Online Storage

500 Terabytes of Dump Truck Online Storage

VyprVPN for Android - Now with Widgets

8:16 PM Add Comment
VyprVPN for Android - Now with Widgets -

VyprVPN We are pleased to announce the availability of VyprVPN for Android version 1.2. This latest version includes several new features, but the feature that we are most pleased with our new widgets is VyprVPN. If you have never used an Android gadget before, it is an application that you can place on your home or lock screen to display the status of an application and use some of its basic functions.

Our new VyprVPN widgets allow you to:

  • Connect and disconnect VyprVPN
  • See the current location VPN server, connected time and your VyprVPN public IP address or protected

VyprVPN for Android Widgets

the widgets are available in two sizes. The largest 4 × 1 widget displays the complete status information. The 1 × 1 small widget displays only the connection time. Each widget allows you to connect or disconnect VyprVPN simply by clicking on the logo VyprVPN.

Connect and disconnect VyprVPN and the current state of protection are the most basic functions and most important of Android VyprVPN, which is precisely why we have made available from the widgets. Once you are logged in and connected to VyprVPN for the first time, you should navigate to the application unless you want to change servers or account information. All key information is right at your home or lock screen. For more information on adding a widget to your screens, visit the VyprVPN for Android FAQ.

There are other significant improvements in version 1.2. One that we believe VyprVPN users will find most useful is a new option to automatically reconnect when the VPN log drops. This is similar to a feature we have in VyprVPN Desktop. In the settings screen, select this option will automatically try VyprVPN a moment to reconnect the VPN connection is dropped. After disconnection, VyprVPN will attempt to reconnect five times. After the fifth attempt, VyprVPN cease attempts reconnect and require a manual reconnection.

The IP address of your device is now displayed in the application at the bottom of the screen. Before you connect to VyprVPN, the IP address is the public IP address of an unprotected connection. Once connected to VyprVPN, the address will change your assigned IP VyprVPN secure.

Finally, we have improved the connection status messages to provide more detailed information. If you have a slow connection problems or network, improved status messages give you more detailed information on the progress of your connection status.

Download VyprVPN for Android on Google Play today!

Available on Google Play
requires Android 4.0 or higher

Mobile VyprVPN Apps are free to download but require a Pro account VyprVPN. Try VyprVPN Pro without risk or upgrade your existing service to use all the advantages of VyprVPN Mobile Apps!

To stay updated with VyprVPN for Mac, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

Golden Frog sign a letter to the US Congress to support mobile phone unlocking

7:15 PM Add Comment
Golden Frog sign a letter to the US Congress to support mobile phone unlocking -

In October 2012, the Library of Congress decided that unlocking mobile phones would soon be illegal in United States. Today, Golden Frog joins a wide range of groups and individuals seeking senior lawmakers in the US Congress to act quickly to codify a permanent exception to the Digital Millennium Copyright Act (DMCA) to allow unlocking mobile terminals.

We believe that unlocking a phone allows consumers to choose their mobile operator and not be locked to a single carrier. This is useful for international travelers who want their phones are compatible with different networks or for consumers who want the freedom to switch carriers at will. Make illegal mobile phone lock reduces consumer choice and reduces the resale value of the devices that consumers paid in full. It also forces consumers to pay exorbitant roaming charges for making calls while traveling abroad.

A recent petition to the White House that has collected more than 100,000 signatures have asked the White House asked the Librarian of Congress to reverse its decision. This release campaign has led the White House to reconsider its position and press release and an investigation of the FCC.

Several members of Congress have announced plans to legalize unlocking. Starting today, three Senate Bills and House bill have been introduced, and more seem to be on the way. . This question has broad bipartisan and popular support, and there's a good chance at least one of these bills will strength

As Forbes reported this week, citing one of the lead campaigners the release, Derek Khanna:

"A free society should not have to ask his government every three years to allow access to technologies that are mundane and ordinary. Innovation can not depend on the permission of begging an unelected bureaucrat every three years. A free society should not prohibit technologies unless there's a really overwhelming and compelling governmental interest. "

As we stated in our policy paper published recently, we believe in an open and free Internet. The idea of ​​an open and free Internet also covers the mobile market. Enabling consumers to use their mobile devices with the carrier of their choice contributes to increase consumer choice and maintain openness. We believe that copyright should not be used as a means of restrict consumers to use a particular service provider.

Dump Truck Web App: Now with Tab

6:14 PM Add Comment
Dump Truck Web App: Now with Tab -

Dump Truck Web App We added support for thumbnails in the Dump Truck Web App

The new thumbnail view makes viewing! your photos quickly and easily. To activate the thumbnail view, just click the lever up right of the Web App interface to toggle between the list view and thumbnail.

Thumbnail View

You can access all shares of Standard -favoriting file, delete, rename, and drag & drop while thumbnail!

Log in and start using thumbnail!

We would like to send a big "Thank you" to all of our great users who submitted comments and ideas. If you have not already, please visit our microsite Golden Frog ideas to share your product ideas and suggestions with us long.

If you do not already have an account Dump Truck, register for a FREE 5GB account today!

to stay updated with Dump Truck, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

New Cluster Server VyprVPN in Ireland!

5:12 PM Add Comment
New Cluster Server VyprVPN in Ireland! -

VyprVPN Ireland We have added a new VyprVPN server cluster in Dublin, Ireland!

This is our eleventh server cluster in Europe, and we will continue to add additional clusters throughout 2013. Please continue to share your product suggestions and feature requests to our ideas microsite so that we can offer you the best VPN service possible.

VyprVPN members can connect to VyprVPN server without restrictions or download caps. We 0,000+ IP addresses to server connections are always available. Ireland VPN server cluster is available for all VyprVPN protocols, including PPTP, L2TP / IPsec, and OpenVPN.

If you use VyprVPN Desktop, the new server cluster is automatically available when choosing the location of your server. To select the new server cluster with VyprVPN Mobile, simply log on your application and log in

If you manually configure VyprVPN on your operating system, you can update your name 'VyprVPN host :. ie1.vpn.goldenfrog.com

You now have unlimited access to the following locations on the server:

  • Asia - Hong Kong
  • Canada - Toronto
  • Denmark - Copenhagen
  • Ireland - Dublin New
  • Europe - Luxembourg New
  • France - Paris
  • Germany - Frankfurt
  • Netherlands - Amsterdam
  • Romania - Bucharest New
  • Russia - Moscow New!
  • - Singapore New
  • Sweden - Stockholm
  • Switzerland - Zurich New
  • United Kingdom - London
  • US - Austin
  • US - Los Angeles
  • US - Washington, DC

We recently added a VPN server Singapore, a Romanian VPN server, a VPN server Luxembourg, a Russian VPN server, VPN Swiss server, Sweden and Denmark VPN server VPN server.

We will continue to add additional VPN server clusters throughout 2013 - so stay tuned

If you want protection for your Internet connection while at home or on the road, VyprVPN try risk free for 7 days. If you are a Dump Truck user, please add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

New VPN Server Cluster in Turkey!

4:11 PM Add Comment
New VPN Server Cluster in Turkey! -

VyprVPN Turkey We have added a new VyprVPN server cluster in Turkey!

The new server cluster is available for all VyprVPN protocols, including PPTP, L2TP / IPSec and OpenVPN

How to access the server cluster New Turkey :.

  • VyprVPN office -. If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN - If you use mobile VyprVPN, simply log of application and log back in to enable Turkey as an option
  • manual configuration - If you manually adjust VyprVPN on your operating system, you can update your name VyprVPN to host :. tr1.vpn.goldenfrog.com

Remember, you can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

You now have unlimited access to VPN following server locations:

  • Asia - Hong. Kong
  • Canada - Toronto
  • Denmark - Copenhagen
  • Ireland - Dublin New
  • Italy - Rome New!
  • Europe - Luxembourg
  • France - Paris
  • Germany - Frankfurt
  • Malaysia - Kuala Lumpur New
  • Netherlands - Amsterdam
  • Norway - Oslo New
  • Romania - Bucharest
  • Russia - Moscow
  • - Singapore
  • Spain - Madrid New
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Turkey - Istanbul New!
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Washington, DC

do not forget to visit our microsite ideas to let us know that the server location you want to side

If you want protection for your Internet connection while at home! or on the road, try it free for 7 days VyprVPN risk. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

Beyond the Fourth Amendment: additional constitutional implications arising from the surveillance and seizure of US citizens of Big Government Digital ...

3:10 PM Add Comment
Beyond the Fourth Amendment: additional constitutional implications arising from the surveillance and seizure of US citizens of Big Government Digital ... -

efforts by the government to monitor citizens pervasively digital property encroaching on individual liberty and property, and violate due process of the Constitution, property, privacy, expression and the right of association. Read more.

More Down Under! New Cluster Server VPN in Melbourne, Australia!

2:09 PM Add Comment
More Down Under! New Cluster Server VPN in Melbourne, Australia! -

VyprVPN Australia We will again Down Under! Oi! Golden Frog is delighted to announce a new server cluster in Melbourne, Australia, the second of our groups in the country. Earlier this year, we launched a server cluster in Sydney and we plan to launch soon in Perth.

The new server cluster in Melbourne is available for all VyprVPN protocols, including PPTP, L2TP / IPsec, and OpenVPN. Our users now have access to more than 40 server cluster locations worldwide.

A remarkable 0% of the 22 million Australian residents have Internet access, the highest rates in the world. But despite earlier granting their people off Internet freedoms, Internet censorship has been gradually on the rise in recent years. In November 2012, the government announced that more than 0% of Australians using Internet service providers will have a web filter under the new laws

How to access the Melbourne server cluster: .

  • VyprVPN office -. If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN - For mobile VyprVPN, simply log out of the and get back to Melbourne activate optional
  • manual configuration -. If you manually adjust VyprVPN on your operating system, you can update your hostname to VyprVPN: au2.vpn.goldenfrog.com

Remember you can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

You now have unlimited access to the following VPN server locations in the United States, Europe, Asia and Oceania :.

  • Asia - Hong Kong
  • Australia - Melbourne New
  • Australia - Sydney
  • Austria - Vienna
  • Belgium - Brussels
  • Canada - Toronto
  • Czech Republic - Prague
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki
  • France - Paris
  • Germany - Frankfurt
  • Iceland - Reykajvík New
  • Indonesia - Jakarta
  • Ireland - Dublin
  • Italy - Rome
  • Japan - Tokyo
  • Lithuania - Vilnius
  • Malaysia - Kuala Lumpur
  • Netherlands - Amsterdam
  • New Zealand - Auckland
  • Norway - Oslo
  • Philippines - Manila New
  • Poland - Warsaw
  • Portugal - Lisbon
  • Romania - Bucharest
  • Russia - Moscow
  • - Singapore
  • South Korea - Seoul
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Thailand - Bangkok New
  • Turkey - Istanbul
  • Vietnam - Hanoi
  • UK - London
  • US - Austin
  • US - Los Angeles
  • uS - Miami
  • uS - Washington

to stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+ . Or, if you have a product idea, application functionality or location of the recommendation server, please share it with us on our microsite ideas.

If you want protection for your Internet connection while at home or on the road, try for 7 days without risk VyprVPN. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

GigaOm: VyprVPN provider starts using the proprietary protocol for anonymity Chameleon

12:07 PM Add Comment
GigaOm: VyprVPN provider starts using the proprietary protocol for anonymity Chameleon -

Golden Frog says it manages its own global network of servers, it does not keep newspapers circulation, and it is incorporated in Switzerland, a jurisdiction with strong privacy laws

Read full Article. VyprVPN provider begins by using the Chameleon proprietary protocol for anonymity

You are invited to our privacy Panel and the Party at SXSW 2014

11:06 AM Add Comment
You are invited to our privacy Panel and the Party at SXSW 2014 -

Take Back Your Internet

It's been a difficult year for the Internet. With all of the NSA controversy, the collection of data by companies, the repeal of Net Neutrality, we could all use a good time.

In this spirit, Golden Frog partnered with Giganews and Data Foundry hosts its second " Take Back Your Internet " annual party during SXSW. We would like to invite you to join us Sunday, March 9 in downtown Austin for an evening of networking with your fellow surfers who care as much as you do about online private life.

As an added bonus VERY COOL, we recruited some of the biggest advocates of online privacy in the world for an entertaining and informative panel discussion on the current state and future of privacy online. Various surveys show an overwhelming majority of people are concerned about their online privacy and are in favor of policy initiatives and technical solutions that help preserve their privacy. But is it always possible in an era of widespread internet censorship, data collection and mass surveillance by governments? We all leave a footprint online, but what can be done to keep it private if needed?

Our panel will examine the current state of online privacy in the United States and the world, the role that ISPs play in an open environment. Internet and the future of the government policy regarding the Internet

Privacy Panel Livestream:
If you can not make it to the event in person you can watch it online privacy panel that we will livestreaming the event on our website

www.goldenfrog.com/sxsw2014/livestream

We will also be accepting some questions for the panelists on Twitter and our livestream page . Just Tweet us your questions related to confidentiality with hashtag #takebackyourinternet and include @golden_frog in your tweet

DETAILS GROUP :.
Is there a left Online Privacy? What does the future
A group of experts on what every Internet user should know
Speakers:
Kevin Bankston - Institute policy director technology opened at the New America Foundation [
Evan Greer - Combat campaign manager for the future
Ali Sternburg - public Counsel policy CCIA
Rep Bryan Hughes District Five in the House of representatives Texas
Ron Yokubaitis -. Co-founder and managing co-director of Golden Frog, Giganews and Data Foundry Texas.net
Panel Moderated by Stacey Higginbotham - Sr. Writer, GigaOM

we hope you can join us in person at the event or through our Livestream . Do not forget to post comments or tweet your questions to us with hashtag #takebackyourinternet during the event

Event Information :.
WHAT: Take Back Your Party Internet - 2014
WHEN: Sunday, March 9th 6-10pm
WHERE: The girl Bourbon, # 212 E 6th St, Austin, TX - 78701
SCHEDULE:
18:00 open
7-8pm Panel on online privacy
8-10pm Party Continues
DRINKS: Open Bar from 6-9.30pm
cOST: no cost to you - just RSVP for the event while the last tickets
(Note :. This is an unofficial SXSW event, and a badge is not required assist)

RSVP for the event here: http://www.goldenfrog.com/sxsw2014

If you are in town, the the event is free and does not require a SXSW badge. Our space is limited, so please do not delay in RSVPing. We hope you will join us.

Available for private sharing Dump Truck

10:05 AM Add Comment
Available for private sharing Dump Truck -

We are pleased to announce private share is out of beta and ready for all users Dump Truck! Use the Dump Truck Web App to access private and Sharing securely collaborate on files and folders with other users dumper. invite anyone to access shared folders and assign a level of permission, with just their email address. When a file or a private shared folder is changed, added or deleted, the changes to synchronize all the users who have joined the action.

Private Sharing Screen
Dump Features Truck Private Sharing

  • easily invite anyone through the Dump Truck Web App to work on files
  • Set permission levels for users on shared folders
  • read-only access supported. If you choose this option, users can view files but can not change
  • Collaborate on files and folders and they update for all users
  • Move, Rename and edit files and shared folders as if they were your own
  • shared access files across all desktop dump trucks, mobile and web applications

* desktop version 1.2.2 App update required to access private sharing

Although you can share files via the private sharing by the Web App, you can access shared folders via desktop and mobile applications. Company shared files will be synchronized to your PC using the application Truck Dump office. We recently updated the Dump Truck Mac and Windows applications to version 1.2.2 to support the private share. Update from the application by clicking on "Update Available" from the main menu, or you can download the latest version for Mac or Windows.

The Dump Truck Mobile Apps should not be updated for shared access private records.

If you do not have an account Dump Truck, register for a free account and try 5GB of private sharing today!

to stay updated with Dump Truck, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. or, if you have an idea or feature request product, s' please share it with us http://ideas.goldenfrog.com.

Myth # 3 :. When my VPN provider announced a "limited" service, which means they will connect any identifying information about me

8:03 PM Add Comment
Myth # 3 :. When my VPN provider announced a "limited" service, which means they will connect any identifying information about me -

Myth 3

the myth of the day, "When my VPN provider announced a" limited "service, which means they do not connect any identifying information about me." many VPN providers use the "anonymous" word in their advertising to trick users. Learn the reality behind Myth # 3 and stay tuned for 4-7 myths of our last article, I'm Anonymous When I use a VPN -. 7 Myths Debunked

  • Myth # 1: I can be anonymous on the Internet
  • Myth # 2 :. Anonymity and confidentiality are the same
  • Myth # 3 :. When my VPN provider announced a "limited" service, which means they will connect any identifying information about me
  • Myth # 4: -. 14th July When the privacy of my VPN policy provider said they "do not connect", that means I'm anonymous
  • Myth # 5: -. July 15 Although my VPN provider uses VPN servers hosted or cloud-based I can still be anonymous
  • Myth # 6 - July 16 .. Although my VPN provider does not own and operate the network I can still be anonymous
  • Myth # 7 - July 17 Everything Logging VPN is Bad

I Anonymous When I use a VPN - 7 myths Debunked is the last article in our "Take Back Your Internet". microsite politics. The "7 myths" article addresses a disturbing trend in the VPN industry during the past year. Increasingly VPN providers perpetuate the myth of a VPN or service "anonymous" "no logging", while providing minimal or no transparency on how they actually manage your data. This diverted conscious privacy VPN users to focus on the false promise of anonymity instead of focusing on what really matters when choosing a VPN provider: transparency, trust, ease of use , performance and reliability. During the next week, we will reveal the reality behind the myths crucial 7 VPN, online privacy and anonymity around.

To stay updated with Golden Frog, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+.

Why Netflix possible for Verizon users are 10x faster when using VyprVPN

7:02 PM Add Comment
Why Netflix possible for Verizon users are 10x faster when using VyprVPN -

Colin Nederkoorn, a Verizon customer frustrated, published a great article and video showing how VyprVPN which allowed him to get faster speeds 10x on Netflix. Thousands of users responded, and many wonder how a VPN actually increases speeds. Recently, we published an infographic that explains the "peering problem" in more detail: http://www.goldenfrog.com/take-back-your-internet/infographics/the-netflix-comcast-peering-problem.

The fact is, more and more VyprVPN users inside and outside of the United States tell us that their speeds actually increase when using VyprVPN. VyprVPN users are effectively using them as "Virtual ISP" for faster speeds, but they also get security and privacy because of the encrypted connection.

Common sense says that the speeds are inherently slow because of the encryption overhead, but it is currently at the network layer to explain the increased speed. We are the only VPN provider that does not servers, and the network to "rent" hosting providers, etc. We own and operate our own server infrastructure and manage our own network. Running your own network means that we control the router and can choose congested roads to our users. It seems that Verizon willfully ignores congestion and complaints arising clients.

Netflix is ​​probably uses Level3 or Cogent to go to Verizon. If these links are saturated (reports are that they are), then the performance will suffer through them because the pipe is not big enough for all the bits that need to go through it. Golden Frog uses other backbone providers to get to Verizon, so we do not go through these congested links. Our Verizon paths are congested. When the author uses VyprVPN for watching Netflix, it avoids the congested links and get as much bandwidth it needs.

The heart of the problem is the serious lack of competition in the United States. As we said in comments to the FCC as a member of the i2Coalition:

"The most effective way for the Commission to protect and promote the open Internet is to implement Open Access reclassifying broadband transmission component as a telecommunications service Title II. proposed rules Net neutrality of the NPRM are trying to mitigate the effects of a last mile noncompetitive regulating broadband access, but access strikes open the heart of the problem by opening the network to robust competition. Open Access would bring competition to the Internet access market and consumer choice would be the first guarantee against abusive and discriminatory network practices. "

We are also filing comments with the FCC today on behalf of Golden Frog and is currently evaluating whether to include Colin Nederkoorn "s issue Verizon as part of our filing of the FCC Thanks Colin

We recommend all Golden Frog users to file their own personal comments to the FCC about open access by the end of the deadline today http:.!. / /www.fcc.gov/comments

HostingCon 2014: The World Snowden post a year later - What has changed

6:01 PM Add Comment
HostingCon 2014: The World Snowden post a year later - What has changed -

Panel Details

increased awareness about government surveillance practices has changed the way society understands privacy , values ​​and respect for the law, leaving individuals and companies uncertain about who has access to their private information. Now more than ever, we must work together to ensure that major reforms are taken to maintain the free and open nature of the Internet as we know it.

Speakers

Marvin Ammori
Marvin Ammori is a first amendment lawyer and political Internet leading expert. He has represented several companies and coalitions, including Google, Dropbox, eBay, Automattic, Tumblr, Twitter, and others. Currently 2014 Future Tense Fellow at the New America Foundation, a think-tanks the most important of the nation, he also sits on the boards of non-profit groups fighting for the future and demand progress and also the motor of the Defence Council, a national organization that provides a voice in startups DC
Christian Dawson
Christian Dawson joined ServInt in 1998 he was appointed Chief operating Officer in 09 in his current role, he is responsible for the overall management of the business of ServInt, including sales, marketing, business development and customer support.
Gregory Nojeim
Gregory T. Nojeim is a Senior Counsel and Director of the Project on Freedom, Security and Technology at the Center for Democracy and Technology (CDT), a political organization public non-profit in Washington, DC dedicated to keeping the Internet open, innovative and free.
Michelle Richardson
as director of public policy, Michelle Richardson spearhead of the ACLU of Florida's political agenda for the planning and implementation of campaigns legislative and advocacy statewide, analysis and drafting policy proposals, lobbying state, local and federal politicians, preparation and presentation of evidence, the construction and work with allied organizations and coalitions and engaging supporters of the ACLU across the state.
Amie Stepanovich
Amie Stepanovich is Senior Advisor access policies. Amie is an expert in domestic surveillance, cyber security, and the right to privacy. A Access, Amie has projects on digital due process and responds to threats to the intersection of monitoring human rights and communications.
Ron Yokubaitis
Ron is the co-founder and co-CEO of the technology companies: Golden Frog, Giganews and Data Foundry Texas.net. Golden Frog was created to develop services that give people the opportunity to protect themselves online and access an uncensored Internet.

Panel Moderated by

Michael Petricone
Michael Petricone is the vice president of government affairs for the Consumer Electronics Association (CEA). Petricone is responsible for representing the position of the EC industry before Congress and the FCC on key issues such as freedom of the Internet, wireless spectrum, and highly skilled immigration. He is a lecturer on political issues affecting the innovation sector.

Full Transcript (Download PDF)

Michael Petricone: Christian, thank you very much. I am delighted to be here, thank you for coming. This is a special group that we have today. I do not know if you've ever watched the Rock and Roll Hall of Fame inductions where you like the Rolling Stones, and they are up there with Nirvana. Then Jack White jumps on stage. Can Run D.M.C. Jump on the scene. Today we have that as equivalent privacy panel. We have just a bunch of really remarkable, incredible panelist. And we'll have a good interactive discussion. I will try very hard to keep moving the discussion and just stay out of the way

Michael Petricone :. Let me show you very quickly. First, we have Marvin Ammori, it will not be in order for you to raise your hand. He is an activist, he is a scholar, he is a writer, he is an internet defense team of a man. He advises companies like Google and Dropbox. It currently has articles in Slate, Foreign Affairs and Harvard Law Review at the same time; which is quite a trifecta.

Then Christian Dawson. You all know Christian, COO of Servlnt. One of the founders of i2Coalition. I just want to say Christian, I am hoping that everyone in this room is a member of the i2Coalition. If you are not, you should be because I see what Christian did in Washington every day. He did a great job of representing this industry. As Christian said it started after PIFA and SOPA when Christian realized that one of the problems we had, one of the challenges we had is that the vast majority of members of Congress do not really understand how the Internet. And if you do not understand how something works, it's really hard to care about him. It helps set up the i2Coalition. Their mission is to help educate the Congress on the industry and how it works. It has to be done a fantastic job so please support him in the i2Coalition.

Greg Nojeim, Senior Advisor of the Center for Democracy and Technology. Renown expert on national security, terrorism and 4th amendment protections. Then we Michelle Richardson, it is legislative counsel with the ACLU. The ACLU is a fantastic group. I have to renew my membership. You should too. It focuses on transparency issues of national security and government. She was also the lawyer of the Judiciary Committee of the House.

Amie Stepanovich is the Senior Policy Advisor to Access Now where in his on words, it works hard to keep the government out of your life. This is a good thing. She also co-chairs the prestigious Computers, Freedom and Privacy Conference.

Finally, Ron Yokubaitis is an Internet pioneer who founded one of the first fifty ISPs in the United States in the day. It is an old internet lawyer from school. Again, a true pioneer of our industry and is now CEO of Foundry data.

Let the discussion. The title of this panel is Snowden a year later. I will make a request of the panel. I think Snowden, himself, is an interesting guy and you can discuss him and his motives and who he is and him personally. Much of the debate centered around him as a person. I think that while it is understandable, it also removed the debate on exactly what our government is doing and what the response should be. Snowden so important, it is an agent, right? It is a radical transparency agent. The real issue is our government and the actions of our government. I will ask the panel to do over the next hour is to the best of your ability does not mention the word Snowden and instead focus on equities. This is what the real issue is all about.

Let me start by Amie. Just look back one year, how can we here? What have we learned over the last year on the US government's surveillance practices

Amie Stepanovich course. I remember some years ago, I advocate freedom of Information Act request against the NSA. The Freedom of Information Act allows you to go to government agencies and request documents. We were talking about their authority to cyber security, about their monitoring activities. And all this was that we would get more huge wall. We hit a wall. The NSA would say no, then the courts would say no. You just had no window in the activities of the National Agency securities whatsoever. Last year one of the things that we have been able to carve out using one of these documents helped someone anonymously disclose, is this window in the National Security Agency's activities and an idea of ​​what monitoring activities are underway and how these activities are illegal. To what extent these activities go beyond the limits of what we want our government to be doing. Without naming many, many programs that have been disclosed and I think a lot of people on the scene spent a lot of track time, trying to understand how they are set. I think the big thing we learned is that the scope, size and the extent to which our government not only spy on people in the United States but also around the world

Michael Petricone .: Michelle Marvin - anything you want to add to that? What specifically is our government that we did not know last year that perhaps we should be concerned about

Marvin Ammori: I took some notes on what I can give the couple and then you can fill out if you wish. This morning I decided to look through "What we know now that we did not know last year. I'll give you some examples of some of the programs we just know that we can rely a little discussion. What we know is that the US government collects records of the person who calls for almost all telephone calls in the US Let me know if I get hurt details here. They are engaged in the upstream collection directly from carriers. They collect information on a target of the investigation even if the target is not in the emails. They determine that a target is only 51% with presumption of whether or not a person is 51% foreign or not. If you are abroad, they can just spy on you is the idea. They assume that you are abroad unless they positively identify that you are not in certain circumstances. Despite the lax rules of an NSA audit showed they violated their own rules and more than two thousand political times of the year - about twenty seven hundred times. They, perhaps, destroyed evidence that the head of the NSA, perhaps incorrectly makes a senator during a hearing stating that there is no program in which they collect data on millions of Americans. We believe that the top lawyer for the government to deceive the Supreme Court on the NSA's activities into an argument before the Supreme Court. They also intercept millions of images and use facial recognition on them. They collected two years of cell phone location data as part of America a pilot program. They have a program they call muscle where they draw in the lines between the data centers of Google and Yahoo, perhaps other companies. They have a program that Bullrun mine encryption. Including standards that undermine the somehow agency national standard, NISS and to pay a company of ten million dollars for potentially back doors in their encryption technologies. And they also have to avoid certain rules, apparently share data with the eyes of governments Five. New Zealand, Australia, Canada, U.K. and the United States to be able to share information about each other's citizens. If you want, sixty-five things you learned in the last year are due to Snowden. The Electronic Frontier Foundation has a blog for this where you can read them and weep. This is what we now know from other

Michelle Richardson :. I think the sum of thirty thousand feet is definitely what we have learned since 9/11 all these changes in the law have taken surveys on the basis of suspicion. They will not suspect after a bad guy and build a case for him. They collect everything. If it is digital and it is collectible they get it. They do not believe you have the rights to this information and it can be used for all different purposes against you. Here's how these programs are booming. This promise that somewhere in these data, we will find a terrorist or criminals and it will make us safer. Ultimately, this was not the case. A year later, many congressional hearings, there are no concrete examples of how domestic spying, in particular, has never been a terrorist

Michael Petricone :. Can we expand only a little bit because before we dive into the implications of all this, I have to ask. the primary responsibility of a government to its citizens is to keep its citizens safe. Our government says that these programs are not like them, are necessary to stop terror and keep us safe. Why? How would you react that Michelle or why not start with Amie, then go to Michelle

Amie Stepanovich :. One of the programs that Marvin had alluded is that the NSA undermines the encryption standards and I want to focus on that for just a second. What they do is they actually do less sure everyone in line in order to preserve their own supervisors. The encryption standards that we all depend on to protect our communications, banking, our emails, basically all you online have been messed with the NSA behind the scenes in a way that not even the body fixing encryption is aware and said they have no idea that the NSA has done or why, to make it easier for them to conduct surveillance. This idea that they are trying to make us all safer is undermined by their own programs and their own surveillance operations

Michelle Richardson :. There have been a number of terrorist attacks in the United States since the Patriot Act adopted or FISA Amendment Act. As the Boston Marathon, right? All monitoring and we have not taken before. They shot at Fort Hood. We find, in fact, in a number of these incidents the shoe bomber, underwear Christmas Day bomber, these guys, we got advice on but nobody ever ran because we are so concerned by big data. We have all the guys in a room with a computer pulling down all our phone records instead of putting the power of man to capture suspected terrorist in a way that is proven to work.

Christian Dawson: I'll tell you one thing. What we have seen reports now make both Forbes and The New York Times on potentially billions of dollars arising from the US economy as a result of these actions of the NSA due to a lack of consumer confidence in the cloud of the United States and the belief that the United States cares about privacy. I ask that this does not make the United States safer to have a weaker economy and have fewer jobs

Michael Petricone :. Greg

Gregory Nojeim ?: One of the things that was most surprising to me was in the revelations was that companies know when the government made demands on them and they must meet these requirements. The law requires that they return data in response to these requests. What really struck me is that in addition disclosures that came through the front door - the NSA was essentially tapping the companies themselves. He went out the back door intercept the flow of data between corporate data centers they had located to provide a service that was best for their users. It really struck me that they were using executive authority to obtain these data instead of passing through the front door and saying, "We have a suspicion about that person. You must return the data "

Michael Petricone :. I think it is a good summary of what we know Yes

Marvin Ammori.: Can I just disagree on a point

Michael Petricone:. Ok

Marvin Ammori: Not really disagree, but a clarification

Michael Petricone: .. course

Marvin Ammori: Although it did make us safer, it is a kind of compromise. This compromise class between freedom and security. Our founders gave us the Fourth amendment protection against unreasonable search and seizure probably realize that probably make some people less safe. It is a compromise in a free society . You can move all the way to a totalitarian police state, have added security, but we chose not to go in that direction. Just wanted to say that even if there were some examples of terrorists being taken we always want to ensure that the compromise is worth it

Michael Petricone :. I think it is a good summary of this knowledge yet. Let me change the subject. Given this information, let me go to Ron, what has been the impact of the company? The impact on your business practice firms and others in the hospitality industry and why

Ron Yokubaitis :. The practical impact is that it was five years ago, we were tired of talking to people and being watched as nuts. Of course we are from Texas, so we're a nut from the right wing. You are a lover Alex Jones he is a very interesting man. Nevertheless, we talk about it and people would go, "You're being watched. AT & T is surveilling you. Verizon survelling you and you gave them permission to your length of service. You may need to be a lawyer for Telecom understand the words, but you give them permission. of course, since we do not have an open Internet, we have an Internet monopoly, you had no choice. but what we did, recognizing the reality, "what we going to do about it." We have put the company in Switzerland. Because you're not going to buy from us, good Europeans. Because they understand. We, Americans can be dodos and believe that our government, "Hi, I'm from the government. I am here to help you. We will regulate the Internet and give you transparency, "and all this yammer. We were going to sell encryption to people. We in Switzerland. Now we are in one hundred and seventy countries. The world wants. Mr. Snowden woke everyone until you can run on the Internet you can not hide If they want you, they will do you -.... Osama bin Laden they surveilling us all the time what will you do about this? We in Switzerland and now they will have to talk to a Swiss judge. Not me. talk to the judge

Michael Petricone :. Christian, let me come back again . same question, the specific terms, how businesses are being affected by hosting this what happens

Christian Dawson: I can tell you a little more my business and that the numbers are a little staggering. Our company has been around for nineteen years. Historically, we have seen more business from outside the United States than in. At about 60% of international business and 40% of US-based companies. Last year 70% of our business was US-based company that you talk about a dramatic change in form 60% of our business is international usually 30. I firmly believe that this can be directly attributed to what is happening with the NSA revelations and frankly how the world is in marketing around these revelations

Michael Petricone :. Just to have an idea of ​​the room. How many of you represent companies that host or data are cloud providers? Put your hands. Good, keep your hands. Now, how, with your hand, if your company has lost a client or a special occasion because of government surveillance practices. Ok, that's a good number. Greg and Christian, are demanding customers? What do customers want? Do they want better protection? Do they want insurance? Are they simply pull their data off and put it in another place

Christian Dawson: We are really lucky if a client tells us what they think. Customers can move their business in two mouse clicks. We have really anecdotal evidence on a number of things like that. But when the big like that, the form of 60% to 30% of international trade we feel like, "Yes, they are really demanding more privacy." More transparency about how their data is managed. We try to reinforce to the plate and give them

Michael Petricone :. Ok, we'll talk about what happens in the legislative responses DC, legal answers. let's start with Michelle. the Congress is now actively considering legislation to restrict the power of the NSA. most prominently the law on freedom USA and other measures such as the Act on amendments to FISA. can you give us in terms of lay men, a preview of what they would and would they solve the problem

:. Michelle Richardson of course. this bill was presented the . last fall is now passed by the House with bipartisan support - Many cosponsors. He started in a much broader form, right? To deal with many different revelations, but it was narrowed and this is what remains. The phone program will continue in a much smaller form. All laws in foreign intelligence statutes that allow the government to request documents and digital information without a warrant, right, this is not the content, but all the data stream and stored records must be based on selection conditions. These are not narrowly defined, but the idea was that you can not go to a company and say, "Give us everything literally. Each download from one day to the NSA. "We will come to you with a sort of request and it becomes to ensure that all groups wanted. We wanted them to focus on specific people. Maybe you go out, a ha, to see their associated, but not more than that puncture all. It leaves some things to be desired. We would really like, say exactly the term selection. It sounds like a name, an account number an installation. something much more specific. I think one of the things that bothers me most with revelations is that they misled the courts. the courts are permitted things that Congress and the public never considered. Even the ACLU got worked up about it. So now we have to be incredibly specific about what we need. There is no mandate, perpetual secrecy mandatory progress. it must be targeted. it is now in the Senate. It will be in the committees of intelligence and judiciary and we ask them to be much more accurate. Back to the idea that you start an investigation with a seed and you go out there, but there are bigger grabbing all the data

Gregory Nojeim :. One of the important things about the law is that it does not address your problem, Christian. Your problem is that if you can not get foreign clients because they are concerned about the security of communications they have - and this bill is not. He really treats domestic use of these authorities. For example, the program that allows the government to target a person abroad because they are a person abroad. That's all. This is the norm. It is not affected by this bill. It will not be useful for companies that want to give assurances to those who are abroad

Michael Petricone :. Friend and Marvin, let me just rephrase the question. The law on freedom, as now, the answer here and if not what should be done? Amie

Amie Stepanovich :. course. I think the US Freedom Act, as it is currently out of the house must be strengthened. It does not allow some of the terms we use in D.C. It does not allow bulk collection, necessarily, you can not win everything, but it allows the bulky collection. As in, you might be able to set and get all 305 Miami which is highly worrying and I think it should be narrowed down. And I wanted to touch base - it is actually another moving part by Congress, not USA Freedom that I want to highlight just because it might be of interest to people in this room. I started talking about cryptography and encryption standards. In fact, when this revelation came out NIST, which is the only acronym I promise I will use, it is the standards body in the United States on encryption, said they did not know and could not legislatively not know because, by law, they must consult the NSA on encryption standards. They should get feedback. There is now a proposal that has passed the House Committee that will hopefully be on the way to the floor of the house, saying that NIST does not have to consult the NSA. They hit this requirement of the law is a huge step forward and means that the NSA, in small part, will be taken on encryption standards. I think we will see much more movement on that front. Accesses have pushed for greater use of encryption by enterprises. We actually Golden Frog as one of our supporters, saying that more information must be protected

Michael Petricone.? Ron

Ron Yokubaitis: Yes. Following the remark by Amie. The encryption standards are already compromised as soon as you talk about it. The surveillance state is going to work and break it. What is the one thing we do and I encourage, I was talking to LinuxFest last week. It was a response to one of the connoisseurs of the audience. It was a rather high dense environment geek. What about "Come together and agree on certain standards and open source? My feeling was that simply serve it on a platter.

VyprVPN App Updated :. Automatically connect to the server faster and more

3:59 PM Add Comment
VyprVPN App Updated :. Automatically connect to the server faster and more -

The latest version adds new VyprVPN interesting improvements on Windows, Mac and Android

faster server Option

If speed is your priority, you can now choose "fastest server" and the VyprVPN app automatically determines the fastest server and log in. you can also use "fastest server" in combination with automatic reconnection to ensure you always connect to the fastest server with each new VPN connection.

Fastest Server

Desktop Notifications

the latest version includes the ability to receive connection VyprVPN updates directly to your desktop on Windows and Mac. Learn when your online status changes without ever opening the application or stop what you are doing.

desktop_notifications

VyprVPN Control for Windows from the Jump List

VyprVPN for Windows can now be controlled from the shortcut list. Log on or open parameters, without ever opening the application.

Windows Jump List

All these features are part of our goal to make the management of VyprVPN as easy as possible. For a complete list of updates included in this release read our changelog.

Head over the Golden Frog forum to discuss. Participation in the forum helps other users and allows us to quickly deliver your comments to our development team. Discuss this version, start your own topics and help us continue to develop the features you want. As always, if you have an idea for a new Golden Frog ideas visit functionality to submit and vote for ideas on any product Golden Frog.

From Threatpost: EFF Calls Out ISP to change StartTLS Encryption Controls

2:58 PM Add Comment
From Threatpost: EFF Calls Out ISP to change StartTLS Encryption Controls -

as net neutrality debates swirl, privacy advocates at the Electronic Frontier Foundation and the Golden Frog VPN provider has made public filing a Federal Communications Commission that got more attention to accusations that Verizon FIOS customers had their streaming service Netflix throttled back

Read the full article :. EFF Calls Out ISP to change StartTLS encryption controls

Golden Frog Website Upgrade to HTTPS to defeat the Chinese blocking via Deep Packet Inspection

12:56 PM Add Comment
Golden Frog Website Upgrade to HTTPS to defeat the Chinese blocking via Deep Packet Inspection -

Last week, China has updated the Great Firewall and blocked our service VyprVPN. As part of this latest attack, China has also blocked the Golden Frog website. We are pleased to inform customers that we moved the Golden Frog HTTPS marketing site to unlock our website for users in China. Our registration systems and customer control panel have been protected by HTTPS and now we have extended this protection to marketing sections of our website. Please use the following URL to access the Golden Frog website:

https://www.goldenfrog.com

"It appears that China is using Deep Packet inspection (DPI) to analyze web traffic in clear text through the great firewall. When the Chinese IPR equipment considers requests for the Golden Frog websites they block. blocking by DPI is different from a block block traffic or DNS network, because it inspects the underlying web content. Even if the site moves to another server or network, the China IPR speed still reads packets up to the new location and block traffic. by converting the entire site HTTPS, not only all of your safe browsing, but China can not inspect traffic and block specific applications for Golden Frog. We are actively working on other solutions, but spend our HTTPS website is a solid first step that should clarify the issues for most users trying to access our website to register or manage VyprVPN "Yokubaitis said Sunday, President Golden Frog.

We welcome customer feedback and invite users in China to share their experiences in our forum: http://forum.goldenfrog.com/t/access-from-china-share -Your-experiences / 576/41

Port Selection Now Available for VyprVPN for Desktop!

11:55 AM Add Comment
Port Selection Now Available for VyprVPN for Desktop! -

ports-protocols-featured

We have many exciting things to come for VyprVPN, one of many to Port Selection, now available for VyprVPN Windows and Mac!

Why use Port Selection?

Before VyprVPN used the default port when attempting to establish a VPN connection. There were times when some countries, universities, or other sources others will hang or strangle the port, which compromises the ability of our users to connect successfully and encrypt their Internet connection. This new functionality that we have developed in the VyprVPN for desktop applications solves this problem and allows users to access a wide range of UDP ports so that they can overcome the blocking of intentional port or throttle. Get the VyprVPN connections more consistent and successful using the port selection with OpenVPN protocols or Chameleon.

We have more robust port selection options on our roadmap (as well as other new features) so stay tuned!

port selection is only available for the Pro and Premier plans. If you want protection for your Internet connection while at home or on the road, try VyprVPN with our free 3 day trial. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

Remember that you can visit Golden Frog ideas to share your product ideas, feature requests and recommendations. We look forward to reading your ideas.

From The Daily Dot: Encryption is the second amendment to the Internet

10:54 AM Add Comment
From The Daily Dot: Encryption is the second amendment to the Internet -

Encryption Second Amendment for Internet

This article was originally published on the Daily Dot

on Sunday Yokubaitis

last week, FBI Director James Comey again campaigned for "backdoors" in the high-tech enterprises encryption programs.

"Tech execs say privacy should be the paramount virtue," he said in the House of Representatives Appropriations Committee. "When I hear it, I close my eyes and try to imagine what the world looks like where pedophiles can not be seen, the kidnappers can not be seen, [and] drug traffickers can not be seen. "

the US government playing to fear, uncertainty and doubt. the reality is that the government already collects a huge amount of personal data on its citizens through our location data phones give away, the national security Agency program metadata and purchasing habits online without our consent.

Encryption is how privacy-conscious Internet users to fight against the eye impassive mass government surveillance and protection online. Even if the NSA can break some encryption technologies, we at least make it more difficult and more expensive for them to follow citizens law-abiding mass . When Comey application backdoors, it's really just asking to do its job easier with questionable benefits and serious risks.

We must protect encryption because backdoors are inherently insecure.

A backdoor is a security vulnerability deliberately introduced into an otherwise secure ecosystem. The Federal Bureau of Investigation is trying to divert the public into believing in the existence of some, abuse-proof backdoor secured by magic. This may be theoretically possible; However, in the real world, it's just not. Make encryption correctly is hard enough without Comey or backdoors asking the NSA. Although most accomplished experts in cryptography that I will tell you that there is no such thing as a secure backdoor.

Backdoors are based on knowledge. He who knows the secret can blow open the secret door, but the door does not care who knows the secret blow. The problem with secrets is that they eventually become known outside their circle planned. If the FBI (or someone else) had all backdoors in encryption technologies, they would become the target of every spy agency and malicious hacker on the planet. After the coup the secret was hacked, leaked accidentally posted, or made known by sheer incompetence, anyone FBI or otherwise-could use.

We already have evidence that backdoors built for the good guys are commonly used by the bad guys. In 2010, Chinese hackers subverted a Google Gmail system designed to meet the US government surveillance requests. The bad guys can and do steal the gold key.

Imagine, despite everything the experts tell us that somehow it was possible to design a back door that would open encryption without being exploited by hackers and criminals. We would still be to thank you from the FBI and the NSA, organizations have access and analyze the data of its citizens without their knowledge and without trial.

Encryption is not an obstacle to national security. Golden Frog, where I serve as president, and others in the tech community who care about in online privacy, are not anti-law enforcement. We are not interested in jeopardizing national security. We believe in protecting the customers who rely on us for their Internet connection, ensuring that the data they send and receive is encrypted and protected from prying eyes. This data belongs to them; it is their property. It is not for us, an Internet service provider, or the government.

The government did not need a golden key to decrypt it. If you want the data, do not ask for a back door. Instead, get a warrant and go through the door. We need due process, probable cause, a real judge, and not a money backdoors.

When Comey talking about encryption, it sounded as if the bad guys use a great tool to avoid detection by law enforcement. This is a perception that we all need to work together for change. Using encryption does not mean that you have something to hide

In the South last year by the Conference Interactive Southwest, NSA whistleblower Edward Snowden said: "Encryption works"

[

It is true. It is a best practice to give you a reasonable level of privacy and online security. encryption is a form of self-defense. Privacy-conscious people use it to protect their internet communications and private information from hackers and the government and the intrusion of the company. the companies encrypt confidential information such as trade secrets and customer data.

If you encrypt your digital communications, you should be celebrated. you are the good fight. you should not draw suspicion FBI or NSA. in the same way that firearms are synonymous with second amendment and protect yourself, using encryption to protect your data should be a fundamental right. Encryption is the second amendment to the Internet.

Sunday Yokubaitis is the president of Golden Frog, a company that fights for online privacy and open a free and safe Internet for people worldwide.

MyRepublic Partners with Golden Frog to improve online privacy for its guests

9:53 PM Add Comment
MyRepublic Partners with Golden Frog to improve online privacy for its guests -

VyprVPN, VPN fast and stable personal service, is available to customers in a bid MyRepublic special

Singapore - June 22, 2015 - MyRepublic, a provider of ultra-fast Internet services in Singapore and new Zealand, today announced a new partnership with online privacy and security company, Golden Frog. MyRepublic offer its subscriber base with a special discount for VyprVPN Golden Frog, one of the fastest personal VPN services and most respected in the world.

MyRepublic subscribers can get VyprVPN with 1GB of free data usage per month recurring, and get 25 percent off an annual subscription VyprVPN, which is $ 75 (USD) per year after reducing applied.

"Internet users come to MyRepublic because they expect more from their Internet service provider," said Cedric Gouliardon, CTO and Chief Product MyRepublic. "They know we're an ISP that allows consumers VyprVPN is a natural fit in the ecosystem services we provide -.. A hassle free manner and reliable to help keep their private online activities, secure and safe"

Golden Frog owns the equipment at each of its 54 VPN server locations worldwide. It manages its own network to provide fast and reliable VPN connections. VyprVPN encrypts Internet connections of users and allows them to thwart spying data and Internet traffic monitoring that is regularly practiced by Governments and data snoops. By encrypting the "last mile" (the connection between the camera / computer user and the Internet backbone), users can better ensure their privacy online and open an uncensored Internet and secure, no matter where they are in the world.

"commercial vendors worldwide have been making user traffic throttling disappear, not providing the speeds they advertise, collection and monetization of their private customer data, and provide a poor customer service for too long, "said Sunday Yokubaitis, President of golden Frog." that's why it's so nice to see an upstart like MyRepublic which offers a multitude of services to optimize the customer's online experience. I think VyprVPN, guests will be a nice addition, and will be happy that they are able to get a reasonable level of privacy online without sacrificing performance. "

MyRepublic is a pioneer Internet service provider provides ultra-fast fiber broadband services to consumers and businesses. Based in Singapore, he operates the Singapore Next Gen NBN, and believes in offering more to help people every day to unleash the full potential of the Internet

VyprVPN will be available to customers immediately MyRepublic: . Http: // bit.ly/MyRepublicVPN

about Golden Frog

Golden Frog is a global service provider committed to developing applications and services that preserve an open and secure Internet, a mission that continues to grow in importance as users worldwide threats to privacy of the face. With users in over 195 countries, Golden Frog owns and operates server clusters in North America, Europe, South America, Asia and Oceania. Golden Frog owns and operates 100% of its own servers, hardware and global network to ensure the highest levels of security, privacy, and service delivery. Golden Frog offers a comprehensive reseller program that provides the best VPN service and trafficking for resellers and their clients. The company also offers VyprVPN for companies to protect corporate communications, identity and data, and Internet connections secure employees in the office or on the road.

More about Golden Frog's vision for a free and open Internet by reading our "peace, prosperity and the case for open Internet" vision paper located www.goldenfrog.com/vision .

About MyRepublic

Purpose built for the fastest Next Generation National Broadband Network (NBN) in 2011, Internet Provider MyRepublic service continues to redefine the level broadband fiber services in Singapore and the region. After launching in New Zealand and Australia soon, MyRepublic continues to push the boundaries with its innovative services and consumer-centric with its latest sites established in the mobility market of Singapore.

Golden Frog Adds its first servers in the Middle East

8:52 PM Add Comment
Golden Frog Adds its first servers in the Middle East -

Privacy Company Online Adds VyprVPN server in Bahrain, Qatar and Saudi Arabia

MEGGEN, SWITZERLAND - July 16, 2015 - Golden Frog, a company that fights for online privacy and an open Internet, announced aujourd 'hui that it has added its first server locations in the Middle East. Three VyprVPN servers were installed in Manama, Bahrain; Doha, Qatar; and Riyadh, Saudi Arabia. An additional location will be added soon in Dubai, UAE.

These new server locations nearby provide a connection point for Internet users in the Middle East looking to get out of restrictive censorship of the Internet in the region. Many Internet service providers in the content of the regional bloc, including politically and culturally sensitive materials. In some areas, the popular VoIP services such as Skype are also prohibited.

"The struggle for freedom of the Internet continues to be a major problem in the Middle East," said Sunday Yokubaitis, President of Golden Frog. "With the addition of several Middle Eastern server locations, VyprVPN will open access to new information and raise the curtain of censorship that has plagued the region for so long."

customer

VyprVPN now have access to over 700 servers in 50 locations across North America, South America, Europe, Asia and Oceania. They get bandwidth speeds and unlimited access and are able to switch between servers worldwide without restrictions. Each site is compatible with all VPN protocols: PPTP, L2TP / IPsec, OpenVPN and technology VPN Own Golden Frog, Chameleon. In addition, Golden Frog offers VyprDNS each location VyprVPN server. . VyprDNS is a zero DNS service knowledge for VyprVPN users who thwarts Internet censorship, carried no record of hostnames and offer superior geolocation DNS

For more information on these new server locations , please visit: http: // bit .ly / 1J2eM15

A complete list of server locations can be found at: http://www.goldenfrog.com/vyprvpn/features / vpn-server-rental

for more information on VyprVPN, please visit: http://www.goldenfrog.com/vyprvpn

about Golden Frog

Golden Frog is a global services committed to developing applications and services provider that preserve an open Internet and secure, a mission that continues to grow in importance as users around the world threats to privacy of the face. With users in over 195 countries, Golden Frog owns and operates server clusters in North America, Europe, South America, Asia and Oceania. Golden Frog owns and operates 100% of its own servers, hardware and global network to ensure the highest levels of security, privacy, and service delivery. Golden Frog offers a comprehensive reseller program that provides the best VPN service and trafficking for resellers and their clients. The company also offers VyprVPN for companies to protect corporate communications, identity and data, and Internet connections secure employees in the office or on the road.

More about Golden Frog's vision for a free and open Internet by reading our "peace, prosperity and the case for the Open Internet" guidance document located www.goldenfrog.com /vision.

I Am Anonymous When I use a VPN - 10 myths debunked

7:51 PM Add Comment
I Am Anonymous When I use a VPN - 10 myths debunked -

We just go out I'm Anonymous When I use a VPN - 10 myths debunked in "Take Back Your Internet "of our website. This is an updated version of our 7 Myths Debunked section of last year, with three new myths for 2015!

The 10 myths Debunked article explores the disturbing trends we saw in the VPN industry, especially VPN providers offering services or "anonymous" "not logging "while offering little (if any) transparency on the user data, they can access and what they actually do with it.

We hope to dispel some of these common myths lead to a more transparent and frank discussion on privacy in the VPN and the Internet industry in general, and we will share these myths in a series of blog posts over the coming weeks. To get things started, here Myth # 1

Myth # 1 :. I can be anonymous on the Internet

VPN Myths Anonymous

reality you are not anonymous when you are online, even using tools confidentiality. Privacy is a more realistic goal that anonymity

What Golden Frog :. Golden Frog VyprVPN does not publish that make you anonymous on the Internet. Instead, we say that it greatly improves your privacy and online security.

More information Myth # 1 here!

The Truth About Logging

6:50 PM Add Comment
The Truth About Logging -

We share two of our VPN myths this week - Myth # 4 and Myth # 7 . Myths This week is all about logging, and explain that the claim 'no newspapers "really means and why logging is not always a bad thing.

VPN Myths Logging

Myth # 4: if the privacy policy of my VPN provider said they "do not connect," it means that I am anonymous

:. reality When a VPN provider just said in their privacy policies they carry "no record" does not guarantee online anonymity or privacy

what Golden Frog does :. Golden Frog is transparent about what data we keep, and we log a minimal amount of data and will keep for 30 days

VPN Myths Logging

Myth # 7 :. Any VPN logging is bad.

reality :. by connecting a minimum amount of data VPN providers can greatly enhance your experience when using a VPN

What Golden Frog Does We keep only the minimum amount of data to run our business, and delete it as soon as we do not need (30 days). We have our own servers, run our own DNS (VyprDNS) and manage our own network. Golden Frog is incorporated in Switzerland, offering privacy laws in favor line we use to protect users.

More information Myth # 4 and # 7 Myth!