Web censorship in China Borders Innovation Startups

8:14 PM Add Comment
Web censorship in China Borders Innovation Startups -

China Censorship Curbs Innovation

There is a saying that innovation in the Chinese IT industry stopped after 05. When you compare the value of Chinese companies and the United States market, it is clear that iT companies in the United States continuously emerge over time. These companies respond to consumer needs and wants in a variety of niche and market segments even after giants like Google, Amazon and Facebook have entered the market. In China, however, the market is dominated by a few big players - Baidu, Alibaba and Tencent, also known as giant BAT - and no significant new companies have entered since 05.

What happened in 05?

is now you have probably heard of the Great Firewall (GFW), a barrier that prevents Chinese Internet users to easily interact with the outside world. Unfortunately, the great firewall is just part of the overall control strategy of the Chinese government. The official name for the entire complex infrastructure monitoring and censorship is called the "Golden Shield", which is apparently a way to keep hackers and other rogue elements to harm the Chinese Internet. The Golden Shield project aims to monitor all levels of information flow in the country and across the borders of China. It was in 05 that the great firewall completed his first term building and started full operation, which is identical to the timing when new companies have ceased to enter the market.

So how the Great Firewall is the influence of the Chinese IT industry?

Web censorship pushes competition from powerful international companies and gives local actors some room to maneuver, but an alarming result of censorship is that the giants of home computing form monopolies. These monopolies control the market and acquire startups when they spot a good idea, making it very difficult for new firms to enter. For example, Baidu now dominates 80% market share of search engines from Google left China because of censorship. Youku has prevailed since YouTube is blocked. And it is in the same situation with Weibo, because Twitter is blocked. The Internet connection was strangled Dropbox that nobody uses, and accordingly Seasun has become the leader in storage service providers online. So every startup business must ask a question: What would I do if one of the giants of BAT comes after my ideas and my copy products

Monopoly is not entirely made following online censorship, of course. Chinese regulations are still in the process of exploration and development, and are not effective to prohibit monopolies and discern the violation of copyright. On the other hand, not being able to access the latest information and exchange ideas in the world, because of censorship, finally will be a huge loss for entrepreneurs from home. In January 2013, the Chinese government blocked temporarily GitHub, an open-source website where programmers around the world create and discuss projects, which is also home to many Wall Software escape. "GitHub is the main tool that programmers learn and keep track of international trends ... censor Chinese programmers only result being left, losing competitive edge and vision," said Lee Kaifu by, founder of Innovation Works Beijing-based-has innovation incubator. at various times, the Chinese government has blocked similar technical websites, including Python, Google Code and Mashable. GitHub was released a few days later, after the huge protest on Internet, but the potential to be blocked always exist for each and every site.

the pervasive web censorship in China also increases the operating cost of startup businesses. It does not affect the common costs such as equipment, lease or rental, but greatly increases the costs associated with research workarounds to bypass the huge censorship of the national Internet of China.

huge impact

the impact of the Great Firewall is beyond imagination. Access to an open and free Internet in the country is necessary, especially as the Chinese government plans to achieve industrial transformation and relies on the growth of high-tech companies. It is imperative that people are able to escape the Internet restrictions in China that have harmful effects on individuals and businesses.

Chameleon Golden Frog VyprVPN allows users to circumvent Internet censorship in China and worldwide.

Try VyprVPN free now.

learn more about the Great Wall of China, or share your thoughts in the comments below.

Microsoft WFP API, and how we use them to Golden Frog

7:13 PM Add Comment
Microsoft WFP API, and how we use them to Golden Frog -

One of our software engineers offers a high level overview of the MAP and how we integrate this technology into our products.

What is WFP?

WFP is Microsoft's API to the network stack. It stands for "Windows Filtering Platform."

Microsoft WFP Overview

The primary organizational unit within WFP is the concept of Layer . When network traffic passes through the network stack in Windows, it follows conceptually way through a set of layers where the path is determined by the type of traffic it is.

connecting the layers Cales or components that move traffic between layers and act on screening decisions made in the core layers. It is the decision of the blocks that determine the layers of a particular packet of network traffic through.

In the layers are Filters that match specific traffic based on a set of conditions, and flag traffic to be allowed or blocked at the exit of the current layer.

Filters are organized in layers and sub-layers. underlayers can be considered as the components of a layer that actually hold filters, or as a filter attribute from the undercoat is registered globally rather than a base layer. Either way you want to see when traffic is measured in a particular layer in each sub-layer is evaluated, and if all the indicators of the undercoat traffic to block, it is abandoned by the hold on his way out layer.

In an underlay all filters are guaranteed to be evaluated. Specifically, they are evaluated in order of highest weight to lowest weight, where weight is a given value of the filter when it is created. If flags filter traffic to be blocked or allowed, that is the decision of this underlayer and no other filters in the underlayer are evaluated.

Microsoft WFP Layer
Microsoft WFP Sub Layer

How Golden Frog uses WFP

Golden Frog WFP uses for his Kill switch, protection against leaks DNS and IPv6 features protection against leakage. That's what we do.

We make a custom layer for each function. This means that if a feature does block traffic will be blocked even if explicitly authorized by another function or permitted by other software (such as Windows Firewall).

We priority filters to allow traffic, we want to allow. They are the exception, and apply to the types of traffic that we want to afford even if they fit the general description of the traffic that we block. For example: for IPv6 loopback traffic in the IPv6 filter protection against leakage, which allows connections to our VPN and DHCP servers in the Switch Kill function, allowing connection your VPN DNS server specified in the DNS leakage protection function.

We put a lower priority filter to block traffic that we want to block. These are the main case. Kill has filters that block all traffic, protection against DNS leak has filters that block all traffic and IPv6 DNS leakage protection has filters that block all IPv6 traffic.

Since we use our own sub-layers, if the end result of these filters is to block traffic, it is abandoned by the hold when leaving this layer. Then all that remains is to choose the layers where we can do all these filters and intercept all traffic.

Like this post? Leave a comment below. And be sure to keep an eye on other technical blogs of our development team to come soon!

Read more about the product Golden Frog VyprVPN.

BGR: Some ISPs block Apparently Encryption

6:12 PM 2 Comments
BGR: Some ISPs block Apparently Encryption -

The study of service provided by a wireless broadband service provider, Golden Frog has found that that supplier is able to interfere with the ability of users to encrypt their e-mails or other forms of communication

Read the full article :. Some ISPs block Apparently Encryption

Hosting We AMA on reddit

5:11 PM Add Comment
Hosting We AMA on reddit -

Update: Our AMA has been postponed - we will during the month of January, so you have! even more time to get your questions ready! We will keep you informed of our new date as soon as it is determined.

Original Post

Have a question for us? You are lucky! President Sunday Yokubaitis Golden Frog will host an AMA (Ask Me Anything) on ​​reddit to Thursday, November 12 at 14 pm EST.

This is your chance to ask him questions about Golden Frog VyprVPN VPN product our staff or anything else you like!

We will post the link to the AMA on our Facebook and Twitter pages to 12, so be sure to check at the time and join our AMA. In the meantime, visit our Vision and About Us pages to learn more about Golden Frog and mission for the privacy of the Internet, security and freedom.

Golden Frog is a reddit Gold partner, and our VyprVPN for business services is provided to all employees reddit. More

Recent Posts Sunday :.

Your ISP slows your streaming. Using a VPN to stop

recent Golden Frog Updates :.

VyprVPN overview Android TV

Facebook is in contradiction with the EU ... Again

4:10 PM Add Comment
Facebook is in contradiction with the EU ... Again -

Update - May 6, 2016: The militant European who brought the case against Facebook (detailed below) is reportedly starting a new monitoring group for data protection. You can read more in this article CSM

Original text :. Facebook and Europe have disagreed on various issues related to online privacy in the past, and this week, the disagreement occurs in Belgium.

As reported by TechCrunch, Facebook could face a fine of more than $ 250K (USD) per day because of their use of cookies to track non-Facebook users in Belgium. A case was brought forward by the Belgian Data Protection Agency (DPA) regarding "how Facebook deploys tracking cookies and social plug-ins on third party sites to track Internet activity users and non-users of Facebook. "

The DPA said Facebook has not responded adequately to questions about how it collects and tracks non-Facebook users who visit our site. Accordingly, Belgium decided Facebook can "no longer collect and store information online Belgian residents who do not have Facebook accounts."

Neither surprise, Facebook plans to appeal that decision. it claims its tracking cookies are security mechanisms for users, but it did not explain how.

the decision in Belgium comes in the wake of another historic decision in Europe Facebook . last month, the European Court of justice (the highest EU court) ruled against the Safe Harbor. This decision invalidated an existing agreement between the United States and the European Union that enabled companies move "digital information" between the two locations Tech giants. - like Facebook -. a greatly benefited from the Safe Harbor

Facebook has also been in the news earlier this week when he announced that it is new facial recognition feature. However, there was much question if Europe will allow the function ,. They previously rejected facial recognition software in 2011, and when they finally made the implementation of the technology in 2014 made a limited way.

We have joined forces with Internet Infrastructure Coalition

3:09 PM Add Comment
We have joined forces with Internet Infrastructure Coalition -

We are delighted to announce that we have partnered with the Coalition of Internet infrastructure (i2Coalition)! As part of this partnership, i2Colition members can get the VyprVPN service with 1GB of free data for the first month and 500 MB recurring in the following months, more than 25% on annual plans. Click here to access this.

Golden Frog and i2Coalition worked together on initiatives for some time, and our views are aligned on many issues related to the Internet. We both strongly support the encryption protection, eliminating government oversight and the fight for an open Internet. Recently, we joined i2Coalition (and many others) to support the Save Crypto petition. In 2014, we also worked with i2Coalition to submit comments to the FCC to fight against open access. We are delighted to formalize our partnership and offer i2Coalition members another tool to protect their Internet connection, privacy and online security.

More About the Coalition of Internet infrastructure

i2Coalition is a protecting group of industry infrastructure of the Internet. They were founded in 2012 by a diverse group of Internet infrastructure companies, and support and represent those who build the nuts and bolts of the Internet. i2Coalition founding and charter members joined forces during the successful effort to stop SOPA and PIPA become US law. After mobilizing to ensure the free flow of Internet information and commerce, they realized the ongoing need a voice in the industry. The i2Coalition has made great progress on initiatives that affect the industry and the Internet as a whole - issues such as open access, mass surveillance, cybersecurity, patent reform, privacy customers, the IANA transition and Internet governance. You can learn more about: https://www.i2coalition.com/

Tis the season to ... Tech Toys and risks of privacy they bring

2:08 PM Add Comment
Tis the season to ... Tech Toys and risks of privacy they bring -

is the toy season! We shopping for games, stuffed animals and dolls barbie ... espionage?

People are increasingly aware of the concerns of online privacy during the holiday season (and every season!) The importance of securing your Internet connection when purchase online, the need to use a VPN while traveling and connecting to public Wi-Fi networks. But there is another emerging concern this holiday season - the safety of popular technological toys are bought for children

Stimulated by the recent news that VTech, an electronic learning company, suffered a cyber attack, there have been growing concerns. the security of high-tech toys and what information they are collecting and sharing on children who use them. For VTech, the company announced that "five million customer accounts and profiles of children associated around the world" have been compromised, including information such as names and birthdays, email addresses and mailing and details on the behavior of the user. to gather more alarm, it was reported that it was possible to determine the family home / address using the compromised information. the information of more than 3 million customers Hello Kitty was also violated recently when an online database including names, dates of birth, gender, e-mail and password advice was discovered. much of this information probably belongs to children.

a conversation started about the issue of privacy and technology toys for children, with experts, concerned parents and toy manufacturers weighing. As reported in the Washington Post, Jeffrey Chester Executive Director of the Center for Digital democracy, described the problem "companies of toys are rushing to cash in on the changing nature of childhood to Big Data era where Internet connected toys are connecting children to a extensive monitoring network. " He continued:

"These toys can watch their every move, turning what should be a harmless and enjoyable experience into something potentially more sinister.

As technology becomes ubiquitous part of our lives, it is important that we remain aware of how our devices work and the implications of their use of privacy. As stated in an article in the Huffington Post, "As VTech incident showed us the" benign ", toys and Wi-Fi enabled devices acute for consumers with clever marketing by large enterprises have a dark side. If consumers value privacy within their homes, they need to think twice before putting any of these smart toys and gadgets in their carts and under the tree. "

We took a look at some of the hot tech toys of the year, in an effort to bring some awareness to the issue.

the Tech

toys

Hello Barbie

recent Mattel, Barbie high Tech - and one of the alarm causing toys children talk to the doll and he responds. back. the conversations run on Wi-Fi, servers that use AI to analyze and formulate an appropriate response to the child, which is then returned. the data are unsurprisingly stored. Some concerns this doll has been highlighted by the Guardian: "He was the ease with which the doll was compromise that was of most concern. The information stored by the doll could allow hackers to take control of a Wi-Fi network, and from there to access other devices connected to the Internet to steal personal information and cause other problems owners, potentially without their knowledge. "

teddy bear or monkey smart

Similar to Barbie, this plush toy is marketed as an" interactive learning toy "that speaks to children and remembers what they say. Officials say it will not send voice data over the Internet. Instead, the device "verifies a secure server every day to see if any new activities for your toy to learn and remember how engaged a child in every activity."

LeapPad Platinum with Imagicard & LeapFrog Epic

These tablets for children are educational toys that come with applications, as well as additional Android titles you can download . Since they are wireless connected devices they run on your Wi-Fi network. Many other companies make similar products, and some devices compromised in the hack were VTech tablet for children

How can -you improve privacy

be aware.? Recognizing that "smart toys" can come with risks of privacy is essential, and to understand the implications of privacy can help you make a more informed decision about buying or using these toys

Protect your connection across devices :. Use VyprVPN to encrypt your Internet connection across devices is a good step to take. All intelligent toys work the same way, but a VPN offers more privacy and security when connecting to the Internet - and can help protect your privacy when using applications on your smartphone

Protect your home. As the IoT (Internet of Things) continues to grow, so does the vulnerability of devices in your homes. Protecting your home network, you can protect the devices connected to it. VyprVPN our application router, for example, will secure elements connected to your home network.

There are certainly many things to keep in mind when shopping this holiday season, and as always privacy must be considered. Will you buy tech toys this year? What do you do to protect your privacy across devices? Share your thoughts with us in the comments below

Sources :. Toy Insider, Giz Mag, Common Sense Media, SMH

Open letter Boosts Encryption Backdoors hazard

1:07 PM Add Comment
Open letter Boosts Encryption Backdoors hazard -

The continued strength encryption backdoor continued this week, with the "Secure Internet" initiative. This open letter, initiated by Access Now, has already been signed by more than 0 activists, organizations and businesses. The letter calls on governments to stop pushing for the backdoor encryption and defend the right to online privacy with strong encryption

Distilled in 5 main points SecureTheInternet.org, the letter calls following the :.

  • governments should not prohibit or restrict user access to the encryption in any form or prohibit the implementation or use of encryption by class or type;
  • governments should not impose design or implementation of "backdoors" or vulnerabilities in tools, technologies or services;
  • governments should not require tools, technologies and services are designed and developed to allow third party access to unencrypted data or encryption keys;
  • governments should not seek to weaken or undermine the encryption standards or intentionally influence the establishment of encryption standards to promote a higher level of information security. No government should mandate insecure encryption algorithms, standards, tools or technologies; and
  • Governments should not, either private or public agreement, force or compel an entity to exercise an activity which is incompatible with the principles above.

We are delighted to see so many groups around the world banding together to support encryption, and are encouraged by the news that the Netherlands and France recently rejected encryption backdoor . A Golden Frog, we are firmly opposed to an encryption backdoors, and believe everyone has the right to protect their privacy via encryption. It is essential that we continue to fight against invasive measures pushed by the government, and to continue to build our encryption technology.

What can you do?

  • learn more about the importance of encryption
  • Sign the open letter

Pew Report Illustrates the state of privacy in America

12:06 PM Add Comment
Pew Report Illustrates the state of privacy in America -

Pew Research recently published a study on the state of privacy in America, which revealed very interesting results . We shot a few highlights, and provided resources related to information on matters of privacy and how to protect yourself online. You can also read the full results here for more details on the statistics mentioned below.

general feeling of privacy

  • 91% of adults agree or strongly agree that consumers have lost control over how personal information is collected and used by companies

Read our recent article, "You are the product :. Free's price in the privacy of the growing industry "to learn more about how your information may be used by suppliers of privacy.

personal control

  • "Americans express a constant lack of confidence about the safety of everyday communication channels and organizations that control the"
  • 74% say that it is "very important" to be in control of who can get information about them
  • 65% say it is "very important" to control the information collected about them

do you know how your personal information is used? always make sure to check the privacy policy and understand the information you can give up!

digital Footprint

  • 86% of Internet users have taken online to remove or hide their thumbprints
  • Many people would like to do more, but do not know the tools they could use

Learn how to encrypt your Internet connection to protect your privacy -. nobody can see your "digital fingerprint" or what you do online

transparency

  • Many people struggle to understand the type and extent of data collected about them
  • 47% are not confident in how their information would be used

learn more about the importance of transparency in our article 10 myths.

supervision

  • "Overall, Americans are divided as regards their level of concern monitoring programs"
  • 52% describe themselves as "very concerned" or "somewhat concerned" about government surveillance data of Americans and electronic communications 46% describe themselves as "not very concerned" or "not at all concerned" to about monitoring
  • people who follow the news and debates surrounding Snowden leaks are more concerned with the privacy policy and their own private life than those who did not
  • 40% say it is okay for the US government to monitor communications of American citizens; 57% say it is unacceptable

Learn more about the attempts that the US government making to surveil US citizens through the Act (CISA) the draft Cyberseurity information sharing law.

legislation

  • the majority of the American public believes changes in the law could make a difference in the protection of privacy - particularly regarding data retention
  • 68% believe that the current laws are not good enough in protecting online privacy

Learn about significant law reform ECPA argues that Golden Frog, and the ongoing debate on the backdoor encryption.

Source: All data in this post comes from Pew Research "The State of Privacy in America" ​​

vulnerability VyprVPN users Safe Spark

11:05 AM Add Comment
vulnerability VyprVPN users Safe Spark -

Recently, there have been a number of reports about the vulnerability of a framework for updating Mac OS X called spark popular. The type of security problem associated with the recently discovered vulnerability is a man-in-the-middle attack; an attack that occurs when an attacker impersonates one side of a communication session.

The vulnerability recently discovered in Sparks has raised concerns in some OS X users on the applications that use the Sparkle framework, such as VyprVPN. We want to ensure that our users VyprVPN is not affected by the vulnerability Sparks man-in-the-middle attack. We have provided additional information below.

What is the spark and reported vulnerability?

Sparkle OS X commonly used framework used by applications not downloaded on the App Store for updates automatic applications. The spark vulnerability recently discovered is a man-in-the-middle attack types on the unsecured HTTP communication. Since the HTTP channel for Sparkle updates in plain language this means that the channel could be hijacked by an impersonator to deliver malicious code to users

What keeps users VyprVPN OS X safe from the vulnerability?

VyprVPN uses the Sparkle framework for automatic updates, but is affected by the vulnerabilities for the main reason that VyprVPN only uses HTTPS SSL secure channel for updates day spark . This layer of secure communication can not be diverted or personified in the same way that the unencrypted HTTP traffic.

Why MacOS X users are secured 10.11

Users of Mac OS X version 10.11 should also know that Apple introduced a feature called App Security Transport. This feature allowed connections through HTTP non-secure using the API NSURLConnection unless the developer explicitly stated in the field of application info.plist. Developers are strongly encouraged to use only HTTPS to access Web resources.

Like most HTTP uses are due to existing code, Mac users on until 10.11 and are generally protected against an unsecure Sparkle update in the sense that recovery usually on HTTP resources failure.

best practices to protect you

the best way to protect against this vulnerability and many others are using the latest production version of MacOS X and the latest production applications. Security flaws are detected and resolved by Apple and other software developers regularly. Using the latest versions of your software, you can avoid security holes that the bad guys already know.

If you have questions or concerns, please free to reach out to us support@goldenfrog.com!

Data Retention Laws By Country

10:04 PM Add Comment
Data Retention Laws By Country -

The following table describes the data retention laws in various countries around the world. We created the blog posts with more detail about several of these countries, which can be accessed by clicking on "Learn More" under the name of the country.

CountryRetention DurationCurrent StatusInformation Retained

  • * Time based on the stored information.
  • ** Formerly deemed "unconstitutional", but recently reinstated.
  • *** Scheduled to come into affect in September 2016.
Australia
In Read more →
2 years assets
  • Telecommunications
  • Internet Data
Austria 6 Months inactive
  • Telecommunications
  • Internet Data
Belgium 1 year - 3 years * inactive Telecommunications
Bulgaria 1 year inactive Telecommunications
Cyprus 6 Months inactive Telecommunications
Czech Republic 1 year inactive
  • Telecommunications
  • Internet Data
Denmark 1 year assets
  • Telecommunications
  • Internet Data
Estonia 1 year active
  • Telecommunications
  • Internet Data
Finland 1 year assets
  • Telecommunications
  • Internet Data
France
more →
1 year assets Internet Data
Germany **
more →
10 weeks assets
  • Telecommunications
  • Internet Data
Greece 1 year assets
  • telecommunications
  • of Internet data
Hungary 6 months - 1 year * assets
  • Telecommunications
  • Internet Data
Iceland 6 Months assets
  • Telecommunications
  • Internet Data
Ireland 6 months - 2 years * assets
  • Telecommunications
  • Internet Data
Italy 6 months - 2 years * assets
  • Telecommunications
  • Internet Data
Latvia 18 months assets
  • Telecommunications
  • Internet Data
Liechtenstein 6 Months assets
  • telecommunications
  • Internet data
Lithuania 6 Months assets
  • Telecommunications
  • Internet Data
Luxembourg 1 year inactive
  • telecommunications
  • Internet data
Malta 6 months - 1 year * assets
  • Telecommunications
  • Internet Data
Netherlands 6 months - 1 year * inactive
  • Telecommunications
  • Internet Data
Norway 6 Months inactive
  • Telecommunications
  • Internet Data
Poland 2 years assets
  • Telecommunications
  • Internet data
Portugal 1 year assets
  • Telecommunications
  • Internet Data
Romania 6 Months inactive
  • telecommunications
  • Internet data
Russia 6 Months inactive ***
  • Telecommunications
  • Internet Data
Slovakia 1 year inactive
  • Telecommunications
  • Internet Data
Slovenia 8 Months - 14 Months inactive
  • Telecommunications
  • Internet Data
Spain 1 year assets
  • Telecommunications
  • Internet Data
Sweden 6 month assets
  • Telecommunications
  • Internet Data
Switzerland 6 months - 1 year * assets
  • Telecommunications
  • Internet data
Turkey 6 months - 2 years * assets Telecommunications
UK
more →
1 year assets
  • Telecommunications
  • Internet Data
US 1 year assets
  • Telecommunications
  • Internet Data

What -what Golden Frog does

Golden Frog retains only the minimum amount of data to operate our business and we delete the data as soon as we do not need.

We record the following information and only kept for 30 days:

  • source IP address of the client (usually the IP address assigned by the client ISP)
  • VyprVPN IP address used by the user
  • Log start and stop time
  • total number of bytes used

There. That's all we record. More

Why you should not run on any Wi-Fi public

9:03 PM Add Comment
Why you should not run on any Wi-Fi public -

Ars Technica recently published an article entitled "Why you probably should not do the work on this flight Wi - Fi. "While we fully agree that it is dangerous to use Wi-Fi that does not have an encryption system, we do not think that the article is written quite strongly enough. There are more hidden dangers in the wireless world today!

"pROBABLY"
There is not no doubt about it. If you work for a company you have legal obligations to protect intellectual property, you come in contact with. If you have a family or are part of a community of people, you have a moral obligation to preserve their lives. There is no "probably "in an obligation.

" fLIGHT "WI-FI
the article calls attention to the fact that GoGo and Global Eagle (in-flight Wi-Fi providers) are bad and harmful things on their networks to actively undermine encryption and confidentiality of connections. the article also points out that these services use open Wi-Fi without enable encryption between devices and the wireless access point ( WAP). These two things allow ANYONE with a laptop to run trivially a process for recording all your unencrypted traffic - in fact, Macs come pre-loaded with Apple network troubleshooting tool that can do this in a handful of seconds: tcpdump

Does this mean that you are safe to use Wi-Fi networks that require you to enter a password to login? these Wi-Fi networks are they secure? Not really. When I go to my coffee local favorite, I connect to their Wi-Fi with their password: Then, as I surf and do my work while eating my pancakes, am I protected against such "Pancakes." strange look in the back of the House? Perhaps, not necessarily - but it is never certain. There are a variety of Wi-Fi security protocols a network operator can use, each with varying degrees of security. For most people, there is no way for them to know or even understand how to secure a given wireless network during the entry process sign-on "pancakes." It is dangerous to believe that the entry of a password means that you are protected against eavesdropping. The safest option is to believe that the worst of the wireless Internet that you use and simply, always use a VPN. Even if you pay a fee for access to a Wi-Fi network, you should be wary of what the network operator is doing with your data that might be snooping on you.

VyprVPN
This is why, when I connect to a Wi-Fi network, my first immediate action is to connect to a virtual private network. If I can not connect to a VPN, I usually disable the Wi-Fi on my device and password to my e-book reader favorite for a relaxing moment with a good book. These dangers are very real reasons why we started and developed our Golden Frog VyprVPN product. We saw that the law was not going to protect you, and in some countries, legislation was actively attack your privacy. We have seen that companies providing Internet access to your home, cafes, or even on airplanes, are not going to look out for your privacy is. VyprVPN is born because we believe in the protection of privacy.

What can you do?

If you're traveling or just using the local Wi-Fi at your local cafe or coffee, you have an obligation to your employer, your family and friends, to protect privacy of your Internet activities. Please, use a VPN. I hope you choose VyprVPN, but if you choose a competitor or your corporate VPN is probably fine too; just do your research on privacy policies and understand how the choice of an online VPN provider is affecting your ultimate privacy.

Social Media is blocked - Now What

8:02 PM Add Comment
Social Media is blocked - Now What -

A look at what happened when Uganda has blocked social media sites on February 18, 2016.

INTRODUCTION

Unfortunately, the situations in which social media is blocked around the world are becoming more common. A Golden Frog we believe that everyone should have access to a free and open Internet free of censorship -. This means that when social media is blocked, we jump into action

To illustrate how we respond to these social media block, I 've taken a look at a recent situation where social media was blocked in Uganda. The case study below provides a look inside these blocks that mean to us as a marketing team, and as a global VPN provider.

DAY PACK

7:45 :. We understand that social media is blocked in Uganda

7:50 We check the trusted media and Twitter for new vet. And, it turns out to be true. The government of Uganda has blocked social media as part of their election day. As reported by the BBC why the block is "to ensure that the services would not be used to bribe voters."

08:00 we act quickly, team collaboration to get our answer ready. This includes design images, writing content for our website and the development of social messages. We then select a registration page VyprVPN, so we can provide people in Uganda a way to access a free and open Internet.

blocked social vyprvpn

9:00 am: Within the hour, we're ready to start posting! We publish the content to our blog and social channels, and enter the online conversation using hashtags to trend # Uganda Decides and # Uganda Elections.

vypr_tweets (1)

10:00 :. We continue to monitor the situation throughout the day, sharing several messages and update content as needed

11.00 word travels fast! We begin to see VyprVPN appear in the news and the conversation on social issues. VyprVPN is mentioned as a way to maintain access to social media in Uganda, despite the government block

VyprVPN Uganda Social Media Tweet

12.00 :. now that we are running and the busiest part of our day is over, but the situation is not. We continue for the duration of the block of four days to ensure we reach as many people as possible

RESULTS

  • Our tweet was retweeted 308 times and 153 times enjoyed with great commitment.
  • VyprVPN connections to Uganda rose over 3000% block of the day.
  • Visits to our website from Uganda rose nearly 20,000% after the block.
  • VyprVPN was mentioned by several media and bloggers in connection with the block. A blogger quoted our participation in a blog post on the broader issue of regulation of social media.

CONCLUSION

As a company committed to a free and open Internet, Golden Frog is opposed to censorship and aims to provide access to Internet without restriction. These values ​​are described in our Vision document, and we build tools like VyprVPN to make access to the Internet without restriction as possible.

This case study illustrates the power of VPNs by providing unlimited access to the Internet. People in Uganda who were able to connect via VyprVPN or other virtual private networks were ale to restore their freedom and speak out online in the political process. They were able to participate in the conversation and share their views surrounding the elections, which is a precious right to freedom of expression.

This case also illustrates the importance of quick response in marketing. censorship situations often develop suddenly and unexpectedly, making time and critical response organization. To make the tools available in case of need, we must be ready to respond - from the time before the event started throughout the process to enter the conversation. It was important we worked as a team to coordinate our response and our message quickly. Social media has served as an instrumental tool, which allows us to reach people worldwide.

This illustrates the power of the Internet to connect people. It's pretty amazing to think that we could help people more than 8,000 miles in Uganda social media access. I am proud to be part of a team that cares deeply about Internet freedom, and works to increase the freedom of the Internet around the world.

PARTICIPATE

  • Read our blog from the date of closure of social media.
  • learn more about the case of Access Now.

WhatsApp Adds Encryption Anywhere

7:01 PM Add Comment
WhatsApp Adds Encryption Anywhere -

"We worked for the last two years to give people better security on their conversations on WhatsApp I am proud of our team to hit that stage.: now each message, photo, video, file, voice message that you send, is end-default encrypted end if you and the people you message using the latest version of our app. Even your group discussions and voice calls are encrypted.

people deserve security. It helps us connect with our loved ones. It gives us the confidence to speak our minds. It allows us to communicate sensitive information with colleagues, friends, and others. We are pleased to do our part in maintaining the public information on the hands of hackers and cyber criminals. "

We are very pleased with the decision of WhatsApp to make cybersecurity a priority. A Golden Frog, we offer strong encryption through our Personal VPN VyprVPN, to ensure communication on the your whole devices are still safe.

New EU Data Sharing and Collection Law passenger Privacy Threat

6:00 PM Add Comment
New EU Data Sharing and Collection Law passenger Privacy Threat -

Last week, the EU adopted a share-invasive privacy data plan for travelers entering and leaves the EU by plane. The new law provides not only for gathering information on all passengers flying in and out of Europe; it also facilitates the sharing of information by the security services.

The Plan was approved 461-179 with 9 abstained. The law will share passenger name records (PNR), in order to fight against terrorism in Europe.

"The law requires airlines to provide European security services basic information on all passengers flying in and out of the EU, including names, email addresses and numbers phone, directions, luggage, how they paid for their tickets and passport data. "

This information will be made anonymous after 6 months, although safety can request personal details of specific passengers, if necessary. Data will be retained for five years.

This plan has been in the works for several years. Although there is a two year grace period to get this working system, some predict that it will come into force much faster.

This law was passed at the same time two landmark laws of digital privacy have been adopted in the EU last week, on the heels of recent updates to Google right to be forgotten law. This new PNR law is bad news for privacy for people both in and outside the EU

Sources :. The Guardian and Mashable

Facebook and Instagram blocked in Vietnam in response to protests

4:59 PM Add Comment
Facebook and Instagram blocked in Vietnam in response to protests -

Update - May 26, 2016: As reported in The Verge, the Vietnamese and limited government blocked access to Facebook for a period of four days during a visit by President Obama of the United States. The reasoning for this block - one of several in recent weeks - was to stop the government's critics to organize demonstrations. You can learn more about this decision from Access Now

Update - May 23, 2016 :. In anticipation of the election of the National Assembly of Vietnam, the Vietnamese government is trying to block the "Lá Phieu" mobile application. The government called a "subversive force" sabotage

Original Post "next election". telecoms As reported by the deputy, the government-run Vietnam blocked access to social media sites Facebook and Instagram this weekend. The blocks came in response to events that occurred in Vietnam three consecutive weekends. The protests were triggered by an environmental situation, the "mysterious death of 100 tonnes of fish stranded in poor central costal region of the country last month." The government has blocked social sites in an attempt to prevent people from use them to rally, organize other events and share information

Maintain access to Facebook and Instagram in Vietnam - now .. Get VyprVPN

censorship of the Internet in Vietnam

Internet Vietnam experience is classified as "not free" by freedom on the net, and the government enacts strong censorship and control over the Internet. Vietnam is a "worst jailers of bloggers" in the world, and many bloggers are arrested and prosecuted if their writing does not reflect the values ​​of the government. There are also fines for critical content and speech online.

Vietnam has a law on Internet censorship, Decree 72, which "prohibits bloggers and social media users cited, the collection or summarizing the information of the press organizations or government websites. "the purpose of the law is appropriate to protect national security and violation of the copyright battle.

New "Code of Conduct" of Europe to censor hate speech

3:58 PM Add Comment
New "Code of Conduct" of Europe to censor hate speech -

Several large companies - Facebook, Twitter, YouTube and Microsoft - as well as the European Commission introduced a new code driving earlier this week in an effort to eliminate the hate speech of their platforms.

These companies enact this code in an attempt to fight against hate and terrorism, but the movement has an element of censorship on previously uncensored platforms. Companies will adopt the code by reviewing and then deleting (with discretion) any "suspect" hate speech on their social media sites. As described by TechCrunch:

"The recent terrorist attacks have reminded us of the urgent need to address the illegal hate speech online," VERA Jourová, European Commissioner for Justice, consumers and gender equality, wrote in the European Commission press release. "social media is unfortunately one of the tools that terrorist groups use to radicalize the youth and racist use to spread violence and hatred. This agreement is an important step to ensure that the Internet remains a place of free and democratic expression, where values ​​and European laws are respected. "

the new laws also include communication components. companies will tell users which are not allowed to publish hate content, share best practices and questionable content flag.

Although this movement is intended to be a positive change online, it also raised concerns among defenders of privacy. Some groups fear that "the application too far violate users' rights." This is a concern because "that companies can monitor and remove content just because it is controversial and they feel that they face liabilities, leaving the line, said Ms. Massé. "both Access Now and EDRI withdrew from talks on the code of conduct for their opposition.

code will be examined by the EU justice departments next week, but it is also finalized. the code is not mandatory

Sources :. TechCrunch and CS Monitor

What is the departure of the UK from the EU means for data privacy and security

2:57 PM Add Comment
What is the departure of the UK from the EU means for data privacy and security -

Last day - June 24, 2016: After a close referendum, the United Kingdom voted yesterday in favor of leaving the EU (52% vs. 48%.). As people begin to worry about what will happen to their cybersecurity experts are stating that cybersecurity Britain should not have such a future mysterious and it is predicted that Britain could adopt similar legislation the GDPR (allowing the UK to continue trade with the EU without as many roadblocks). the output of Britain, however, has raised many questions regarding human rights in general (which can include online rights) and whether or not British citizens will lose some rights once the United -um formally pull out of the EU. Sources such as rightsinfo.org help dispel rumors human rights and expose the facts. We will continue to follow this complex issue, because it takes place in the coming months

Original Post :. As Britain today decide whether to remain part of the EU, tensions are high. If the UK vote to leave the EU, they can be removed in several laws and regulations to the EU. However, would the UK still sensitive to European legislation on data protection?

As we have previously reported, the bill investigative powers passed to the British House of Commons this month, allowing the mass surveillance of the residents of UK. The bill is expected to head the House of Lords following for review and amendment before additional vote will occur. Meanwhile, the EU set up their own rules of data protection that are supposedly much more severe than the UK Data Protection Act 1998, which is still in place today. The rules, the common EU data protection regulation (GDPR), were adopted in Brussels in 2015 and come into force in 2018. These rules will apply to each entity using the European personal data, both at the inside and outside the EU. Therefore, if the UK wants to continue to do business with the EU market, the GDPR will impact the processed data. For example, trade between the United Kingdom and the European Union, through personal data flow will be regulated based on the GDPR not current protection laws UK data.

There are also some who believe that the GDPR would be better protection for the UK rather than Britain adopting their own cyber security laws for their citizens, indicating that the UK should want to stay in the EU to help dodge the impending cyber attacks. Brian Spector, CEO Miracl weighs. "The right to privacy is a highly developed area of ​​law in Europe. If Britain should leave the EU, and its extended law of human rights, it is likely to make it easier for future governments to access our data as and when they wish. "He continues by adding that British citizens would have much less protection than their EU counterparts, leaving them vulnerable and subject to cybercrime. A recent study found that a quarter AlienVault British security professionals felt that leaving the EU would risk their business data.

Only time will tell whether or not cyber security in the UK falters based on today's vote. A Golden Frog, we work hard to create products such as VyprVPN, which will never compromise the freedom and Internet security. We hope that whatever path takes Britain today, it leads to the protection of solid data and individual freedom online

Learn more about the impacts of today's vote on UK cyber security and data privacy :.

  • From Tech Europe week
  • From Information Age
  • Solutions From Review

Firesheep Packet Sniffer: new threat to Wi-Fi security

12:55 PM Add Comment
Firesheep Packet Sniffer: new threat to Wi-Fi security -

Using a public Wi-Fi network without VPN just got more dangerous. Firesheep, a new packet sniffers Firefox add-on, it's easier than ever for malicious users to take advantage of unsecured wireless networks in coffee shops, airports and more.

If you're on an untrusted network, a Firesheep user can instantly access your information and activity. Worse, it can take over your identity to access all areas of the sites you visit - as if is you

Here's how it works :.

  • a Firesheep user connects to the same network that you are on
  • He clicks a "Start Capture" button
  • Firesheep has the names and pictures users on the network
  • existing sites accessed by each user are also listed
  • Firesheep user sees through the list and double-click on your photo
  • There is instantly connected as you see what you see

once Firesheep user hijacks your session, you can access data, read e-mails, conduct transactions and participate in communications as if it's you.

We created VyprVPN protect people against such violations of privacy. VyprVPN protects your information from Firesheep by encrypting all communications - even when the site uses SSL.

Protect your connection from Firesheep and other third-party security vulnerabilities on any device, anywhere, with a VPN. Learn more about VyprVPN or VyprVPN get now.

New German VPN server

10:53 PM Add Comment
New German VPN server -

Today we are delighted to announce a new location of the VPN server in Germany!

The new German site VPN server increases the flexibility of Internet travel openly and safely around the world regardless of your physical location. We believe in an open internet and we have work continued to be made to VyprVPN customers more options

The following VyprVPN server locations are now available:

  • Germany - NEW [
  • US - East Coast
  • United States - West Coast
  • UK
  • France
  • Netherlands
  • Hong Kong

to enter the new location of the German server, the Golden Frog VyprVPN customers can simply update their host name:

de1.vpn.goldenfrog.com

beta of VyprVPN App for Windows was released. Download now! Mac OSX and Linux versions are coming soon.

For more configuration information, see our VyprVPN configuration page, or contact Golden Frog Support.

If you are not already a Golden Frog VyprVPN customer, you can sign up today!

New! Mimo Beta v0.2.1 and Mimo Changelog

11:54 AM Add Comment
New! Mimo Beta v0.2.1 and Mimo Changelog -

Golden Frog is excited to release Mimo Beta v0.2.1 for Giganews Diamond members. The Golden Frog Dev team has set many known bugs and reported in the new download engine resulting in increased stability and speed.

The biggest change in v0.2.1 Beta is how processes and Usenet headers stores newsgroups Mimo. Here are some major improvements:

  • download speed head Increase resulting in improved speed with newsgroups browsing
  • population of the initial group is four times faster
  • several fixed blockages and mistakes of downloading
  • Improved image management and header recovery
  • several connectivity issues and fixed startup

to give you easy access to what changed with each release we added Mimo Usenet Browser Changelog. For a detailed list of recent improvements, please visit the Mimo Usenet browser Changelog.

In closing, we thank all those who have reported bugs. Your feedback, good or bad, affect the development of Mimo in many ways. Thank you!

Golden Frog Dev Team

VyprVPN App Version 1.2 Now Available!

9:52 PM Add Comment
VyprVPN App Version 1.2 Now Available! -

VyprVPN App 1.1 Today we are pleased to release version 1.2 of App VyprVPN! This version offers more control over the automatic login features that have been in high demand by members VyprVPN. Now configure VyprVPN App automatically connect when connecting to the computer, the VyprVPN App launches, connection drops, and when connecting to unsecured wireless networks.

The main features of version 1.2 VyprVPN App:

  • App Auto-launch on login :. Configure the VyprVPN App to automatically launch when you connect to your computer
  • Auto-Connect when the VyprVPN App launches :. Configure the VyprVPN App to automatically establish VyprVPN connections when the application is launched
  • Automatic reconnect if VyprVPN Connection Drops: Configure the VyprVPN App automatically reconnect to VyprVPN if your connection drops.

Download VyprVPN App!

You can update to version 1.2 by pressing "Update" in the App VyprVPN.

As always, please subscribe to Golden Frog blog and follow us on Facebook, Twitter or Google+ to stay updated on VyprVPN App.

Welcome to Dump Truck: Part 2 - Dump Truck Web App

8:51 PM Add Comment
Welcome to Dump Truck: Part 2 - Dump Truck Web App -

Dump Truck We recently published Part 1 - Office Tipper trucks of our "Welcome to dump Truck "blog series that covered using dump Truck Desktop to synchronize files from your computer to dump Truck. In part 2 -. Dump Truck Web App, we will cover the use of the Web App to access, store and share your files

Dump Truck Web App

Web App Screenshot

the Dump Truck Web App allows you to download, access and share your files from any web browser. If your computer or mobile device is lost or stolen, all your files are safely stored on Dump Truck servers and can be accessed at any time via a web browser. The Web App is also your seat to control how you share files with friends and family

Sidebar Features

The Web App is designed to be simple -. But powerful.

Web App Sidebar

Directory Folder
You can use the folder directory in the sidebar to quickly browse your files.
Posts
Click on "Send" to view the status of assets and recent downloads.
Favorites
for quick access to the things you use most, simply click the "Star" next to any file. It will always be one click in the "Favorites" view.
Links
Click on "Links" for easy access to all your shared public links. You can see how many links are shared on a file or how many times the file has been downloaded. You can also click on a link to manage and change permissions.

File Uploads supported

The Web App, it's easy to upload an entire folder, including subfolders. Just choose the parent folder on your desktop and start transferring your files. You can also download and synchronize files using Dump Truck Desktop.

Drag, Drop, Done

Web App Drag and Drop

Drag and drop files and folders in the Web App as you do on your desktop. Use drag and drop to quickly organize your files and folders in Dump Truck.

Share with friends and family

Government bonds are a great way to share your photos, videos and files with friends and family. Create a public link and securely share using a shortened URL truck.it or post links to Facebook, Twitter or Google+.

Link Security
Link Expiration Dates
Use expiration dates link to share your file or folder for a limited period of time .
password protection
Add a password to your link to prevent third parties to access your files.
Link Security
Easy Link management
See anything you share in one place. View and configure the connection passwords, expiry dates and labels. Track the number of downloads per link to monitor access.

Hopefully part 2 of our "Welcome to Dump Truck" blog series, you can start using the Web App to access Dump Truck from any Web browser. In the next part of the series, Part 3 - Secure Sharing, we will cover the secure sharing using public links

Please remember that we offer 5GB free accounts so please tell friends and family to sign up and try Dump. Truck.

to stay updated with all Dump Truck, subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+.

Dump Truck Refer a Friend program is here!

7:50 PM Add Comment
Dump Truck Refer a Friend program is here! -

Dump Truck Refer a Friend Today, we are extremely pleased to announce that the Dump Truck Refer a Friend program is here! Tell your friends about Dump Truck and receive 500MB bonus storage for each friend who signs and confirm their account!

We have all the tools you'll need to send invitations to your friends via email, Facebook, Twitter and Google+.

Earn up to 16 GB in storage free bonus!

Start referring your friends "

If you do not already have an account Dump Truck, please sign up for a 5GB account today - they are free

to stay updated with Dump Truck, please subscribe to the Golden Frog blog and follow us on Facebook, Twitter and Google+.

New Luxembourg Cluster VPN server!

6:49 PM Add Comment
New Luxembourg Cluster VPN server! -

VyprVPN Luxembourg Server We have added a new VyprVPN server cluster in Luxembourg!

Our approach is unique in the VPN industry - we have, engineer and manage our VPN servers so that we can provide fast and reliable connections. Other VPN vendors use third party companies to host their VPN servers. We do not do . We are the only company that manages your data so that your privacy and security are protected from end to end.

We also VyprVPN Desktop and mobile applications to make it easier to protect your Internet connection with a single click or press.

Luxembourg VPN server cluster is available for all VyprVPN protocols, including PPTP, L2TP / IPsec, and OpenVPN.

If you use VyprVPN Desktop, the new Luxembourg VPN server cluster is automatically available when choosing the location of your server. To choose the Luxembourg VyprVPN server cluster with Mobile, simply log on your application and log in

If you manually configure VyprVPN on your operating system, you can update your name 'VyprVPN host :. lu1.vpn.goldenfrog.com

You now have unlimited access to the following locations on the server:

  • Asia - Hong Kong
  • Canada - Toronto
  • Denmark - Copenhagen
  • Europe - Luxembourg New
  • France - Paris
  • Germany - Frankfurt
  • Moscow - Russia New
  • Netherlands - Amsterdam
  • Sweden - Stockholm New
  • Switzerland - Zurich New!
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Washington

We have recently added a Russian VPN server, a VPN server in Switzerland, Sweden VPN server and a VPN server Denmark. And we will continue to add additional VPN server clusters throughout 2013 - so stay tuned

If you want protection for your Internet connection while at home or on the road, try free VyprVPN risk for 7 days !. If you are a Dump Truck user, please add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

ECPA and Privacy - Why you should care

5:48 PM Add Comment
ECPA and Privacy - Why you should care -

Privacy Some may not be familiar with the Law on Protection of Personal Information Electronic Communications (ECPA). ECPA was enacted in 1986, when we were living in a very different electronic world from today; Internet "public" did not even exist. The main goal of ECPA was then meet new technologies and communications services and govern how the application of the law could obtain information about "oral", "son" and "e-services" which at the time essentially composed of display and walled- garden gates panels. . WebMail as we now know does not exist and there was no cloud storage services

ECPA addresses three levels of information: "customer information" which involves the customer's name, address billing and other information such as length of service and method of payment; "Transaction information" which deals with specific information as communication endpoints and addresses, time and duration, then the "content" of real communication. ECPA has three parts, addressing the communications market as it existed at the time. The first part deals with "wiretapping" - real-time "interception" of the content of a communication. second part addresses "trap and trace" and information "pen register" dealing calling and called numbers for oral communication The third part addresses "stored communications." - and (though they existed at the time) now cover WebMail and files stored in the ECPA Each party draws a distinction between three categories of information and provides standards for access to the application of the "cloud" law. everyone to them, as the context and the type of communication.

There have been a number of amendments to ECPA over the years. the Congress also passed the Communications Assistance for law Enforcement Act (CALEA ) (1994), the USA PATRIOT Act (01) (on the physical means by which law enforcement actually gets the content of interceptions, after judicial authorization or otherwise), the PATRIOT Act (the title of the law is ten bacronym letters (USA PATRIOT) representing Uniting (and) Strengthening America (by) providing appropriate tools required (to) Intercept (and) Obstruct Terrorism Act of 01, it was recently renewed) and finally the Foreign Intelligence Surveillance Act (FISA), (08). Congress has tried (and has always failed) to follow the growth of technology, but the results have consistently and persistently reduced, are not protected, individual liberty, privacy or freedom.

A new amendment (S.607) to ECPA (not CALEA, PATRIOT or FISA) is in the works, presented by Senator Leahy (D-VT). The new amendment is to strengthen the law about electronic communication privacy. This bill sets several privacy issues in long delays. It is not a total panacea, but it is a step in the right direction. Basically, S.607 would require all state and federal law enforcement (but not the CIA or the NSA) to obtain a warrant, after showing "probable cause" for the "content" of any electronic communication. Texas, having just signed into law an amendment to its own ECPA, now requires a warrant for content. The rest of the country needs to do the same.

Golden Frog VyprVPN develops products as to help preserve an open Internet experience and secure, while respecting the privacy of the user. VyprVPN is used in more than 215 countries around the world by people who share our belief that encryption can protect your online privacy.

Ron Yokubaitis, co-CEO, Golden Frog

Use FolderSync with Dump Truck on Android

4:47 PM Add Comment
Use FolderSync with Dump Truck on Android

- Dump Truck FolderSync Instructions In response to your comments on the Golden Frog ideas, we added step by step instructions for access your Dump Truck. account on any Android device using FolderSync

If you have FolderSync, the installation process is easy:

FolderSync Installation Instructions for Dump Truck

what FolderSync?

FolderSync is a application that makes it easy to synchronize files between your Android device and Dump Truck online storage account. It also contains a full file manager for copying, moving and deleting files in your remote accounts. Both one-way and two-way synchronization is supported. Please note, to use FolderSync, Android 2.1+ is required.

Why use FolderSync with Dump Truck?

The backup of your files is easy with the FolderSync variety of settings. You can set your own timing intervals or to set up a pair of folder to automatically synchronize files between your device and Dump Truck account. This makes FolderSync An ideal way to save music playlists and important files.

We want you to be able to use applications useful as FolderSync with Dump Truck. If problems occur, please enjoy our 24x7x365 support. We will continue to add installation instructions for other applications so do not forget to provide feedback to the Golden Frog Ideas!

To stay updated with Dump Truck, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

New VPN Server Cluster in Belgium!

3:46 PM Add Comment
New VPN Server Cluster in Belgium! -

VyprVPN Belgium We have added a new VyprVPN server cluster in Belgium!

The new server cluster is available for all VyprVPN protocols, including PPTP, L2TP / IPSec and OpenVPN

How to access the Cluster Server Belgium :.

  • VyprVPN office -. If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN - If you use mobile VyprVPN, simply log on application and log back in to enable Belgium optional
  • manual configuration - If you manually adjust VyprVPN on your operating system, you can update your name 'VyprVPN host :. be1.vpn.goldenfrog.com

Remember, you can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

You now have unlimited access to VPN following server locations:

  • Asia - Hong. Kong
  • Belgium - Brussels New
  • Canada - Toronto
  • Czech Republic - Prague New
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki
  • France - Paris
  • Germany - Frankfurt
  • Ireland - Dublin
  • Italy - Rome
  • Japan - Tokyo
  • Malaysia - Kuala Lumpur
  • Netherlands - Amsterdam
  • Norway - Oslo
  • Poland - Warsaw
  • Portugal - Lisbon New
  • Romania - Bucharest
  • Russia - Moscow
  • Singapore - Singapore
  • South Korea - Seoul New
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Turkey - Istanbul
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Miami
  • uS - Washington, DC

do not forget to visit our microsite ideas to let us know that the server location you want to side

If you want protection for your Internet connection while at home! or on the road, try it free for 7 days VyprVPN risk. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

Announcing a New VPN server cluster in Thailand!

2:45 PM Add Comment
Announcing a New VPN server cluster in Thailand! -

VyprVPN Thailand We have just launched a new cluster VyprVPN servers in Bangkok, Thailand!

The new server cluster is available for all VyprVPN protocols, including PPTP, L2TP / IPSec and OpenVPN

How to access the server cluster Thailand :.

  • VyprVPN Desk - If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN -. If you use mobile VyprVPN, simply log on the app and login to allow Thailand as an option
  • Manual configuration - If you manually adjust VyprVPN on your system operation, you can update your hostname to VyprVPN :. .vpn.goldenfrog.com th1

Remember, you can connect to VyprVPN server clusters in 37 sites worldwide, with no restrictions on the transfer of data or the server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

You now have unlimited access to VPN following server locations:

  • Asia - Hong. Kong
  • Australia - Sydney
  • Austria - Vienna
  • Belgium - Brussels
  • Canada - Toronto
  • Czech Republic - Prague
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki
  • France - Paris
  • Germany - Frankfurt
  • Indonesia - ! Jakarta New
  • Ireland - Dublin
  • Italy - Rome
  • Japan - Tokyo
  • Lithuania - Vilnius
  • Malaysia - Kuala Lumpur
  • Netherlands - Amsterdam
  • New Zealand - Auckland New
  • Norway - Oslo
  • Poland - Warsaw
  • Portugal - Lisbon
  • Romania - Bucharest
  • Russia - Moscow
  • - Singapore
  • South Korea - Seoul
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Thailand - Bangkok New
  • Turkey - Istanbul
  • Vietnam - Hanoi New
  • UK - London
  • US - Austin
  • uS - Los Angeles
  • uS - Miami
  • uS - Washington, DC

do not forget to visit our microsite ideas to let us know what 'server location you want to side

If you want protection for your Internet connection while at home! or on the road, try for 7 days without risk VyprVPN. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

The global fight for Internet freedom

12:43 PM Add Comment
The global fight for Internet freedom -

Four out of five people in the world do not have access to an open Internet and uncensored

Anything you like Internet is at risk. In January 2012, we censored the VyprVPN logo to join the biggest event in the Internet history and helped defeat SOPA and PIPA censorship law. Yet many governments are engaged in Internet filtering and censorship than ever! Internet freedom around the world has been declining for three consecutive years and, unfortunately, only worse. Currently, over 80 percent of the world population has no access to the open Internet and not censored. Freedom of expression, access to unfiltered information and online privacy could all disappear if you do not fight.

Internet Censorship

Our new infographic The global fight for Internet freedom highlights the current landscape of lower internet freedom and strengthens the challenges we face. While it is not surprising that many authoritarian governments are now filtering, monitoring and censorship on the Internet, our computer graphics shows that many democratic countries are increasingly imposing various restrictions of the Internet because of security problems created by new media. Governments around the world continue to see the Internet as a threat and a tool of censorship, surveillance and repression.

Freedom of the Net Report 2013 Freedom House noted in our infographic studied surveillance, monitoring trends and arrests because of online business 60 countries, noting that 34 countries fell in the notes to the internet freedom. The three most restrictive countries continue to be China, Iran and Cuba. Surveillance NSA also declined notes in the West

What you can do right now.

While the debate against mandate spy on ordinary citizens, web censorship and data collection continues throughout the world, there are things you can do right now to start protecting your privacy and internet freedoms:

  1. Spread the word: We will work to ensure that people are more aware of our freedoms of the internet in decline. share our infographic with friends and family
  2. More on Internet freedom issues in your country .. There are a host of information at the site OpenNet Initiative
  3. Support the day We Fight Back Against mass surveillance event February 11: for more information on the day or protest worldwide in the honor of the late Aaron Swartz and participate by raising awareness on social media, widgets installation on your personal blogs and websites and sign up for updates on their website
  4. Encourage government officials to be more responsible. Push for reforms intrusive censorship and monitoring programs and sign petitions asking the change
  5. Look at where your money goes: .. not to support businesses and companies that actively pressure your government to compromise your privacy and Internet freedom
  6. Only download and access trusted websites and applications: Take time to read their agreements use
  7. Take control of your privacy online with a VPN Golden Frog VyprVPN as :. VPN prevents your ISP and third party monitoring and control of your online communications and browsing activity. VyprVPN is the only VPN provider that Windows, Mac, Android and iOS applications to secure all your devices. Please read our Vision Book, " peace, prosperity and the case for the Open Internet: A shared vision and call to action for the world's Internet users" for more our struggle for a free and open Internet.

The Internet is an essential means by which people can express themselves and share ideas. It has also become a tool increasingly important to help democracy and human rights activists are mobilizing and advocating for political reform, social and economic. At Golden Frog believe that users should be free to make their own decisions about what they are reading and watching. Censor the web only led to a decline in creativity, innovation and education. We are joining an international movement to defend our freedoms on the Internet, and we want to encourage our readers to do the same.

Internet Censorship Infographic

Opt-in for early access to new features before release of VyprVPN!

10:41 PM Add Comment
Opt-in for early access to new features before release of VyprVPN! -

You want to try new VyprVPN features before they are released? You can now opt in to receive updates for VyprVPN beta for Windows and Mac. Be the first to know when we work on something new!

To start receiving beta updates, simply install the 2.3.1 or later version of VyprVPN for Windows or Mac. After updating VyprVPN, simply select the new feature under "Options / Preferences" opt-in to receive beta updates. With this feature enabled, you receive notifications each time a new beta version available. please test new features and tell us what you think!

VyprVPN for Windows/Mac instructions

If a beta version does not work for you, simply uninstall version VyprVPN Beta and reinstall the release of the current production of the Golden Frog website.

We appreciate your comments and it is crucial for improving VyprVPN. by participating in the VyprVPN Beta you can share your comments earlier in the development process while getting early access to new features.

If you have not downloaded the VyprVPN applications for Windows or Mac, they are included for free with a VyprVPN account. If you do not already have a VyprVPN account, sign up for a free 3 day trial today!

Have ideas for products and feature suggestions? Participate in Beta VyprVPN program, share your ideas on our website Golden Frog Ideas or email support@goldenfrog.com. To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+.

Facebook just bought your phone number from WhatsApp

11:42 AM Add Comment
Facebook just bought your phone number from WhatsApp -

The Greatest Story Technology last week was undoubtedly the acquisition by Facebook WhatsApp for $ 19 billion. This amazing figure is six times more than the $ 3 billion that Snapchat turned down. They spent $ 340 million for each employee WhatsApp.

Thumbs Up And Phone Bubble

So why do you want that Facebook paid megabucks for this acquisition? It is certainly not for the revenue potential. WhatsApp charges its 450 million users $ 1 per year to use the service. We are not mathematical geniuses, but that's an estimated $ 450 million in annual revenues. Facebook has promised not to insert ads in the service squeeze more money out of it. So even if the service continues to grow, it will take many years to get even close to the $ 19 billion they paid for it.

This brings us to the next question. What Facebook considers more valuable than pure recipes? Data! Specifically, they want your data. They bought WhatsApp Facebook because it gives access to a multitude of user data, opening mining opportunities, and concerns of possible privacy.

The WhatsApp privacy policy is not great (some would say ugly). They can access your address book, pick up the phone and upload them to their servers. Think about it: even if you do not use WhatsApp, if one of your contacts, your phone number is stored on servers WhatsApps. Now Facebook has billions of phone numbers and there is a good chance they have your mobile phone number. What they do with that data is yet to be seen. But one thing we know for sure is that this modest sum price was not about money, but really on the user's data.

Some people are already scooping on WhatsApp. Are you a WhatsApp user? Will you stay with the service? Let us know in the comments section below.

Giving a new month Get a referral program VyprVPN Month

9:40 PM 1 Comment
Giving a new month Get a referral program VyprVPN Month -

We are delighted to announce our new give a month, get a referral program for the month VyprVPN! You can now give a free month VyprVPN your friends and receive a free month of service in return . That simple. Give a months get one month.

There is no limit to the number of friends you can give VyprVPN free service, so invite as many people as you want. Get a full year of free VyprVPN by only referring 12 friends to register! The more you give, the more you get self-service

Give a Month, Get a Month

How it works :.

  1. Tell your friends an email invitation or share your personal information reference link via Facebook, Twitter, Google+, LinkedIn or from the Golden Frog Control Panel.
  2. For each friend who completes their free month and joined VyprVPN, you get one month of free service.

you already know that online VyprVPN offers privacy, security and freedom - now you can share these benefits with your friends and earn a free service. Start referring friends to VyprVPN now!

If you do not already have VyprVPN, sign up for a free 3 day trial today.

Golden Frog and i2Coalition Submitted comments to the FCC's struggle for open access

8:39 PM Add Comment
Golden Frog and i2Coalition Submitted comments to the FCC's struggle for open access -

Golden Frog is a proud member of the i2Coalition whose mission is to support "those who build nuts and bolts of the Internet. " We are proud to have played a key role, along with other members of i2Coalition, in drafting the comments of the i2Coalition about Net Neutrality that were presented this week at the US Federal Communications Commission ( "FCC") yesterday. We fight for an Internet "Open Access" that promotes innovation and competition, while respecting the privacy of the user. An excerpt from the summary and a link to the "Comments i2Coaltion" deposit is below.

In May 2014, the FCC has made a historic decision to advance the rules that will kill the "Open Internet" as we know it. Despite a public outcry nationally, the FCC has betrayed the net neutrality rhetoric, and instead approved the review of the rules that would create a "two-tiered Internet." In other words, companies with deep pockets can pay for an "Internet fast lane" for their traffic and content are prioritized. privacy is also greatly reduced because the ISP will inspect traffic so they can prioritize it.

Golden Frog strongly supports the recommendation of the coalition that the FCC reclassify broadband transmission component as a service Title II telecommunications. the most effective way to protect and promote the open Internet is to implement Open Access by reclassifying broadband transmission component as a telecommunications service Title II. Open Access opens the Internet to everyone and allows strong competition.

the Internet develops when a playing field level allows innovation to come from anyone with a good idea and the ability to act on it. minimum entry barriers encourage individual entrepreneurs, small businesses and global enterprises to compete in the same arena.

We must all work together and remain vigilant in the fight against the powerful groups and well funded who want nothing more than to end the open Internet. The FCC asked users to weigh on net neutrality by posting in the comments section on the FCC website.

We encourage all Golden Frog users to post their comments to the FCC by 18 July at the FCC to protect the Open Internet! Thank you

Summary of filing the i2Coalition FCC:

The most effective way for the Commission to protect and promote the open Internet implement Open Access reclassifying broadband transmission component as a telecommunications service Title II. proposed rules Net neutrality of the NPRM are trying to mitigate the effects of a last mile noncompetitive regulating broadband access, but access strikes open the heart of the problem by opening the network to robust competition. Open Access would bring competition to the Internet access market and consumer choice would be the first guarantee against abusive and discriminatory network practices.

Open Access is the effective policy of the Commission for over 40 years. Computer investigations laid the foundation of a dynamic Internet access market and the Commission's policies have been successfully adopted worldwide. It was not until the Commission has abandoned the open access and competition in broadband evaporated as the need for Net Neutrality regulations became evident. The Commission's decisions to classify broadband as an information service were based on forecasts that competition and infrastructure investments would prosper without Open Access. This procedure allows the Commission the opportunity to reassess whether Title I produced the expected benefits. The evidence is clear that it has not and i2Coalition believes that the time has come to return to free access.

If the Commission does not reinstate open access, then it should protect the open Internet with enforceable without blocking and anti-discrimination rules based on authority Title II. Section 706 does not provide a sound legal basis for the rules proposed by the Commission and paid prioritization arrangements would be against-productive. The incredible success of the Internet is largely due to the fact that it has always been a level playing field. minimum entry barriers have enabled innovation to come from small and large players.

However, a bifurcated Internet where rich and powerful can buy preferential treatment is anathema to the open Internet.

paid prioritization also presents a dangerous threat to privacy on the Internet. The only way that broadband access providers can proactively prioritize advanced providers of traffic is by monitoring the content of their online communications users. The Commission should not punish a prioritization scheme that requires Americans to sacrifice their privacy or allowing broadband providers to discriminate against encryption tools. Protection of the open Internet means establishing meaningful rules that stop discriminatory practices. Open Access, the i2Coalition policy recommends the Commission to undertake, would discourage abuse by dynamic competition. For 40 years, the open access rules of the Commission are the basis of the information services market and they have succeeded in promoting competition, prevention of discrimination, and incentivizing investment network. These are the results that the Commission look into this procedure and it can better achieve by bringing Open Access.

The full text of "Observations i2Coalition" deposit.