New VyprVPN server location in Mumbai, India!

3:09 PM Add Comment
New VyprVPN server location in Mumbai, India! -

New VPN Server Mumbai India

You have requested a new server location, and we responded.

"Yes, a server in India would be fine for me too!"

"thousands of people are waiting for it ... VyprVPN has all the features. What we need is a server in India."

"server in India would be really great. in fact I have seen very good reviews about Golden Frog and subscribed, but was surprised not to see India VPN."

due to popular demand, we've added a new VyprVPN server location in Mumbai, India! This is our 14 e server location in Asia and our first server in India. With a population of over 1 billion, India is the second most populous country in the world, and this new server location will ensure the security of the Internet to a large number of users. VyprVPN is a great resource for those working in the technology industry booming in India, and allow users to bypass the selective Internet censorship that takes place in the country

How to access the location of the India server :.

  • VyprVPN office -. If you use VyprVPN Desktop, the location of the new server is automatically available when you choose the location of your server
  • VyprVPN mobile - if you use mobile VyprVPN, simply log on the application and log back in to enable Mumbai.

you have access to over 50 locations worldwide servers!

india_map_gf

Log in to any location of the VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses, so that the server connections are always available.

Please visit Golden Frog ideas to share your product ideas, requests and recommendations for the location of our next server functionality.

If you want protection for your Internet connection while at home or on the road, try VyprVPN free.

Keep up to date with VyprVPN by subscribing to the Golden Frog blog or follow us on Facebook, Twitter and Google+.

Anonymity and confidentiality are not the same

2:08 PM Add Comment
Anonymity and confidentiality are not the same -

There are two weeks debunking myth Golden Frog here! As we presented last week, we reveal disturbing trends we saw in the VPN industry and debunking common myths about anonymity, logging and in online privacy.

This week we Myth # 2 and myth. # 3

VPN Myths Anonymity

Myth # 2 :. anonymity and privacy are the same

reality Some services designed to protect the privacy not remove all identifying information, but they help to secure communications and defense against mass surveillance by governments and private companies.

What Golden Frog Does :. Golden Frog built tools such as VyprVPN paired with VyprDNS to help quantify our users against mass surveillance and secure their Internet connections

VPN Myths Anonymity Logging

Myth # 3 :. When my VPN provider announced a "limited" service, which means they will connect any identifying information about me

reality Many VPN providers announce a "limited service" on marketing pages of their website, but have terms in the fine print of their privacy policy stating they do log

. What Golden Frog Does :. Golden Frog did not advertise or promise that his VyprVPN service will make you anonymous on the Internet, and we clearly state what we record in our Privacy Policy

More information Myth # 2 and # 3 Myth!

To secure all your devices at home, start with your router

1:07 PM Add Comment
To secure all your devices at home, start with your router -

VPN Router App

How many devices in your home are connected to the Internet? It's probably more than you think.

From TV streaming through game consoles to your digital security system and thermostat, more and more devices around the home connecting to the Internet. With all these access points, securing your home Internet connection is more important than ever.

The application router VyprVPN allows you to encrypt your Internet connection and protect all devices on your home network at a time. Once you equip your router with VyprVPN simply login with your username and password Golden Frog, and your home network will be secure regardless of platform, operating system or device type.

The application of the router is just as easy to use as other applications VyprVPN, and there e can even adjust the settings on a per device basis

Pensez- it this way :. You would not want strangers sneaked in through your windows. So why your Internet connection be?

Learn more about protecting your home router with VyprVPN app.

Router VyprVPN app is available to paying users only VyprVPN.

You Are Not Anonymous

12:06 PM Add Comment
You Are Not Anonymous -

This is our last VPN myth-busting week here at Golden Frog. Today we share information about the alternative VPN in Tor Myth # 10

Tor is not anonymous

Myth # 10 :. Tor is a better alternative than a VPN

reality Tor is often cited as an alternative to using a VPN, but Tor do makes no anonymous

.

What Golden Frog Does :. Golden Frog did not advertise or promise that VyprVPN makes you anonymous on the Internet, but this VyprVPN will greatly improve your privacy and online security

As finished our 10th and final myth we want to focus on this campaign key delivery: you are not anonymous when you use a VPN. Many of anonymity promises VPN providers (and other companies) are false, and online privacy is a goal much more realistic than anonymity.

We hope debunking these myths VPN provided an overview of the most effective ways to protect your privacy and online security.

See all 10 myths.

Use a VPN to overcome the increasing fragmentation of the Internet

10:04 PM Add Comment
Use a VPN to overcome the increasing fragmentation of the Internet -

Access to streaming content is often limited based on geo-location worldwide. This can be a problem if you are traveling, trying to access content outside the borders of your country, or your country imposes censorship on the Internet. Access to content is mostly blocked by using a method :. Geoblocking

Geo-blocking

Geo-blocking is when the content is restricted or blocked, based on your location. As noted in a Radar Tech article, "Geo-blocking is simply the act to restrict access to websites and downloading applications based on the location of the user." Geo-blocking can affect your ability to distribute content such as sports or news access sites and social media sites such as Twitter events. While geo-blocking is widespread, it accelerates the balkanization of the Internet.

How do they do?
Geo -blocking is implemented by a service provider, the site owner or the government. When you visit a web site, your computer makes a request to the server. Your IP address - which contains information about your site - is sent with the request. The site is then able to identify your location, and can block your access based on that location.

Why do they do it?

There are all sorts of geo-blocks reasons are established. Some restrictive governments (eg China), provide scanning, Internet censorship restrictive within the borders of their country. This censorship may be to block access to social media sites like YouTube, and therefore the video on these sites. It may also include restricting access to international news sites. Some geo-blocks occur on local content in a country or region - for example a specific sporting event in countries where coverage is adapted to local viewers. In the world of online TV and video content, geo-blocks are usually adopted because of licensing agreements and Duties by providers, but some argue geoblocking keeps prices artificially high.

How to improve access

Golden Frog believes in the Internet free of censorship and restrictions based on location. A Golden Frog we believe that nobody owns the Internet, and it should be free and open to everyone, regardless of their location. Using a VPN from a trusted provider like VyprVPN allows you to bypass restrictions so you can stream the content you want from anywhere in the world.

The practical content with continuous VPN is increasingly discussed by many world and business leaders.

In an article Straits Times that read "Private Network (VPN) Virtual can not be outlawed, even if used to access unauthorized content overseas," UK Minister intellectual property Baroness Lucy Neville- Rolfe agreed, responding, "You can not ban a key technology." Similarly, the Prime Minister Malcolm Turnbull MP of Australia said on its Web site, "the Act copyright does not make it illegal to use a VPN to access content from overseas ".

US Nate Cardozo , a staff attorney for the EFF, was quoted in an article saying Wall Street Journal, "We have not seen a prosecution for watching Netflix." And many others, disagreement, including Netflix CEO Reed Hastings, expressed with the geo-restrictions on broadcast content "is the basic solution for Netflix to get global and have its contents be the same throughout the world so there is no incentive to [use a VPN], "he said recently.

VyprVPN allows you to generate an IP address that comes from one of our VPN server sites worldwide, with over 50 server locations worldwide to choose from. With VyprVPN, you can really achieve freedom online for reliability, the overall streaming experience.

Resources

Try VyprVPN free today and improve your streaming experience.

learn more about the benefits of using a VPN for streaming - .. including increased streaming speed and privacy

Paper Vision Read Golden Frog

The encryption battle continues

11:05 AM Add Comment
The encryption battle continues -

FBI Encryption Debate

The US debate on encryption has been warming for some time, and is highlighted in the news again this week following an event, "the encryption debate: privacy and national security balance," hosted by Passcode and Christian science Monitor

views the FBI was reaffirmed at the event by the Deputy Executive Director of the Directorate of science and technology FBI ,. Amy Hess. Hess said that encryption is to help the criminals and bring them to a status "above the law ". Moreover, she expressed the feeling that "weaker encryption is an interesting compromise for access to law enforcement data." The FBI wants businesses to be able to get back on consumption data when are presented with a warrant, a process that is enabled by encryption backdoors at least not yet -. -. the FBI has not called for legislation on the matter but it is very vocal about their opinions view

as the FBI continues to lobby for encryption backdoors, technology giants are standing with them continuing to build encryption products and by refusing to provide the requested access. at event this week, officials said the technology community must "try harder" to find a solution that protects user's privacy yet also allows them to access the data. This "solution" would be inherently introduce security risks. In addition, a point raised by the CTO of Silent Circle, a warrant does not give the FBI the right to data - it only gives them the right to seek

As we have previously indicated. We believe that encryption is essential and strongly opposed encryption backdoors. The technology community has already developed and implemented a solution to protect the privacy of the user and data - encryption - and replacement with a less secure solution simply does not make sense. As the FBI continues to push the issue, it is important that we continue to talk and fight against the "key" and backdoors in our communications.

Further reading

Look at the Event Monitor Christian Science.

learn more about the FBI's position on encryption.

learn more about the battle between the technology community and government.

learn more about the views of the US changing the encryption.

Build an ecosystem Privacy: How partnerships allow us to focus on our core service

9:03 PM Add Comment
Build an ecosystem Privacy: How partnerships allow us to focus on our core service -

A Golden Frog, we work hard to provide our users with the best solutions to protect their lives private and online security. In addition to the products we create, we are committed to build third-party applications and partner ecosystem. This approach allows us to focus on our core competencies while offering an inclusive set of tools to our users.

Golden Frog is highly concentrated at the network level, and provide exceptional protection with our network and VyprVPN CYPHER products. Our core competencies include running a fast network, world-class global infrastructure management, providing easy and intuitive and innovative applications with protocols like Chameleon and zero knowledge DNS services.

Rather than providing a broad encompassing solution, we focus on providing an exceptional product for encryption at the network level. So we work with the best-in-breed companies to provide users with a set of "ecosystem" free services to choose from. There is no one-size-fits-all solution to Golden Frog, and the variety of options allows each user to build a privacy and security solution that meets their individual needs . Our ecosystem includes encrypted messages, password protection and secure online storage tools.

We also recognize that our customers use a variety of platforms that require a high level of all privacy and security. We currently offer applications for Windows, Mac, iOS, Android, select routers and smart TVs and a CLI for Linux. We focus on creating additional applications to ensure that our customers can achieve privacy and online safety, and constantly strive to offer them what they need. We are establishing partnerships and work on product features based on customer requests submitted to us on our ideas form, Ideas Golden Frog.

There are many providers in the area of ​​privacy and security, but I can not stress enough the importance of the selection of trusted suppliers. It is imperative that you know the company behind the product, and can count on them to keep your information safe. We work hard to find trustworthy partners, and have a private life market where users can find them. Our present market Golden Frog trusts partners and feels good to recommend, as well as those who share our mission.

For more information on our partner ecosystem, visit the confidentiality of the market now.

The surveillance bill moves forward: CISA Senate Passes

8:02 PM Add Comment
The surveillance bill moves forward: CISA Senate Passes -

The Senate passed CISA (the Act on sharing information on cyber security) yesterday, a project monitoring law that was packaged as a "cyber security" initiative. The bill is very controversial and has faced strong opposition from defenders of privacy and technology companies because it is an extreme threat to privacy.

The Senate voted in favor of the bill 74 to 21. There were several amendments to CISA, but they were rejected and he went with his "privacy invasive" features included. The project law is similar to what happened in the House, and the next step is for both versions of the bill to be combined.

CISA was presented as a bill on cybersecurity that fight against damaging data breaches by allowing companies to "cybersecurity threat data share with the department of Homeland security, which could then transmit it to other agencies such as the FBI and the NSA."

However CISA laying serious threats to privacy and faced widespread opposition because it gives companies permission (and encouragement) to monitor the information of user and share it with the government without any consequences.

We are alarmed that this bill has passed the Senate overwhelmingly, particularly given.

"The version of the CISA adopted Tuesday, in fact, states that any wider" threat Cybersecurity "the information gathered can be shared" notwithstanding any other provision of law "

This there has already been a lot of anger since the bill passed yesterday afternoon, with many defenders of speech privacy:

"None of this was enough to sway the Senate against the CISA . "You had computer security researchers against the bill, much of Silicon Valley against this bill, defenders of privacy and civil society groups against the bill," says Jaycox the EFF. "Our biggest takeaway is disappointment."

We are also extremely disappointed with the passage of the CISA in the Senate. We will continue to update this post with more information than CISA moves forward

Source :. Wired Magazine

More information CISA the Golden Frog Blog

  • Tech Urge Legislation companies, CISA Gains Momentum
  • decide the future of the Internet: Tell Congress stop CISA
  • We must stop CISA

More information CISA News

  • Ars Technica: Senate adopts the controversial cyber law Cyberspying 74-21
  • Daily Dot: Senate Passes Major cybersecurity info-sharing Bill CISA
  • EFF: EFF Disappointed that CISA Passes Senate
  • Silicon beat: Privacy Advocates Slam Passage of the CISA
  • Gizmodo: These senators voted yes on CISA - But there is still time
  • the Guardian: the Senate adopted the controversial cyber law CISA 74-21

Freedom on the Net 2015: How Your Internet free

7:01 PM Add Comment
Freedom on the Net 2015: How Your Internet free -

The Freedom on the Net 2015 report was published recently ?! This report shows how the countries of the world in terms of their freedoms on the Internet, on a scale that includes "free", "partly free" and "not free". 65 countries were reviewed in the 2015 report

Freedom on the Net

Of the 65 countries ranked, 18 were free, 28 were partly free and 19 not free

key findings of the 2015 report include :.

  • content removals increased This year, 42 countries were required to remove the content. These applications came from governments, and the content was to remove political, religious and social issues related to
  • laws and surveillance technologies multiply :. 14 countries have adopted new laws to increase surveillance. In addition, some updated monitoring equipment they use. We have certainly seen much of the legislation proposed monitoring and adopted, including Russia, France, the UK and even the United States with the passage of Senate of CISA.
  • Governments undermined encryption, anonymity: There were many countries that have tried to limit encryption technologies or encryption of ban be used completely. Encryption has also repeatedly been "stigmatized" as a negative tool that helps criminals. Here at Golden Frog, we closely monitored and discussed the fight against the United States for encryption backdoors, to continue to advocate for encryption and also joined forces with other groups to save crypto.
  • Arrests and intimidation escalated: The arrests and intimidation was in response to people sharing information on social networks was political, religious or social. In many cases, this information was communications surrounding public disorder.

For more information on Internet freedom in 2015, read the full report. Detailed reports for all 65 countries examined are also available, so you can see how your country fared.

All data in this post comes from Freedom on the Net 2015

Golden Frog and the Coalition of Internet infrastructure partnership form to continue fighting for privacy and Internet security

6:00 PM Add Comment
Golden Frog and the Coalition of Internet infrastructure partnership form to continue fighting for privacy and Internet security -

Both companies advocate free life private and free and open Internet

MEGGEN, SWITZERLAND - November 30, 2015 - Coalition for Internet infrastructure, a group that supports and represents those who build the nuts and bolts the Internet, and Golden Frog, a company that fights for privacy and online safety, have joined to fight for a free and open Internet.

Through this partnership, the Coalition of the Internet infrastructure will support Golden Frog to their members and supporters, and Golden Frog will provide members of the coalition of Internet infrastructure VyprVPN his service with 1 GB free data for the first month and 500 MB recurring in subsequent months, and 25% of annual plans.

"We are delighted to be partnering with the Coalition of the Internet infrastructure," said Liz Kintzele, sales vice president at Golden Frog. "We are very closely aligned in terms of the initiatives we support, and we worked together for years. We are delighted to formalize our partnership and join forces in the struggle for a free, open and safe for all. "

" exclusive member benefits to members as VyprVPN are among the many reasons for the Internet infrastructure community adopted the i2Coalition. We are excited to partner with Golden Frog to make this powerful tool available . i2Coalition members and bring more benefits for them in the future "

users who are interested to take advantage of the offer can sign in to VyprVPN: http: // bit. ly / 1XrXwdO

about Golden Frog

Golden Frog is a global service provider committed to the development of applications and services that preserve a open and secure Internet, a mission that continues to grow in importance as users worldwide threats to privacy of the face. With users in over 195 countries, Golden Frog owns and operates server clusters in North America, Europe, South America, Asia and Oceania. Golden Frog owns and operates 100% of its own servers, hardware and global network to ensure the highest levels of security, privacy, and service delivery. Golden Frog offers a comprehensive reseller program that provides the best VPN service and trafficking for resellers and their clients. The company also offers VyprVPN for companies to protect corporate communications, identity and data, and Internet connections secure employees in the office or on the road.

More about Golden Frog's vision for a free and open Internet by reading our "peace, prosperity and the case for the Open Internet" guidance document located www.goldenfrog.com / vision

Coalition about the Internet infrastructure

i2Coalition is a group protecting the Internet infrastructure industry. They were founded in 2012 by a diverse group of Internet infrastructure companies, and support and represent those who build the nuts and bolts of the Internet. The i2Coalition has made great progress on initiatives that affect the industry and the Internet as a whole - issues such as open access, mass surveillance, cybersecurity, patent reform, privacy customers, the IANA transition and Internet governance. You can learn more about: https://www.i2coalition.com/

The government really wants Encryption ... But only for a few privileged

4:59 PM Add Comment
The government really wants Encryption ... But only for a few privileged -

The encryption backdoor debate in the US has been underway for some time now. An important element in this debate that is often overlooked, however, is that strong encryption under attack is actually encouraged and necessary for some companies -. And frequently used by the government

Take the health sector. Rules for electronic health records and information (HIPPA rules) specify that the private information should be encrypted. In addition, "safe harbor" rules may even exempt health service companies from liability if they have used strong encryption, which encourages businesses to adopt encryption: "Because the notification rule violation the HITECH Act includes a safe harbor that exempts reporting violations if the relevant data have been correctly encrypted, many organizations are looking into whether to make broader use of encryption. "

a another example is the financial industry. Recently, a financial services company was charged a large fine (which was paid to a federal agency) because it did not properly encrypt its information "He failed to follow through on a key protocol of data protection. encrypting laptops that contain confidential customer data " Thus, the company was penalized for not quantify.

Examples like this illustrate the hypocrisy of the government in the battle encryption. Encryption is attacked with the government trying to impose "backdoors" in consumer communications, but in the meantime some companies are encouraged - or required - to encrypt to secure their data. There is even a bill called the advance 2015 Data Security Act currently in the House that essentially forces companies to encrypt sensitive information while in transit and storage.

The government is certainly the use of strong encryption itself, but they are trying to remove this right of everyday Internet users. So the government does not always have the ban or weakening of encryption, but instead of trying to control who is "allowed" to use and which are not.

Encryption is the second amendment to the Internet, and using encryption to protect your data should be a fundamental right for all -. not just for a privileged few

You are the product: The Price of Free in the privacy of the growing industry

3:58 PM Add Comment
You are the product: The Price of Free in the privacy of the growing industry -

In a world dominated by Internet Facebook and Google, most people understand the phrase "If you do not pay for it, you are the product." what people do not understand is that this concept has also landed on the shores of privacy industry. History has proven that the industry is "hot" marketing will inevitably enter. Companies that have shown little respect for privacy are now using misleading marketing messages to tout their free confidential services, while supporting by advertising and selling user data. This leads to important questions, such as why Facebook will pay $ 0 million to buy a free application VPN? Why a popular free proxy browser has turned its free users into a botnet for hire? And, what's next?

To remain protected users need to provide access to information, resulting in privacy paradox .

the privacy paradox

arrival of marketing in the privacy industry is particularly worrisome because products privacy require a closer relationship with users and other free products. Users must relinquish control for suppliers to protect against external threats. To remain protected users need to provide access to information, resulting in

Think of it this way "paradox of privacy". You rent a house sitter to enable them to protect your home. you have to give them additional access to it (keys, alarm codes, valuables in the house). There is a level of trust involved, as expected, they will not steal your things or throw a party.

VPNs are an excellent example of the paradox of privacy. VPN users must send all their network traffic over the VPN provider to be protected against malicious third party. But as a result, VPN providers can see a lot of information about you, including:

  • Every website you visit Every website you visit
  • Text of unencrypted email content of the email Unencrypted
  • Who you are emailing Who you are emailing
  • What applications you are using what are the applications you use
  • When you are online When you're online
  • How long you are online How time you're online
  • Who talks to you Who you talking
  • Your location your position

How is your privacy Worth?

In a new popular market as the privacy industry, most new businesses are looking for the fastest way to build market share and sell high. Build a large user base with free applications is a quick way to gain market share, but to justify the value of the company for sale (not service) user must make money. If the user does not pay now, the only other value they bring is their data. Accordingly, in the online private life industry, you can become the product of several ways, including the handling of the network, sales of domestic and advertising. Is this the price you pay in the data, it worth to you?

Handling the user's network

These sites offer free services Privacy and manipulate the activity of network users.

User Network Manipulation
  • Hola

    Hola claims it offers "Safe Browsing" to its 55 million users, but was recently revealed to be selling the bandwidth of its free users without their knowledge. As explained LifeHacker, "the company sells bandwidth users Hola anyone with money to buy, effectively turning its users into a botnet for hire."

    If Hola user confidence in a company that security researchers say is a "shaky" service? Others say Hola allows you to "be followed through the Internet, no matter what you do," and they allow "someone to run programs on your computer." If users trust company which promises to change his ways, but only after an outcry from the general public?

  • proxies Free

    most users do not understand that web proxies do not encrypt your connection entire Internet and they see (and perhaps save) each URL visited. Many proxies also change the Web code to inject ads, and some even prohibit the HTTPS traffic "could be because they want you to use . HTTP so they can analyze your traffic and steal your credentials "a recent survey examined 443 free proxies and found that 79% of them were" shady "with proxies you get what you pay for -.. sometimes more

  • Opera

    Opera is a browser that provides quick and secure access to the web. Opera has recently started offering a free VPN integrated for users, which is advertised as a This feature is marketed as a "VPN browser" but as github stresses in fact a proxy "improving life important private. "". This opera "VPN" is just a pre-configured HTTP / S proxy protecting all traffic between the Opera and the proxy, nothing else is not a VPN "proxies are inherently less secure than networks virtual private and Help Net Security expressed concern over this messaging deceptive marketing: "While Opera may have made this little tweak definitions with the best intentions, end users need to understand that this free service by Opera is far. be the security provided by a true VPN solution. "

    Opera also has SurfEasy a VPN company out of Canada. Their approach to advertising and the lack of transparency highlights the importance of going beyond the marketing message in order to understand the product of privacy and the business model of the company.

Free VPN applications :. "Sell Interiors"

companies that acquire VPN applications to collect analyzes on free users is a worrying trend in the VPN industry

VPN Apps
  • Facebook - Onavo

    Facebook has purchased a VPN app called Onavo in 2013. Why Facebook buy a VPN application? As stated on All Things D, Facebook gives insight into the use of application data: "The way applications work Onavo basically requires information on all the activities of your smart phone. So in summary, if Facebook can extend this kind of deep analysis for users billion-plus on its network, it will give the company a massive amount of understanding how people are using their smartphones. "

    VPN functionality gives visibility on Facebook network connection for the entire phone, including URL and application traffic. Therefore, Facebook can examine user activity for their own purposes. Onavo is one of the most flagrant examples of the paradox of privacy. the free users expect the VPN to protect them, but probably are not aware of the business model of the VPN application compromises their expectation of privacy

  • App Annie. - VPN Defender

    VPN Defender regularly ranks in the 10 downloaded app VPN in App Store, but it is the property of App Annie, a business intelligence company and analysis. Why a company analysis applications backed by Silicon Valley venture capital would own a VPN application? TechCrunch speculated that app Annie via VPN Defender "could become the go-to resource for data to mobile applications that was otherwise impossible to collect via a third following the release of Onavo, which left a gaping hole in the market. "

    users think they have found a free way to protect themselves online, but may have exposed data from their applications, websites visited, unencrypted e-mail and other network traffic through the VPN servers App Annie. Presumably App Annie integrates this user data to sell the analytical data to third parties, including Venture Capitalists who are looking for the next big application to invest. Consumers should be wary of free VPN applications that collect, analyze and share your data with third parties -. "Sale inside" a practice known as

  • AVG - Hide My Ass

    AVG is the third largest antivirus company in the world. AVG has recently updated its privacy policy to sell data from their free users "[s] ecurity AVG company can sell web search history and browser data to advertisers to" make money "from her Free antivirus software, change its privacy policy confirmed. "

    what is more worrying is that AVG recently bought Hide My Ass!, VPN provider offering users' privacy and total protection. "If the antivirius AVG product is called" spyware "can Hide My Ass! VPN user trust AVG to respect their privacy

Consumers should be wary of free VPN applications that collect, analyze and share data with third parties - a practice known in the industry analysis as sell within

It is private ... we Announce

Some of the free services of the business models are based on selling advertisements and show these ads to users.

It's Private...But We Advertise
  • Hotspot Shield

    Hotspot Shield is a VPN provider that displays ads in its free users as part of its business model. However, advertisers generally want to be able to target particular sets of users, and do not require the advertising platform to monitor user activity. The privacy policy of Hotspot Shield has ominous statements, and Hotspot Shield does not consider the IP addresses or the collection a unique identifier as "personal information". They also "can automatically use the information collected to identify your general location, improve service, optimize or advertisements displayed by the service."

    Ouch. Hopefully the free users understand that their privacy is compromised when using a product advertising. But not free VPN product users expect their privacy to be compromised?

  • Betternet

    Betternet is a free VPN service that says they are "a free service and will be free forever. "They support their business by asking user to install" free apps that are recommended within the Betternet application [which] covers the cost of maintaining our lives in service. "

    A VPN is" free forever, "and they seem to be transparent about their business model. Sounds good, right? But if you dig deeper, it seems that Betternet is owned by another VPN company, VPN in Touch, although this fact is not advertised on their site. It seems they have changed their information in the Android and iOS app stores in January 2015, removing all references to that affiliation. Amazon registering Betternet includes an email address VPN in Touch, which also indicates the companies are affiliated.

    Betternet seems to be transparent about its business model supported by advertising, but does not include information about who they are, their experience or their location. free users should try to understand who is behind the product before you trust him.

  • AdBlock

    AdBlock is a popular service ad blocking with over 0 million downloads. A contestant criticized AdBlock to move from an open source project to closed source, recording the unique ID and user settings and monetize users through a partnership with the Disconnect.me Privacy society. AdBlock was recently sold, but "will not disclose who it was sold to why it was sold, or how much it was sold for." AdBlock also started allowing advertisers to release ads to display to its user base.

  • avast

    In 2014, it was reported that Avast, an extension of antivirus vendor and a leading browser, spying on its users. Although the company says "The gold standard in PC security, keep you safe online and off-line" and services that prevent spyware, the company revealed in spying on the user navigation (recording every site you visit) and ad insertion - without the knowledge and consent of the user. This vulnerability has been modified since.

  • Ghostery

    "Ghostrank" The function of Ghostery allows users to block ads and online tracking associated with them. Ghostery is a positive example in that they are transparent about their practices and Ghostrank is opt-in. If you choose this function, however, Ghostery will sell data on what the ads that you block.

    Ghostery is owned by Evidon (formerly Better hint). As pointed MIT Technology Review, Ghostery sells information to the correct industry it claims to protect users: "Yet some of those who advocate Ghostery as a way to escape the clutches of the industry of the online advertising can not realize that the company behind it, Evidon, is actually part of the same industry. "

it is free. It is social. But it Private.

Social networks want to be the anti-Facebook, but can free users trust their business models?

It's Free. It's Social. But It's Not Private.
  • Yik Yak

    Yik Yak is a messaging application that allows you to share "your opinion with people around you while keeping your privacy. " Ars Technica revealed that several people were arrested for statements published on the application. It turns out that Yik Yak recorded an alarming amount of data, including your IP address, GPS coordinates, time and date of the message, the unique ID and sometimes your phone number. It can be free and social, but it does not protect the privacy of the user.

  • Ello

    Ello is a privacy-oriented social network, with a clear, including the line "you are not the product." However, the CS Monitor points out that Ello 'Ello catalogs pages users access, IP address, sites that refer users to Ello, general location, email and username for each account, and user device users information, "causing CS Monitor to assert that" many of these data can be used to identify users and their online activities. "

    Ello may be trying to be anti-Facebook, but seems to have a long way to go to protect its free users.

is your supplier trustworthy privacy?

There are some things you can do to avoid becoming the product, be the most important to determine if your supplier is trustworthy . Just as you would not hire a stranger on the street to watch your home, you should not engage an unknown company or shady privacy know your business means doing research and asking the following:.

  • If it is free, what is the business model

    investigate how the company makes money to support? itself, especially if they offer free products. If their business model is not clear, then its likely "you" they sell.

  • Who is society?

    It is important to know who you do business with, so you can assess their policy of confidentiality and reliability. Is it clear who you are doing business with, or is the company actually owned by someone else? Is what the city or hidden knowledge? If the company is dubious about their ownership or hidden guard, there may be a reason why they do not want you to know.

  • Is it their understandable privacy policy?

    Beware of policies that are vague or convoluted, or if you can not clearly understand the information they collect from you.

  • do their marketing messages contradict their privacy policy and business model?

    do the marketing claims aligned with the text in the company's privacy policy? Often brilliant marketing messages not not accurately reflect the company's practices.

  • Do they allow you to opt-out their data collection?

    Or are you automatically opt-ed in (a practice called implicit opt-in)? It is important to understand how the company will use your data from the moment you register -. And what control, if any, you have on this data collection

This is all about transparency and confidence

transparency builds trust. suppliers of privacy trust exist so it is critical to take the time to learn about the confidentiality of company you do business with. A Golden Frog we confirm a high level of transparency and trust, and we are very clear about what information we collect and how we use them. Golden Frog is working on a "freemium" business, which allows us to offer products to both free and paid without selling user data. We never sell your data to third parties. Our free maps available so that users can try our services and determine for themselves if they want to buy a paid plan. A Golden Frog you are never, ever, the product

Please read our book Vision: .. "Peace, prosperity, and the case for Open Internet" or visit our About for more

further reading

Hola
Hola Better Internet selling your bandwidth Turning Its VPN in a Botnet
Adios Hola: the researchers say it is time to nix the "poorly secured" Service
users Hola Free VPN vulnerable to hacking, researchers warn
recent events on the Hola network - blog by Ofer Vilenski, CEO Hola
free proxies
Analysis 443 free proxies - only 21% are not the shadow
Facebook - Onavo
Facebook $ 0 Million Onavo Buy comes with many Upside
App Annie - VPN Defender
App Annie Fills the void left Onavo Acquisition by Facebook with its new Smart Sense society
AVG - Hide My ass!
AVG can sell your navigation and historical research to advertisers
AVG acquires Privax, a world leader in privacy Personal Solutions
Hotspot Shield
Hotspot Shield Privacy Policy
betternet
works How betternet
Amazon Ad: Unlimited Free VPN by betternet
Adblock plus
This which is better, Adblock or Adblock plus?
the Adblock extension with 40 million users sold to mystery buyer refuses to name the new owner
avast
Avast Antivirus with spying You Adware (Up 'this week)
Avast Antivirus Was Spying on users?
Ghostery
Ad-Blocker Ghostery Advertisers actually helps if you "Support" He
A Popular Ad Blocker also helps the Ad industry
Yik Yak
do you want attention and jail time? Post a violent threat Yik Yak
Yik Yak - Imprint
Ello
Ello online ads targeting pan. Here's what experts say about its privacy practices

Happy Data Privacy Day 2016

2:57 PM Add Comment
Happy Data Privacy Day 2016 -

This is the day of the confidentiality of data - and here we celebrate Golden Frog

Sponsored by staysafeonline .org, Data Privacy Day is held on January 28 of each year and has been created to raise awareness in key issues surrounding online privacy. The themes of this year respect user privacy, data backup and enable trust. You can find a variety of resources on the Web Stay Safe Online site, and even download documents for participation in data privacy same day!

Golden Frog Tips to stay safe online

In honor of the Day data protection, we've compiled some tips on how you can stay safe online:

  • be aware: Privacy risks are there. With hackers, snoops and unsecured sites trying to take your information, it is essential to understand and be aware of the risks so that you can take steps to protect your privacy
  • Select the suppliers you can trust :. When selecting suppliers for privacy products (and other products!), It is essential to choose the ones you can trust. Learn more about he importance of trust in our recent article "You are the product :. The price of Free in the privacy of the growing industry "
  • Look for" https "when browsing, especially when shopping". https. " When browsing and making online transactions, make sure the address of the web page begins with" s "stands for secure and indicates that communication with the website is encrypted
  • Using a VPN when the public Wi-Fi Wi-Fi coffee shops, airports and hotels is convenient, but it can also be unsecure Without a VPN service. encrypt your Internet connection, criminals can intercept traffic to steal data and sensitive communications
  • Using a VPN every time you log in :. a VPN encrypts your Internet connection, protecting your browsing activity, personal communications and data from hackers or weasel third. - where you connect

Golden Frog's efforts to protect privacy on the Internet

Golden Frog continued our fight for online privacy in 2015 -. Here is a look at our efforts over the past year

in 2015, we continued our struggle for privacy and Internet freedom by supporting encryption, pushing the life legislation private and fight against government surveillance. We joined the companies and groups to support the petition Save Crypto, who asked President Obama to stand up for strong encryption. We also fought the backdoor encryption, and President of Golden Frog Sunday Yokubaitis talked to HostingCon 2015 on the subject.

We also made two visits to Washington DC this year, in April and November, where we met with legislators and government officials to discuss the importance of legislation on online privacy and to advocate for ECPA reform. We also fought CISA, the Act respecting the sharing of information on cybersecurity. Golden Frog believes in Internet privacy, security and freedom for everyone, and continue our efforts in 2016.

involved

  • Join the conversation online with the hashtag #privacyaware
  • Share with us how you stay safe online in the comments below
  • Protect your online privacy and free try VyprVPN

4th Annual "Take Back Your Internet" Golden Frog event at SXSW 2016

1:56 PM Add Comment
4th Annual "Take Back Your Internet" Golden Frog event at SXSW 2016 -

We will host our annual SXSW Take Back Your Internet party on 12 March this year. This will be our 4 e Take Back Your Internet event, with previous panels focusing on network neutrality and open internet and online privacy and security .

This year Take Back Your Internet is all about backdoor encryption. Encryption has been a hot topic in the world, with fierce debate taking between governments wanting backdoors in encrypted communications and technology building technology companies in the products. We discuss backdoor head on encryption with our panel, explore why encryption is an essential tool, the need to ensure security and how this is affecting people and the right to privacy in the world. Our panel will include leaders from politics, the base and the business side, all offering unique perspectives on the issue

DETAILS

Panel Discussion :. " Have you the right to privacy The Backdoor Encryption debate ?"

Panelists:

  • Congressman Will Hurd - 23th District of Texas
  • Nuala O'Connor - President and CEO of the Center for democracy and technology
  • Daniel Schuman - manager the demand policies Progress
  • Philip Molter - Co-CTO at Golden Frog
  • Jim Cardle - Publisher and CEO of TexmasInsider.org
  • Alan Fairless - Co-founder and CEO of SpiderOak

Information about the event:

WHAT: Take Back Your Internet Party & Panel - 2016
WHEN: Saturday, March 12th from 6-10pm
OR Old Time Pit BBQ Cooper, 217 Congress Ave, Austin, TX 78701

RSVP:

you can learn more about our event page, and you can RSVP here.

What exactly is data retention and How does it effect me?

12:55 PM Add Comment
What exactly is data retention and How does it effect me? -

What is the data retention?

The retention of data is something that most businesses are engaged. simply storing customer information for billing purposes or repeatedly billing is "data retention." companies retain data for a variety of reasons, the purely practical ( "We keep your email address so we can contact you by letting you know that your balance is due.") for reasons that are more focused marketing or focus on monetization.

Depending on the amount of data stored and how it is used, the privacy of customers can be more or less affected.

What data are the laws of conservation?

data retention laws are laws that require companies to maintain a specific set of data to be retained and / or mandate a specified period for which maintain. Data retention laws are transmitted on a per country

As described by the EFF :. "Most Internet service providers and telecom operators provide subscribers an IP address that changes periodically. Mandatory data retention proposals forcing ISPs and telecommunications providers to keep records of their IP address allocation for a certain period of time. This allows the application of the law to ask ISPs and telecommunications providers to identify an individual based on that had a particular IP address to a specific date and time. "

Why data retention laws exist?

The sole purpose of data retention laws is to ensure law enforcement can request the data. Data retention laws are not enacted to protect consumers or businesses. They only exist so that companies can provide the data if law enforcement feels a need.

law enforcement may still request data, even if data retention laws do not exist, but the data retention laws, there is a legislated penalty if companies do not retain data and law enforcement requests later, and finds that they can not get it.

How users impact of data retention on Internet and privacy?

data retention causes confidentiality problems in monitoring the government, the government has access to the data to snoop, monitor, investigate or otherwise use as they please . Because data must be maintained, it becomes an attractive target for people looking to steal personal information of people for identity theft.

How VPN protect me from the data retention laws?

A VPN encrypts your Internet connection. This means that your ISP or telecommunications company can not see what web sites you visit, your online business or the content of your communications. Golden Frog VyprVPN for example also holds less data than ISP or other fact.

What about data that Golden Frog maintains?

Golden Frog collects a minimum amount of information when you connect to our VPN product (VyprVPN) and retains only for a period of 30 days. We keep

  • Source IP address of the client (usually the IP address assigned by the client ISP)
  • VyprVPN IP address used by the user
  • Connecting start and stop time
  • total number of bytes used

We also collect information for billing subscribers:

  • payment details
  • name customer
  • of billing address information (as required by certain methods of payment)
  • email
  • date and time has started

There. For more information about the reasons for what we record, read our article 10 myths.

How Golden Frog manage your data? If my country passes a law of data retention, will they be able to spy me on servers Golden Frog?

The data of 30 days (referenced above) is stored on our servers in Switzerland. individual servers outside Switzerland maintain some of this data locally for not more than 30 days, usually for less than 7 days, to enable us to transfer to Switzerland reliably. Data retention laws generally do not govern data Accessibility . They govern data retention. Data accessibility is normally governed by the laws in force (warrants, court orders, etc.). Data retention laws legislate while making sure there is data available so that access requests will produce results.

How Golden Frog protect against data retention?

As mentioned above, golden Frog encrypt your Internet connection to protect your information from your ISP or Telecom provider and we store our data on our Swiss servers. We own and manage our own network without third parties so that we can guarantee the highest level of privacy and security.

RSA 2016 underlines the importance of ensuring the IoT

11:54 AM Add Comment
RSA 2016 underlines the importance of ensuring the IoT -

The RSA Conference is the place where professionals cybersecurity meet to discuss the latest technologies and techniques that we protect. If it was never you could be overwhelmed by all the professional intelligence gathered at the Moscone Center. For a week, the Moscone welcomes the brightest minds in the field of cyber defense, threat management and Internet security - but there was a central point almost tactfully dramatized this year - Internet safety of Things (IoT)

[

So why is the Internet of things such a concern for Internet security gurus attending the RSA conference? In other words, each physical device is further connected. From smart watches to refrigerators, several devices are connected to your network. Having so many devices available on a network creates an attractive target for any attacker. By compromising a single device, the whole network becomes vulnerable to exploitation. At the RSA conference, professionals discussed the operation of the network and how the problem can be mitigated by the best security practices. Basically IoT devices are susceptible to hacking; requires additional tools to protect businesses and consumers alike.

At the heart of IoT security concern is not the software, as is often the case with other connected devices, but the hardware. Here is a good way to look at it without being technical: the front door of a house is locked, but the garage has no door at all. Hackers are able to access even basic functions of a device, not only taking control of software functions, but the physical device. Car hacks have been in the news for that reason, as well as the notorious Stuxnet virus that disabled a nuclear facility in Iran. Whether the Internet of Things is attacked by the software or hardware, rest assured there are security tools available.

A Golden Frog, we work every day to ensure our customers are equipped with the best tools for privacy and security. Our team is concerned about the safety of IoT because we know that the implications of a trade network, which is why we regularly see important safety conferences like RSA. To protect the Internet of Things, we recommend using the VyprVPN router. VyprVPN Router extends the best of our premium VPN service to every device connected to your Wi-Fi network.

Apple FBI Hearing postponed at the request of the Department of Justice

10:53 PM Add Comment
Apple FBI Hearing postponed at the request of the Department of Justice -

The hearing Apple v. FBI anticipated to take place today has been postponed. A California federal court has approved the report, which was filed less than 24 hours before the start of the trial.

The deferral request from the Department of Justice, claiming they have new method to unlock encrypted iPhone that became the subject of a fierce debate over the past month.

during the weekend, "a party outside undisclosed" has demonstrated a "possible approach" to unlock the phone, and the Ministry of Justice wants to test this new method. If success, they will not need the help of Apple to access the encrypted iPhone

DOJ spokeswoman Melanie Newman said :. "the Sunday, March 20, 2016, a third party has demonstrated FBI a possible method to unlock iPhone Farook. "..." We first need to test this method to ensure that it does not destroy the data on the phone, but we remain cautiously optimistic. "

the FBI until 5 April to test this method, at which time they are required to file a status report to the court.

This development is certainly good news but probably only a delay in the treatment of real problems in the private life, and the broader issue of whether the government has the right to access information encrypted. whether this new method is successful, the encryption battle is still far from over

Sources: .. International Business Times and USA Today and the Verge

Golden Frog Goes to DC (again!) For the promotion of online privacy legislation

9:52 PM Add Comment
Golden Frog Goes to DC (again!) For the promotion of online privacy legislation -

We are in Washington DC this week to talk to members of Congress about our legislative priorities 2016 to protect digital property. We also attend Tech Prom Annual Dinner CDT. Keep reading for more details and be sure to follow us on social!

Issues

We will talk about several issues this week, to communicate to members of Congress as encompassing mass surveillance of the federal government through seizures and searches of digital information to all citizens without warrant must end. Furthermore, we show that widespread electronic surveillance, interception and other seizures of electronic information infringe on liberty and individual property and violating the Constitution.

Update ECPA

ECPA or the Act on the protection of electronic communications, will be marked by the Judicial Committee of the House on April 13. ECPA sets rules when police and government can read our e-mail, look at our photos and access other content stored in the cloud.

  • The Committee should adopt the bill without significant changes, such as Golden Frog oppose changes that threaten the integrity of the bill.
  • the law passed in 1986 does not take account of current technologies or how citizens use digital information (property).
  • Currently, the information is accessible only with a subpoena, which opens the door to spying and goes too far on constitutional freedoms.

Principles of cybersecurity and privacy

  • government should tend to its own information security before attempting to regulate how companies do.
  • the government should follow due process and legal standards for mandated disclosure of business information.
  • the government should limit the amount of sensitive information it collects, preserves and shares and how long it is kept.
  • effective cybersecurity measures require strong encryption, which should be deployed ubiquitously. The government should encourage the development of encryption technology and to resist policies that compromise the strong encryption.

protect US citizens and small businesses the ability to use encryption services

  • Congress should pass a law protecting the right to encrypt digital information in storage and transit.
  • secure encryption should be available for small businesses and individuals.
  • Encryption is not a national threat to security and should not pull the suspicions of the FBI, NSA and other authorities.
  • Encryption is a form of self-defense, and using encryption to protect data how his digital self is protected and the digital home.

backdoors Ban decreed by the government in mobile phones and computers

  • Congress should pass a law that prohibits government mandates to build backdoors or vulnerabilities in devices Americans / software.
  • The information we generate and store is our property and we have a reasonable expectation of privacy.
  • Any government agency that asks Congress a bill allowing backdoors is misleading legislators. Cryptography experts will tell you there is no such thing as a secure backdoor.

Go to Address Communications Content Collection by amending Article 702 and replacing Decree 12333 with legislative controls by Congress-past

  • FISA section 702 and Executive order 12333 shall be revised to better protect the privacy and eliminate mass surveillance and collection of information.
  • Congress should limit the collection of content by weight and better control and limit access to this information. They should also limit the use and sharing between non-national security agencies, and impose a deadline for the destruction of information.
  • U.S. intelligence agencies have operated without effective supervision for too long.
  • The interception wholesale and storage of user content that occurs without a warrant or probable cause of demonstration should end.

Download PDF outlining our legislative priorities for 2016.

Log on untrusted Wi-Fi now available on iOS for VyprVPN

8:51 PM Add Comment
Log on untrusted Wi-Fi now available on iOS for VyprVPN -

We are delighted to announce that connect to untrusted Wi-Fi is now available on iOS for VyprVPN! With this feature enabled, when you connect to an unknown Wi-Fi network automatically connects VyprVPN and encrypt your Internet connection. This keeps your iPhone, iPad or any other device protected at all times - and as it is automatic, you do not even think about it! Simply select your Wi-Fi networks of trust and apply this setting, then VyprVPN will connect automatically whenever you connect to a Wi-Fi network not on your list.

Log on untrusted Wi-Fi has already been implemented on VyprVPN for Android, Windows and Mac. With the addition of iOS, you can now use this feature on all your desktops and mobile devices.

Learn more about the dangers untrusted Wi-Fi, and the importance of protecting your connection at any time.

Internet blocked in Azamgarh district of India for 72 Hours

7:50 PM Add Comment
Internet blocked in Azamgarh district of India for 72 Hours -

The Times of India reported that the Internet is blocked in Azamgarh, a town in the Indian state of Uttar Pradesh. The block comes in the wake of riots that started Sunday. As explained by India Today, the block was passed to "restrict the rumor mongering and keep control over communication on the Internet."

The Internet block will last 72 hours and comes in the wake of "sectarian tensions" and riots that took place during a class communities over the weekend. text and voice calls are still available

Maintain access to the Internet in Azamgarh and all over India - .. Get VyprVPN now

the Internet censorship in India

This is the first time Internet services were blocked in Indian state of Azamgarh However, the Internet has been blocked previously in riots and conflict to stop the spread of rumors, misleading information and further violence. "Since 2013, Internet services were banned in Jammu -and Kashmir, Gujarat, Jharkhand , Harayana, Rajasthan, Manipur and Nagaland whenever Righteous Kill went out of control. "

Earlier this year, India also proposed a new encryption restrictive law, which was quickly withdrawn due to controversy. India is classified as having Internet experience that is "partly free" by Freedom on the Net, and the blocking of the Government of content / sites authorized by the government by law.

VyprVPN has recently added a server location in Mumbai, India, by providing a local connection point for the region.

Golden Frog Attends Computex 2016, with emphasis on ecosystems and partnerships

6:49 PM Add Comment
Golden Frog Attends Computex 2016, with emphasis on ecosystems and partnerships -

We are at Computex in Taipei, Taiwan this week to join the global information technology and communication (ICT) conference. This conference is all about computers, and the show this year focuses on Partnerships in Internet Computing Ecosystems . As technology continues to evolve rapidly, many new trends appear at this year's show. Four main themes this year are IoT innovation / start-up, business solutions and games. Virtual reality is also proving to be a big trend this year, with many appearances VR around the conference!

The focus of this year could not be more appropriate, as Golden Frog is working hard to cultivate partnerships and create an ecosystem of services and products that are platforms through available. In partnership with the best companies, we can offer our users a complete ecosystem of services to choose from so they can customize a solution to meet their needs. This includes the supply of services across platforms and devices.

Our most recent partnership with QNAP supports this model, as we have expanded our VyprVPN service for use on QNAP devices (coming soon!). We also work to offer solutions for the entire home router as VyprVPN, in response to the ever growing Internet of Things (IoT), the game's popularity and the growing number of connected devices. With so many new devices, and such a range of needs, you can learn more about why you might need a VPN here.

Computex Happenings

As reported by Tech 2, here are some of the highlighted issue advertisements:
  • Asus: always a great player at Computex, Asus has launched several new devices - smartphones Zenphone 3 Series Zebbook computer and Zenbp "Smart" companion robot
  • Intel :. Intel gave a speech, and they announced their Broadwell processor series E 10-core, which is their most powerful desktop processor yet.
  • AMD :. AMD introduced a new graphics card, the Radeon RX 480, which offers premium office and graphics VR
  • Qualcomm: Qualcomm introduced Snapdragon platform upgrade Wear 1100.
  • Acer: Acer debuted a 2-in-1 and various other gadgets
  • MediaTek :. MediaTek introduces express their pump fast charge battery technology.

Read the full article here, and stay abreast of trends in the series on Engadget.

A brief history of VPN

5:48 PM Add Comment
A brief history of VPN -

1-4 people use a VPN in countries worldwide. Their motivations vary, from a desire for privacy and security, to overcome censorship, improve the streaming experience. But what is a VPN, and how is it done? We took a brief look at the history of this technology to provide a picture of how the VPN usage has evolved over time, and where related encryption technology is headed.

Safer Internet is invented

The year is 1996, and Gurdeep Singh Pall, Microsoft has invented (PPTP or Point-to-Point Tunneling Protocol), a method of implementation of virtual private networks. Singh Pall has to allow users to have a secure Internet connection and work effectively and safely at home. This is a significant event which really opened the way for the evolution of VPN.

The evolution of VPN

Over the years, different types of VPN technology emerged. There are different types of virtual private networks (VPN business, personal VPNs) with different protocols (L2TP / IPsec, OpenVPN, PPTP, SSTP). Some VPN software companies use third parties to host their servers (this is not the case for VyprVPN, however - we own and operate our own servers and network). There are also different types of encryption used to protect users (hash, symmetrical, asymmetrical). Overall, the VPN technology is relatively diverse.

Where are we today

Encryption is still evolving and improving more and more technology companies are turning to encryption to ensure the privacy and security of their users. The number of people using VPN in the United States has increased significantly in recent years, but is still lower than it should be. Only about 16% of adults in the US use VPN technology to protect themselves online. VPN use is greater in some regions of the world, with countries such as Indonesia (41%), Thailand (39%) and Turkey (36%) opens the way percentage of the population using private networks virtual, by Global Web Index.

Today, VPNs are used to fight against censorship, government oversight, improve online security and more. As cybercrime continues to increase, it is pertinent that everyone, including users of Internet everyday, understand the tools available and how they can better protect their privacy.

There was more controversy in the space of privacy as late as well, with Apple vs FBI providing encryption (a key technology used in VPN) to the forefront the news cycle and help awareness dissemination and sparking debate. We even organized a panel at SXSW 2016 to continue the conversation and help users understand the importance of encryption.

What's Next

He also are more court battles that occur regarding the use of unbreakable encryption is appropriate or not. A Golden Frog, we believe the end to end encryption without backdoors is always appropriate, because it protects the rights of citizens worldwide privacy and protects against Internet vulnerabilities. More reforms to bills such as ECPA will help us to cyber security in the 21st century. Albeit on bills like the project's investigative powers of UK law continue to progress to the law. Governments around the world must take the initiative to catch up with the rapidly evolving technology of the world and recognize the importance of unbreakable encryption.

As technology and encryption continue to evolve, it is likely VPN technology

will be. We firmly believe that the unbreakable encryption is the only way to ensure safety and security for Internet users, and VyprVPN never compromises your safety and will always keep your privacy intact.

Fight For Frogs: We are more than halfway There

4:47 PM Add Comment
Fight For Frogs: We are more than halfway There -

It has been a month since we launched our campaign to fight for frogs, a collaboration with the Panama Amphibian Rescue Smithsonian and conservation! . The aim of this campaign is to support efforts to save the endangered frog Panamanian golden (and other amphibians threatened)

We wanted to share an update on the campaign, and the exciting news that we have already raised $ 10.950 - bringing the total donation to date to $ 31,00 *. Our goal is to reach $ 50,000, and we will continue to match the donations we receive at this time.

We are very pleased with our progress, so thank you to all those who have already given! We invite everyone to join us as we continue to fight for frogs and save this species that is so near and dear to us here at Golden Frog. There are only about a month left to participate, so donate now before time runs out! Donate Now

* Total includes current match donations, plus the initial donation by Golden Frog.

More

  • Read our introduction blog to learn more about our work and history
  • read more about the science behind Fight for Frogs in the Panama Amphibian Rescue and conservation project blog last post

Beta Mimo Usenet Browser + Golden Frog Usenet Search is now available

3:46 PM Add Comment
Beta Mimo Usenet Browser + Golden Frog Usenet Search is now available -

After adding or fixing almost 450 features based on feedback technology overview of Giganews Diamond members we are delighted to announce the beta release of Mimo and Golden Frog Usenet Search.

We designed these Usenet tools to create a new Usenet experience specifically for Giganews members and we are delighted to work with the best Usenet provider in the world. Giganews servers are powerful: capable of managing growth and retention offering fast download speeds if Article 1 day old or 800+ days

Together, Mimo and Golden Frog Usenet Search are multi -plateforme the world! Usenet browser with integrated search can index all 800+ days of retention Giganews. Not only that, we are able to follow dynamically with retention Giganews as it continues to grow.

We'll keep both Mimo and Golden Frog Usenet Search in the continuing active development, so please request features or report bugs by contacting Giganews media or posting in our newsgroup to giganews.mimo . Giganews is working closely with our development team, allowing us to incorporate feedback from members and fix bugs quickly. Over the coming months we will continue to improve the performance, usability and resiliency of Mimo.

Mimo and Golden Frog Usenet Search are free of Giganews Diamond membership today. Join the new Usenet experience. Become a member now Giganews Diamond.

How to secure your Wi-Fi network?

2:45 PM Add Comment
How to secure your Wi-Fi network? -

Do you take the right steps to protect your information on Wi-Fi networks? YouGov and the Office of the Information Commissioner in the UK conducted a survey that found more than 40% of wireless users do not know how to change the security settings of their network. These parameters are in place to help protect users against cybercrime and identity theft, but if not properly used, network and data users are vulnerable to attack.

Leave your unsecured Wi-Fi allows others to access your personal data, reduces the speed of your connection and can allow others to commit crimes via YOUR connection- all without your knowledge. According to the same survey, 16% of Wi-Fi users do not even know if they use an unsecured network. Your network is secure

Golden Frog VyprVPN provides an easy and cost effective way to protect your personal data - whether on private or public network. VyprVPN provides an additional layer of protection by encrypting your data to ensure a private browsing experience safe without slowing you down. To learn more about VyprVPN, please contact Enterprise Sales Golden Frog today.

New VyprVPN App Beta is now available for Golden Frog customers!

1:44 PM Add Comment
New VyprVPN App Beta is now available for Golden Frog customers! -

Today, we are releasing the beta version of our new VyprVPN App. We have been busy in recent months in developing other tools and online resources. Over the past two months, we launched Dump Truck Online Storage for Giganews members, deployed new VyprVPN server locations in France and the UK, and displayed multiple browser updates Mimo Usenet. Desktop and mobile applications are also planned for Dump Truck in the coming months.

The VyprVPN App installs in less than 30 seconds and configures and simplifies managing your VyprVPN connections automatically. The VyprVPN App lets you switch freely between server locations and VPN protocols with a single click. The VyprVPN App is free for all Golden Frog VyprVPN customers to download it today to try.

Please note that the initial beta of VyprVPN App is Windows-only. We work on Mac OS X and Linux versions and publish these versions in the coming weeks

VyprVPN App Basics :.

  • 30 seconds facility
  • Quick access to the Windows Notification Area
  • Easy one switching click between all VyprVPN VPN server locations
  • Easy one switching click between each VyprVPN VPN protocol
  • support for Windows XP, Windows Vista and Windows 7 (! Mac OS X and Linux coming )

VyprVPN App advanced Features:

  • automatically activate VyprVPN when using an unsecured wireless network (user configurable)
  • automatically detects a lost VPN connection and prompts to reconnect (user configurable)
  • Quick access to your recent VyprVPN server locations and VPN protocols
  • automatically updates the new VyprVPN server locations
  • automatically replaces security certificates for OpenVPN and L2TP

If you are not already VyprVPN customer, we invite you to subscribe to VyprVPN.

Dump Truck for iOS is now available

12:43 PM Add Comment
Dump Truck for iOS is now available -

Available on the App Store We have great news! The App Store has finally approved Dump Truck for iOS and is now available in the App Store. You can now use Dump Truck on your iPhone or iPad to access your files on the go safely. Or, upload your photos and videos from your iOS device and safely store them in Dump Truck.

For all our iOS fans, thank you for patiently wait Dump Truck to be approved in the App Store. We hope you enjoy the new App

Dump Truck for iOS features:

  • Secure access to photos, videos and documents on the go
  • easy downloading photos and videos from your iPhone or iPad to Dump Truck
  • quick access to your favorite files offline

Dump Truck is free download and install on your iOS devices.

Available on the App Store

Join today for FREE Dump Truck 5GB account! Remember, we also include 5GB of FREE Dump Truck with every VyprVPN account.

To follow the Dump Truck, subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+.

dump truck for iOS updated to 1.1 - iPhone 5 support, AirPlay ... More

11:42 AM Add Comment
dump truck for iOS updated to 1.1 - iPhone 5 support, AirPlay ... More -

Dump Truck iOS Dump Truck for iOS was made updated to version 1.1! With iPhone 5 support, the application has been redesigned to improve the responsiveness and performance. The video player has also been updated for better file format compatibility and playback. Support AirPlay has also been added so you can broadcast your videos on Apple TV using AirPlay

Dump Truck iOS Screenshot

What's new in version 1.1 :.

  • redesigned completely to improve the responsiveness and performance
  • iPhone 5 support
  • support AirPlay
  • reading improvements for audio files and video
  • Location corrections
  • Bug fixes

If you have not downloaded Dump Truck for iOS, you can download it from the App Store free.

Download on the App Store

Our development team is working hard around the clock updating and improving our apps and your continued feedback really helps to plan new features and enhancements. We encourage you to share your product ideas and feature suggestions with us ideas Golden Frog: http://ideas.goldenfrog.com or by sending an email to support@goldenfrog.com

And if you do not own. Dump Truck account yet, please sign up for a 5GB account today - they are free

to stay updated with Dump Truck mobile, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+.

CISPA Moves to the Senate regarding confidentiality Continue Mont

10:41 PM Add Comment
CISPA Moves to the Senate regarding confidentiality Continue Mont -

CISPA (Cyber ​​Intelligence Protection Act and sharing) was passed by the House of representatives last Thursday to 288 217. It is now before the Senate despite a myriad of privacy issues. President Obama has been vocal about the lack of protection offered to US citizens. The big questions are whether CISPA can actually do in the US Senate and how citizens can protect themselves if it.

What are the concerns of the most important privacy for US citizens?

Most of the opposition to CISPA focuses on the information to be submitted to the federal government. Under CISPA, online businesses gain the ability to deliver e-mails, user names, passwords, browsing history and other data to the federal government without liability. In addition, ISPs acquire the ability to return information about browsing habits of individual IP addresses. CISPA replace all user agreements signed by users, including the Terms of Use and Privacy Policy.

How likely CISPA is passed by the Senate?

It is difficult to predict the future of CISPA. The original version passed by the House of Representatives in 2012 was quickly abandoned in the Senate in the hands of the obstruction. The growing support of the House is the major difference of this second time. After a lobbying effort of $ 84 million leading proponent of the bill, the number of Democrats who support the bill from 40 to 92. The main sponsors of this effort include Verizon Wireless, Time Warner and Viacom. If this trend is reflected in the Senate, the chance to pass CISPA increases significantly.

President Obama has always said he would veto CISPA if passed in the Senate. If he follows through, then any concern for CISPA could perhaps be laid to rest.

What Proactive steps can people take to protect themselves?

The issue of basic privacy boils down to the open sharing of user data. If CISPA becomes law, there are several proactive steps users can take to minimize the invasion of privacy. The easiest step is to use a VPN. Not only encrypt VPN data to ISP can not see what users are doing, but it also changes the IP addresses of websites related to that particular user. The implementation of best practices of Internet security and protection of additional personal information such as using a different username and password for each online profile can also help. All best practices are designed to both protect privacy and mitigate risk by ensuring the exposure of individual user profiles do not put all the others.

If CISPA would become law, there is no way to accurately predict the implications because the wording is vague. It can potentially undercut each against online privacy principle that was built during the last decade giving the authority of the federal government to access each element of digital information without a warrant or just cause.

Golden Frog was created to keep the Internet open and free, while respecting privacy and user security. In 09, we launched VyprVPN Personal VPN for encrypted Internet connections, protect privacy online, avoid monitoring of online communications and provide access to restricted websites to preserve a free and open Internet. VyprVPN supports all devices and servers in Asia, Canada, Denmark, France, Germany, Netherlands, Russia, Sweden, Switzerland, United Kingdom, the United States and other places in the world.

Dump Truck is now integrated with Otixo

9:40 PM Add Comment
Dump Truck is now integrated with Otixo -

Otixo Dump Truck can now be used on Otixo! Otixo provides cloud aggregation service that allows individuals and businesses work and collaborate across many of their online services from a single application

If you already use Otixo, the Dump Truck connection is easy :.

  • Otixo Installation Instructions for Dump Truck

What Otixo?

Otixo is a web application used for managing files from several online storage accounts from one place. You can search, copy and share files between Dump Truck and other online storage services on both mobile devices and desktop using WebDAV

Otixo also easy project collaboration and effective with spaces, a useful tool combining several collaboration features .:

  • Share your "space" with colleagues by sending invitations and managing your employees quickly and easily space
  • Attach files or folders Dump Truck to your space with just a few clicks
  • Take control of your space by determining which employees have write permission
  • Overview and share comments on files with others to stay informed about your projects
  • Keep track of new comments, files and downloads - use email notifications to stay informed in real time
  • collaborate with others regardless of what the online storage service they use !. Areas creates a neutral place to work on files, so you can keep your versions under control.

Why use Otixo with Dump Truck?

Otixo With Dump Truck and you can easily save your data in multiple places. Simply drag and drop files Dump Truck to other online storage services without having to download them to your computer. Collaborate with friends and colleagues through multiple online storage services and make life easier by managing all your files from one location.

We are constantly adding new installation instructions to help you use Dump Truck with your favorite applications. Share your comments with Golden Frog ideas and help us Dump Truck even better!

To stay updated with Dump Truck, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

New Miami VyprVPN server cluster!

8:39 PM Add Comment
New Miami VyprVPN server cluster! -

VyprVPN Miami Today we are pleased to announce the addition of a new VyprVPN server cluster in Miami! We received feedback about Golden Frog ideas and Miami was a major server location for our members VyprVPN.

We appreciate your comments, so please continue to add and vote on ideas ideas Golden Frog. We will continue to deploy new server clusters through 2013, so do not forget to tell us that the location server you want next!

The new server cluster is available for all VyprVPN protocols, including PPTP, L2TP / IPSec and OpenVPN

How to access the server cluster New Miami :.

  • VyprVPN Desk - If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN -. If you use mobile VyprVPN, just log on and get back to activate Miami as an option
  • Manual configuration - If you manually adjust VyprVPN on your operating system, you can update your hostname to VyprVPN :. us4.vpn.goldenfrog.com

You now have unlimited access to the following VPN server locations:

  • Asia - Hong Kong
  • Canada - Toronto
  • Denmark - Copenhagen
  • Ireland - Dublin New
  • Italy - Rome New
  • Europe - Luxembourg
  • France - Paris
  • Germany - Frankfurt
  • Malaysia - Kuala Lumpur New
  • Netherlands - Amsterdam
  • Romania - Bucharest
  • Russia - Moscow
  • Spain - Madrid New
  • Singapore - Singapore new
  • Sweden - Stockholm
  • Switzerland - Zurich
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Miami New
  • US - Washington

If you want protection for your Internet connection while at home or on the road, try it free for 7 days VyprVPN risk. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.

New VPN Server Cluster in Portugal!

7:38 PM Add Comment
New VPN Server Cluster in Portugal! -

Portugal VPN We have added a new VyprVPN server cluster Portugal!

The new server cluster is available for all VyprVPN protocols, including PPTP, L2TP / IPSec and OpenVPN

How to access the server cluster Portugal :.

  • VyprVPN Desk - If you use VyprVPN Desktop, the new server cluster will automatically be available when you choose the location of your server
  • Mobile VyprVPN -. If you use mobile VyprVPN, simply log on the app and log in Portugal to enable optional
  • Manual configuration - If you manually adjust VyprVPN on your operating system, you can update your hostname to VyprVPN :. pt1 .vpn.goldenfrog.com

Remember, you can connect to VyprVPN server without restrictions on the transfer of data or server switching. We offer unlimited switching between server locations and more than 0,000 IP addresses to server connections are always available

You now have unlimited access to VPN following server locations:

  • Asia - Hong. Kong
  • Canada - Toronto
  • Czech Republic - Prague New
  • Denmark - Copenhagen
  • Europe - Luxembourg
  • Finland - Helsinki
  • France - Paris
  • Germany - Frankfurt
  • Ireland - Dublin
  • Japan - Tokyo New
  • Malaysia - Kuala Lumpur
  • Netherlands - Amsterdam
  • Norway - Oslo
  • Poland - Warsaw
  • Portugal - Lisbon New
  • Romania - Bucharest
  • Russia - Moscow
  • - Singapore
  • Italy - Rome
  • South Korea - Seoul New
  • Spain - Madrid
  • Sweden - Stockholm
  • Switzerland - Zurich
  • Turkey - Istanbul
  • UK - London
  • US - Austin
  • US - Los Angeles
  • US - Miami
  • US - Washington DC

do not forget to visit our microsite ideas to let us know that the server location you want to side

If you want protection for your Internet connection while at home! or on the road, try it free for 7 days VyprVPN risk. Or, if you are a Dump Truck user, simply add VyprVPN your account today!

To stay updated with VyprVPN, please subscribe to Golden Frog blog and follow us on Facebook, Twitter and Google+. Or, if you have an idea or feature request product, please share it with us http://ideas.goldenfrog.com.