Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'privacy'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 517 results

  1. uBlock Origin 1.12.5b3 Changes Refactoring of static filtering engine: to be more modular and hence make it easier to extent filter syntax to lessen overhead overall to address #2598 to extend filter syntax to support csp= filter option See #1930 (comment). This is an important refactoring and thus I want to make these changes available as soon as possible so that possible regression bugs can found. At first my intention was to add support for csp= filter syntax, but this required some refactoring, and while at it I decided to address a lot of other details regarding static filtering engine which I meant to address since a while, hence the extent of the changes to the code. Downloads 1.7 MB uBlock0.chromium.zip 1.59 MB uBlock0.firefox.xpi 1.71 MB uBlock0.webext.xpi Source code (zip) Source code (tar.gz) https://github.com/gorhill/uBlock/releases/tag/1.12.5b3
  2. Muhammad Rabbani, a UK citizen, and director of the CAGE human rights organization, is facing a possible three-month prison sentence for not disclosing his phone and laptop's password at Heathrow airport in London, last year. According to Rabbani's account, UK authorities have stopped him while returning from a trip abroad, where he was investigating a sensitive case of human torture. UK counter-terrorism officers invoked the "Schedule 7" section of the UK Terrorism Act, a law that allows UK authorities to detain and question any person entering or leaving the country, regardless if he's a British or foreign national. Rabbani stopped at least 20 times before Rabbani says he was stopped at least 20 other times by UK authorities under Section 7, but this time around officers wanted to check his electronic devices. Since Rabbani stores information on highly sensitive subjects, all devices were password protected. Due to the sensitive nature of this information, Rabbani politely declined to provide the password to the UK counter-terrorism officer. After three and a half hours of questioning, Rabbani was arrested for failing to cooperate with authorities. The CAGE director was later released on bail, on the same day, nine hours later. He is scheduled to appear in court this week and will find out if UK authorities plan to file charges for failure to cooperate under Section 7, which carries a sentence of up to three months in prison. Rabbani claims UK authorities are abusing the law All of this because Rabbani did not want agents to copy the content of his electronic devices after he gave them the passwords. All his devices remained in police custody after his arrest. Rabbani argues that there was no reason to stop him for questioning, as he didn't have a criminal record, wasn't arrested before, and has been questioned many times before. Furthermore, the officer questioning him said told Rabbani he was not suspected of any wrongdoing, yet he was still arrested just because he refused to give up his passwords. Rabbani and his organization are now claiming UK officials are using Section 7 outside of its scope. "Schedule 7 is an enormous blunderbuss that is over-used and the consequence of its overuse is that it is abusive," Rabbani says. "It affects almost every Muslim in ever-increasing numbers who contemplates traveling. It is not just the sheer number of Muslims stopped but that the same people are stopped repeatedly. Once on the system, you are flagged up for life." "Statistics [infographic] show that Schedule 7 stops amount to racial profiling, with 88.4% detained coming from an ethnic minority background. Only 5 people were arrested out of roughly 20,000 that were stopped last year," added Ibrahim Mohamoud, spokesperson for CAGE. "Clearly, huge numbers of innocent people are being interrogated and their data confiscated from them. Where is all this data being stored? With whom is it being shared? How does one remove themselves from these databases? These are some of the wider questions that Mr. Rabbani wishes to raise." Rabbani and CAGE have set up a campaign website to support his cause. Not the first case Last year, a Florida judge ruled that a man suspected of voyeurism must provide his iPhone password to police to verify accusations. Earlier this year, the US was debating a measure to force visa applications to reveal passwords for their social media accounts if they want to receive passage to the United States. Source
  3. uBlock Origin 1.12.5b1 Changes Refactoring of static filtering engine: to be more modular and hence make it easier to extent filter syntax to lessen overhead overall to address #2598 to extend filter syntax to support csp= filter option See #1930 (comment). This is an important refactoring and thus I want to make these changes available as soon as possible so that possible regression bugs can found. At first my intention was to add support for csp= filter syntax, but this required some refactoring, and while at it I decided to address a lot of other details regarding static filtering engine which I meant to address since a while, hence the extent of the changes to the code. I won't be pushing this revision to the dev channel channel of uBO on AMO until the changes here are committed into the master branch (they are currently committed in the csp branch) Downloads 1.68 MB uBlock0.chromium.zip 1.56 MB uBlock0.firefox.xpi 1.68 MB uBlock0.webext.xpi Source code (zip) Source code (tar.gz) https://github.com/gorhill/uBlock/releases/tag/1.12.5b1
  4. Tails 3.0 Anonymous Live OS Enters Beta, Ships with Linux 4.9 and GNOME 3.22 It will only work on 64-bit desktop and laptop computers The next version of the Tails 2.x series will be 2.11, currently scheduled for launch in early March, but it looks like the development of the Tails 3.0 major release continues in the background, and now users can get their hands on the Beta build. Tails 3.0 Beta comes two and a half months after the Alpha milestone released last year in November, when the project's developers announced that they would drop support for 32-bit systems, allowing the amnesic incognito live system to run only on 64-bit PCs. As usual, we took the Beta version of Tails 3.0 for a test drive to see what's new, and we can report that it's based on the upcoming Debian GNU/Linux 9 "Stretch" operating system and it's powered by the long-term supported Linux 4.9 kernel. GNOME 3.22 is the default desktop environment with redesigned Greeter However, probably the coolest new features of Tails 3.0 is the revamped Tails Greeter, a small dialog that will pop-up when you run the live system for the first time on your computer, helping you set up the default language, keyboard layout, formats, and other settings. Of course, Tails 3.0 will come pre-installed with all the anonymity tools that you love, including the recently introduced OnionShare utility for anonymous file sharing. The latest Tor and Tor Browser applications are also included to keep your identity safe from hackers and hide from government agencies. Numerous bugs have been squashed in this new pre-release version of Tails 3.0, but many known issues remain unresolved, and you can read all about them before jumping on the beta testing bandwagon in the official release notes. Without further ado, you can download the Tails 3.0 Beta Live ISO image right now, write it on a USB flash drive, and take it for a test drive on your modern, 64-bit computer. If you decide to stick with it, please keep in mind that it's a pre-release version, not suitable for production use, despite the fact that it will receive security updates. Source
  5. Windscribe VPN 1.70 Build 3 Stable Internet As It Should Be Windscribe is a desktop application and browser extension that work together to block ads and trackers, restore access to blocked content and help you safeguard your privacy online. Learn More. What's New: https://blog.windscribe.com/windscribe-1-7-changelog-8afa50f3b297 We’ve been working on this version for quite a while, existing installations should prompt you to update the app over the next 48 hrs. Here is what’s new. Changelog: Added city level location selection Added Automatic Connection mode Added support for 22 languages Added custom TAP adapter Added “Ignore SSL Errors” option Added notifications when firewall is ON and application not connected Added “Advanced Parameters” screen Added EULA to the installer Added IPv6 connectivity disable button, to prevent WebRTC leaks over IPv6 in some situations Added Touch support Added Beta channel Fixed auto-start bug on some systems Fixed Internet connectivity check Fixed persistent session storage Fixed API connectivity on restrictive networks Fixed unquoted service path Fixed disappearing Best Location Fixed WSD port connectivity while firewall is ON Fixed PlayStation UPNP connectivity while firewall is ON Fixed reconnection bug on computer wake up on some systems Changed the Preferences screens Changed the connecting spinner animation Downloads: Windscribe for Your Computer: Windscribe for Your Browser: Windscribe for Your Phone: Windscribe for Your Router:
  6. Dear friends, Nowadays our privacy is very important. I am interested to know which VPN service do you use and which is the best according to your opinion. Not to all vpn services are enough secure. Recently, has been discovered that HotSpot Shield in some cases could show your real ip. Have a look here : 1.Android 2. Windows Thanks for your time spent with this poll ! :)
  7. Facebook's marketing department is using algorithms to identify emotionally vulnerable and insecure youth as young as 14, The Australian reported today after reporters managed to get their hands on a 23-page report from Facebook's Australian office. The document, dated this year and flagged as "Confidential: Internal Only," presents Facebook's advertising capabilities and highlights the social network's ability to detect, determine, and categorize user moods using sophisticated algorithms. The leaked file, authored by two of Facebook Australia's top execs is a presentation that the company is willing to share with potential customers only under a "non-disclosure agreement only." Facebook using algorithms to categorize emotional states In it, Facebook reveals that by monitoring posts, photos, and interactions, they can approximate a person's emotional state into categories such as "silly," "overwhelmed," "anxious," "nervous," "defeated," "stressed," "stupid," "useless," or a "failure." Facebook claims that it can identify not only emotions and state of mind, but also how and when this changes in real-time and across periods of time. While this was to be expected from a company as advanced as Facebook, the document reveals the social network won't shy away from using its algorithms against youth as young as 14, data which it then makes available to advertisers, so they can target teens that feel insecure or are emotionally vulnerable. The social network is using these points to lure in advertisers to its network, alluding it could help in targeting users, including young teens, in their most vulnerable states when most people tend to buy products and make themselves feel better. The document specifically mentions Facebook's ability to target over 6.4 million "high schoolers," "tertiary students," and "young Australians and New Zealander [...] in the workforce." Facebook confirmed validity of leaked document Contacted by reporters, Facebook admitted the document was real, apologized, and said it would start an investigation into the practice of targeting its younger userbase. Current privacy laws allow companies to collect data on users if its anonymized and stripped of any personally-identifiable information, such as names, precise addresses, or photos. Facebook said it respects privacy laws, but reporters said Facebook is in breach of the Australian Code for Advertising & Marketing Communications to Children, an advertising guideline which states that advertisers must get permission from the child's parent or guardian before collecting any data. Facebook, who currently boasts of a total monthly active userbase of over 1.85 billion, is the second online advertisers behind Google. A recent report revealed that Google and Facebook are cannibalizing 99% of all the money in digital advertising, and have established a de-facto duopoly. In 2014, news broke out that Facebook meddled with people's news feed algorithms to test if it could influence people's moods. Source
  8. uBlock Origin 1.12.3b1 Closed as fixed: Firefox Unable to access logger/dashboard from popup upon session restore Core GUI "gear" Blocked by Temporary Elements Punycode phishing attack detection Potentially ambiguous base domain names in the popup panel will be labelled idn (as in "Internationalized Domain Name"), to inform the user that the domain name contains Cyrillic characters which could be confused with some ASCII characters. Further reading: IDN homograph attack. Tabnapping prevention More longer timeout time Better handling of timeout conditions for slow connections. Add adblock-iran filter list to regional lists Downloads 1.67 MB uBlock0.chromium.zip 1.56 MB uBlock0.firefox.xpi 1.67 MB uBlock0.webext.xpi Source code (zip) Source code (tar.gz) https://github.com/gorhill/uBlock/releases/tag/1.12.3b1
  9. Proton VPN 0.9.7 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v0.9.7.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/
  10. Proton VPN 0.9.6 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v0.9.6.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/
  11. uBlock Origin 1.12.3b0 Closed as fixed: Punycode phishing attack detection Potentially ambiguous base domain names in the popup panel will be labelled idn (as in "Internationalized Domain Name"), to inform the user that the domain name contains Cyrillic characters which could be confused with some ASCII characters. Further reading: IDN homograph attack. More longer timeout time Better handling of timeout conditions for slow connections. Downloads 1.67 MB uBlock0.chromium.zip 1.56 MB uBlock0.firefox.xpi 1.68 MB uBlock0.webext.xpi Source code (zip) Source code (tar.gz) https://github.com/gorhill/uBlock/releases/tag/1.12.3b0
  12. Bypass For Windows Update Lock For Next-Gen Processors Found A first workaround for the blocking of Windows Update on Windows 7 or 8.1 PCs with next-generation processors has been discovered. Microsoft blocked the delivery of Windows Updates recently to Windows 7 and 8.1 devices powered by a next-generation processor. The company announced the support change in January 2017. Broken down to the essentials, it means that Intel Kaby Lake and AMD Bristol Ridge processors are only support by Windows 10, and not older versions of Windows. To hammer that home, Microsoft made the decision to block Windows Update on Windows 7 or 8.1 PCs with those next generation processors. The company introduced patches, KB4012218 and KB4012219 for instance, which introduced process generation and hardware support detection on Windows 7 and 8.1 systems. Windows users who run Windows Update get the unsupported hardware error prompt when they try to scan for and download the latest patches for their -- still supported -- operating system. Bypass for Windows Update lock for next-gen processors GitHub user zeffy made the decision to take a closer look at how the actual blocking is done on the operating system level. What he did was the following: Download the Patch KB4012218 from Microsoft. Extract the content of the MSU file using the expand command line tool. Expand basically extracts all files that are part of an update file so that you can analyze each individually. This resulted in a long list of files. He used PowerShell to filter the files for anything starting with "wu" to filter out Windows Update related files. He then ran diff tools to compare the binaries of the files in the new update file with those on the actual operating system. He discovered the dynamic link library wuaueng.dll, and found the two functions IsCPUSupported(void) and IsDeviceServiceable(void) in it. Now that he found the culprits that blocked the installation of updates on machines with next generation processors, he came up with a solution for that. His preferred solution jumps over the whole "IsDeviceServiceable(void)" body so that Windows Update is notified that the CPU on the machine is supported. The solution requires the patching of the dll file. He has uploaded the patched files for 32-bit and 64-bit versions of Windows 7 and Windows 8.1 to the GitHub project page. The source code has been made available there as well for you to check. The patches come as scripts that you just need to run to make the necessary changes. Windows Update should work just like before then even on Windows 7 or Windows 8.1 systems with next generation processors Attention: it is recommended that you create a backup of the wuaueng.dll file before you patch it. Even better, create a backup of the system partition just to be on the safe side of things. One caveat of the method is that any new version of wuaueng.dll that Microsoft releases requires new patching. Microsoft may device other means to block updates on those systems as well in the future. (via Sergey) Now You: What's your take on Microsoft blocking updates for customer systems? Source
  13. Ad-blocker usage is surging. According to a 2016 report from PageFair, over 615 million devices were blocking ads by the end of 2016. Most simply want to browse the web uninterrupted by intrusive ads. In that case, ad-blockers do the job. Others, however, expect their ad-blocking tool to limit advertisers’ ability to track them online. These users might be surprised to know it has little impact, and might actually make you more visible. A 2010 report by the Electronic Frontier Foundation made us all painfully aware that web browsers did little to protect identifying information. After updating the details for 2017, a group of French researchers found that even the most advanced ad-blocking tools do little to stop that years later. To be fair, it’s not just ad-blockers. Any extension — when paired with other identifying information — helps to create a unique fingerprint for web users. But being identified by extensions like Ghostery, a tool that helps prevent websites from tracking you, is a bit of a kick in the pants. Running the test on my own browser — with an ad-blocker that claims to prevent me from being tracked and hide identifying information from advertisers — showed that my identity had a fingerprint unique to the 4,766 others who had submitted to the experiment. You can try it here. Within seconds the test told me which plugins I was using (on Chrome), what social networks I was logged into, and a handful of other identifying traits that could actually make it easier for advertisers to track me. My browser fingerprint, after all, is completely unique — and even at scale there will be few others with my exact screen resolution, time zone, installed plugins, logged-in social networks, etc. Ethical issues aside, ad-blockers are mostly up to the task at blocking content you don’t want to see. If you’re relying on them for some semblance of privacy from the pyring eyes of advertisers, stop. There’s no fail-safe solution, but the researchers suggest using Firefox — which isn’t perfect, but leaks fewer identifying details than others. Also, log out of social networks when not in use (or Google), and turn off third-party cookies in your browser preferences. Aside from that, using fewer plugins helps, as does browsing in incognito mode — which limits which extensions are allowed to run. Browser Extension and Login-Leak Experiment on Inria Article source
  14. AppFalcon - Lifetime + 1 Year[365 Days] Database Updates - Unlimited PC License Promo by Chip.de & Orman Kuza Overview: UNINSTALL STUBBORN PROGRAMS! FORCE DELETE ANY FILE! Get rid of all installed CrApps See better alternatives with AppFalcon® Get rid of all installed CrApps, see alternatives, remove malware, update your apps to stay secure online! Features: Uninstall Any Program - Can remove any leftovers created by programs “Deletes what other tools can’t” - FORCIBLY DELETE ANY FILE, “UNINSTALLS AND DELETES PROGRAMS LIKE NO OTHER TOOL” Get better alternatives - Save Money on Software: GET HAND-PICKED ALTERNATIVES, REMOVE CRAPPS Detect and Remove CrApps Force Removal Improve PC Security 24/7 e-mail support More Info: Product Homepage, FAQ, Privacy Policy Supported OS: 32-bit and 64-bit versions of Windows Vista; Windows 7; Windows 8; Windows 8.1, and Windows 10. AppFalcon not only supports 32-bit and 64-bit operating systems but it supports them natively. This means that it uses the full potential of 64-bit on Windows x64 and 32-bit on Windows x86. Links: Offer: https://www.ormankuza.com/AppFalcon/chip-special/ Note: Limited Period Offer. Current Status: Open. Terms: Unlimited PC License - Can be installed in any number of devices. Personal Use Only. You'll receive lifetime free updates and 1 year database updates during the term of the license. 24/7 e-mail support. Steps: Visit the above promotional page and scroll-down to locate the request form. Enter your name and email and Click on "Submit". After receiving a registration email, you'll get another email with the license key details within 24 hours. FYI: Mostly within 2-3 or 5 hours. Install and Activate ASAP. To enter license and activate, just go to the upright corner of the application and click on the “?” (question mark). Downloads: AppFalcon v2.4.0.1 - Size: 7.02 MB: https://www.ormankuza.com/instantdelivery/afsetup.exe AppFalcon v2.4.0.0 Portable[Unofficial] - Size: 6.4 MB:
  15. Russian authorities have arrested a mathematics teacher from Moscow on accusations of organizing riots and calling for terrorist activities or justifying the use of terrorism via the Internet. The suspect, Dmitry Bogatov is a 25-year-old mathematics lecturer at Moscow's Finance and Law University, and he was known for running a Tor exit node from his home. Someone used Bogatov's Tor node to incide protests The suspect's arrest comes after the April 2 anti-government protests in Moscow. Authorities seem to believe that Bogatov is an online user that went by the name of "Airat Bashirov," who posted several inflamatory messages on the sysadmin.ru website. These messages, posted on March 29, before the protests, urged participants to come to the Red Square protests armed with "bottles, fabric, gasoline, turpentine, foam plastic." According to a HackerNews post, Bogatov's friends believe Bashirov used Tor to post those messages online, and Bogatov's Tor server was the exit node of that particular message, leaving Bogatov's home IP address behind. Authorities arrested Bogatov on April 6 but released him a day later, on the condition he does not travel outside Moscow. Two days later, the same judge turned on his decision and ordered Bogatov back into arrest for 72 hours, a decision he ammended on Monday, April 10, when he ordered the suspect's arrest for two more months. Bogatov is now in a pre-trial detention center, where he'll remain until June 8, as authorities are investigating seized equipment. Bogatov wasn't even home at the time of the incidents According to Russian news media [1, 2, 3], Bogatov's lawyer has already contested the charges. The lawyer submitted video recordings of Bogatov at a local gym and a grocery store, at the time the incediary messages were posted online. Furthermore, the "Airat Bashirov" user continued to post on the sysadamin.ru even while Bogatov was in police custody. It also didn't help that before his arrest, Bogatov publicly described himself as an anarchist on his homepage. Currently, Bogatov's Tor node is down. Source
  16. Horrifying: Facebook Users Are Reporting Getting Friend Requests From The Dead Back from the dead: Facebook users getting friend requests from deceased family members and friends What happens when you get a friend request on Facebook from someone you know; however, this someone in this case is not alive? You will be stunned, petrified, scared, etc. right? That is what is happening to some of the users of Facebook who have reported of getting friend requests from dead friends and family members. While dealing with a closed one’s death and handling their Facebook accounts after their death in itself is horrifying, and with such friend requests coming in, it is only causing more grievances for such people. However, what is more worrying is the fact that cyber-criminals and scammers are using this social media platform to trick people to steal money from them or for running some other frauds. So, how does this whole thing work? Basically, such friend requests are likely the result of cloning or hacking scams. For instance, the first method involves cloning someone’s account (in this case, the profile of the deceased) and stealing all the information in that profile, which is then used to setup a new account that is actually controlled by someone else. Further, the other method involves hacking into a deceased’s Facebook account and taking control of that account. In both the cases, the scammers have a complete hold over the account, which allows them to send messages, while pretending to be someone’s friend. Then, the scammer sends friend requests to the friends of the account they cloned or hacked into, in the hope that a number of them will accept the request under the thinking that it is the friend that has either created a new account of that they were accidentally deleted and being duly re-added. Once an invitation has been accepted, the scammer can now see information on that account. The scammer can then carry various kinds of scams, hoaxes and cons on the person who accepted the friend request. For example, the trick known as “friends in crisis” scam, where a person claims they are stuck somewhere and need money to get out of a problem. Or the fake account may be used to send users links to malicious websites that will attempt to install malware onto their computer when visited. Or they will be sent to a survey scam, which gather personal information by luring them into completing intrusive questionnaires. Or the fake account may be used to check on a person’s statuses and other information to impersonate them or steal from them. The above tricks and scams are applicable for those Facebook users who are alive too. If you too come across such a horrifying friend request on Facebook, please submit a request to either have the account of the dead to be memorialized (so that it will still be visible on Facebook, but no one will be able to log into it) or deactivated. This request can be made by filling the contact form given here. You can also find more information on how to report a deceased person or memorialize an account on Facebook by clicking here. Source
  17. Initial Opera Developer 46 Release It’s unusual to have a new developer version on Friday, thus we also have an unusual non-default screenshot to start with – all in dark. Important things first This initial build of Opera 46 comes with important fixes for the out of memory bug when using VPN and one nasty crash that might appear during startup. It’s important for us to verify them – our lab tests suggest there should be no further problems, but to be completely sure we need your help. Weekend comes, so browse a lot. Further UI changes In addition there are multiple UI-related fixes. The most visible ones are addressing the misbehaving tooltips both in normal and private mode. Changes specific to Mac, such as removing little visual glitches and minor fixes for ad blocker, have been made. Under the hood This version comes with an updated Chromium (59.0.3047.4) and enabled expensive background tabs throttling (opera://flags/#background-tab-throttling-max-delay-30s). You can try it out yourself: background timer throttling demo. If you encounter any problems related to background tabs and their behavior let us know. Detailed list of changes in the changelog. Installation links: Opera developer for Windows (Using Opera developer for Windows installer means Opera for Computers EULA is accepted) Opera developer for Windows (Portable version) Opera developer for macOS Opera developer for Linux – deb packages Opera developer for Linux – RPM packages Source Direct Download - Offline(Standalone) installer[Win/Linux/Mac]: https://get.geo.opera.com/pub/opera-developer/46.0.2556.0/
  18. Opera 45 With Reborn Goes Beta Today, project “Reborn”, Opera’s redesign process reaches the beta stage. It’s full of user interface improvements, but it also brings you quite a few new features. Read on and enjoy one of the longest list of changes in the Opera’s beta channel history! What is Reborn? It’s more than just a UI refresh. Reborn is a codename for the project that is gradually redesigning the entirety of Opera’s user experience. Bringing along a fresh look, it has a set of new, handy features, new icons, colors, wallpapers, and a touch of animation. Reborn is inspired by Opera Neon and shares its vision of making Opera’s UI truly modern, simplified, refined, and playful. Brand new look and feel Opera’s entire layout has been updated with a new, high-quality graphical design that is more consistent across platforms. The tabs are simplified, lighter, and more elegant, making it easier to locate open tabs. The new sidebar is more subtle and refined with a touch of animation. The Speed Dial has also been renovated with smooth animations. Browser sidebar Opera’s sidebar has been moved from the Speed Dial to the main browser window, similar to how it is in Opera Neon. It provides one-click access to important tools such as bookmarks, history, personal news, and extensions. You can customize the tools that appear in the sidebar according to what you find useful. The new sidebar will be visible by default for new users installing Opera beta for the first time. Current users of beta will find the option to turn it on by flipping the pin/unpin switch at the bottom left of the Speed Dial. Chat with your friends while browsing Chatting with your friends while browsing the web doesn’t always work seamlessly. Switching between tabs when responding to a message is cumbersome and inefficient. Reborn allows you to keep your favorite messenger as a side tab for an easy reach. Three popular communicators are now available directly in the sidebar: Facebook Messenger, WhatsApp, and Telegram. To use any of them, simply click their icon. After you log in to the site, there are two ways of using this feature: you can open it in overlay or pin it side-by-side with your current tab. Pinning a communicator allows you to combine online chatting with a full browsing experience. If you use more than one messenger, you can easily switch between them by using our shortcut key for quicker access (⌘ + ⇧ + m on macOS, CTRL + SHIFT + m on Windows and Linux). The three-dotted menu button allows you to log out from your sidebar communicator without needing to visit the communicator’s website. From the menu, you can also mute your communicator’s notifications. Give your browser a new coat of colors Opera is now available in two color themes: light and dark. You can also select one of the cool backgrounds that perfectly complement Opera’s new look and feel. For this beta release, we have prepared some completely new ones. Let us know which one you like the most. Both the background wallpaper and the browser’s color theme can be managed in the “customize start page” panel and in browser settings. Fresh and refined icons Opera’s “rebirth” also means a complete icon overhaul. New icons are even more refined and elegant, and some even change colors when active. We have carefully optimized the icons for various DPIs in order to make them look perfect. Animations Animations make the Reborn interface more alive and playful. The most visible one can be found when opening private mode. Windows 7 look and feel One of Reborn’s goals is to bring a more consistent look across all platforms. This doesn’t mean Reborn will disregard the browsing experience users have been familiar with on different platforms, such as Windows 7. Despite all the changes, Reborn has retained Windows 7’s well-known platform feeling with transparent borders and a system button to close, maximize, and minimize a window. Narrow sidebar for macOS The sidebar in the Mac version can be now as narrow as on Windows. To adjust it, go to Settings -> Browser -> Sidebar -> “Enable Narrow Sidebar,” or use the sidebar context menu. New bookmark pop-up Opera now brings you a new pop-up when adding bookmarks which includes the “Finished” button. This option gives a clearer way of adding bookmarks for users who missed the confirmation that a new website was already added to the bookmark folder. Ad blocker improvements Opera automatically reloads a page when toggling ad blocking on or off for that page. It’s especially useful if you want to quickly flip the switch and it gives you much more control and comfort while browsing with ad blocker. Also, we have added some important changes to the block list management. Now, you have control over which block lists are loaded. Easylist and EasyPrivacy are turned on by default. Other lists, including regional and custom lists, can now be managed through the “Manage Lists…” dialog. Let us know if there are any other lists that you would find beneficial. Also, Opera now offers support for more advanced CSS selectors, which helps you block more ads. Spring cleanup for languages As part of a spring cleanup we have removed support for the least-used languages in the browser user interface. While we would like to support as many languages as possible, this decision frees up our time for other important tasks. The discontinued languages are Azerbaijani, Macedonian, New Norwegian, Uzbek, Afrikaans, Croatian, Kazakh, Zulu, Frisian, Punjabi, Gaelic, Irish, Myanmar, Sinhala, and Urdu. After this, Opera supports 48 different languages. Performance and security changes H.264 video works in Windows 8.x again and it now has the same hardware support as Windows 7 and Windows 10, both given in the last developer release. Opera adds in-form warnings for sensitive fields when the top-level page is not HTTPS. Whenever you start filling in your password or credit card number on a page, which is not HTTPS, the warning will appear. If you’ve made it this far, go on and check out the changelog with all the backports listed. Installation links: Opera beta for Windows (Using Opera beta for Windows installer means Opera for Computers EULA is accepted) Opera beta for Windows (Portable version) Opera beta for macOS Opera beta for Linux – deb packages Opera beta for Linux – RPM packages Source
  19. Used An iPhone And Social Media Pre-2013? You May Be Due A Tiny Payout Twitter, Instagram, and others are stumping up $5.3m to settle a privacy suit with implications for those who used social-media apps on an iPhone in 2012 or earlier. Given the millions who downloaded the social-media apps in question, it's likely the settlement will result in a very small payment for each individual. Eight social-media firms, including Twitter and Instagram, have agreed to pay $5.3m to settle a lawsuit over their use of Apple's Find Friends feature in iOS. The main problem that complainants had with the accused firms was that their apps, which used Apple's Find Friends, didn't tell users that their contact lists would be uploaded to company servers. The lawsuit alleged the privacy incursions occurred between 2009 and 2012, the year the class action suit began. Instagram, Foursquare, Kik, Gowalla, Foodspotting, Yelp, Twitter, and Path have agreed to pay in to the settlement fund, which will be distributed to affected users via Amazon.com, according to Venture Beat. Yelp had previously argued it was necessary to store user contact lists to enable the Find Friends feature, which consumers understood would occur in the context of using a mobile app. However, US District Judge Jon Tigar countered that the key question was whether Apple and app developers "violated community norms of privacy" by exceeding what people reasonably believe they consented to. "A 'reasonable' expectation of privacy is an objective entitlement founded on broadly based and widely accepted community norms," said Tigar. If the judge approves the settlement, Apple and LinkedIn would be the only remaining defendants among 18 firms originally accused of the privacy violation. Given the millions of people who downloaded these apps, it's likely the settlement will result in a very small payment for each individual. However, people who took part in the class action suit could receive up to $15,000 each. Source
  20. Proton VPN 0.9.5 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v0.9.5.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/
  21. We pay our monthly Internet bill to be able to access the Internet. We don’t pay it to give our Internet service provider (ISP) a chance to collect and sell our private data to make more money. This was apparently lost on congressional Republicans as they voted to strip their constituents of their privacy. Even though our elected representatives have failed us, there are technical measures we can take to protect our privacy from ISPs. Bear in mind that these measures aren’t a replacement for the privacy rules that were repealed or would protect our privacy completely, but they will certainly help. Pick an ISP that respects your privacy It goes without saying: if privacy is a concern of yours, vote with your wallet and pick an ISP that respects your privacy. Here is a list of them. Given the dismal state of ISP competition in the US, you may not have this luxury, so read on for other steps you can take. Opt-out of supercookies and other ISP tracking In 2014, Verizon was caught injecting cookie-like trackers into their users’ traffic, allowing websites and third-party ad networks to build profiles without users’ consent. Following criticism from US senators and FCC action, Verizon stopped auto-enrolling users and instead made it opt-in. Users now have a choice of whether to participate in this privacy-intrusive service. You should check your account settings to see if your ISP allows you to opt-out of any tracking. It is generally found under the privacy, marketing, or ads settings. Your ISP doesn’t have to provide this opt-out, especially in light of the repeals of the privacy rules, but it can never hurt to check. HTTPS Everywhere EFF makes this browser extension so that users connect to a service securely using encryption. If a website or service offers a secure connection, then the ISP is generally not able to see what exactly you’re doing on the service. However, the ISP is still able to see that you’re connecting to a certain website. For example, if you were to visit https://www.eff.org/https-everywhere, your ISP wouldn’t be able to tell that you’re on the HTTPS Everywhere page, but would still be able to see that you’re connecting to EFF’s website at https://www.eff.org While there are limitations of HTTPS Everywhere when it comes to your privacy, with the ISP being able to see what you’re connecting to, it’s still a valuable tool. If you use a site that doesn't have HTTPS by default, email them and ask them to join the movement to encrypt the web. VPNs In the wake of the privacy rules repeal, the advice to use a Virtual Private Network (VPN) to protect your privacy has dominated the conversation. However, while VPNs can be useful, they carry their own unique privacy risk. When using a VPN, you’re making your Internet traffic pass through the VPN provider’s servers before reaching your destination on the Internet. Your ISP will see that you’re connecting to a VPN provider, but won’t be able to see what you’re ultimately connecting to. This is important to understand because you’re exposing your entire Internet activity to the VPN provider and shifting your trust from the ISP to the VPN. In other words, you should be damn sure you trust your VPN provider to not do the shady things that you don’t want your ISP to do. VPNs can see, modify, and log your Internet traffic. Many VPN providers make promises to not log your traffic and to take other privacy protective measures, but it can be hard to verify this independently since these services are built on closed platforms. For example, a recent study found that up to 38% of VPN apps available for Android contained some form of malware or spyware. Below, we detail some factors that should be considered when selecting a VPN provider. Keep in mind that these are considerations for someone who is interested in preventing their ISP from snooping on their Internet traffic, and not meant for someone who is interested in protecting their information from the government—a whistleblower, for instance. As with all things security and privacy-related, it’s important to consider your threat model. Is your VPN service dirt-cheap or free? Does the service cost $20 for a lifetime service? There’s probably a reason for that and your browsing history may be the actual product that the company is selling to others. How long has your VPN provider been around? If it is relatively new and without a reliable history, you’d have to trust the provider a great deal in order to use such a service. Does the VPN provider log your traffic? If yes, what kind of information is logged? You should look for one that explicitly promises to not log your Internet traffic and how active the VPN provider is in advocating for user privacy. Does the VPN provider use encryption in providing the service? It’s generally recommended to use services that support a well-vetted open source protocol like OpenVPN or IPSec. Utilizing these protocols ensures best security available. If your VPN provider uses encryption, but has a single shared password for all of the users, it’s not sufficient encryption. Do you need to use the VPN provider’s proprietary client to use the service? You should avoid these and look for services that you can use with an open source client. There are many clients that support the above-mentioned OpenVPN or IPSec protocols. Would using the VPN service still leak your DNS queries to your ISP? Does the VPN support IPv6? As the Internet transitions from IPv4 to the IPv6 protocol, some VPN providers may not support it. Consequently, if your digital device is trying to reach a destination that has an IPv6 address using a VPN connection that only supports IPv4, the old protocol, it may attempt to do so outside of the VPN connection. This can enable the ISP to see what you’re connecting to since the traffic would be outside of the encrypted VPN traffic. Now that you know what to look for in a VPN provider, you can use these two guides as your starting point for research. Though keep in mind that a lot of the information in the guides is derived from or given by the provider, so again, it requires us to trust their assertions. Tor If you are trying to protect your privacy from your Internet company, Tor Browser perhaps offers the most robust protection. Your ISP will only see that you are connecting to the Tor network, and not your ultimate destination, similar to VPNs. Keep in mind that with Tor, exit node operators can spy on your ultimate destination in the same way a VPN can, but Tor does attempt to hide your real IP address, which can improve anonymity relative to a VPN. Users should be aware that some websites may not work in the Tor browser because of the protections built in. Additionally, maintaining privacy on Tor does require users to alter their browsing habits a little. See this for more information. It’s a shame that our elected representatives decided to prioritize corporate interests over our privacy rights. We shouldn’t have to take extraordinary steps to limit how our personal information can be used, but that is clearly something that we are all forced to do now. EFF will continue to advocate for Internet users’ privacy and will work to fix this in the future. By Amul Kalia https://www.eff.org/deeplinks/2017/04/heres-how-protect-your-privacy-your-internet-service-provider
  22. Windows telemetry is getting a lot more transparent. Mike Mozart Microsoft has published the full range of data that Windows 10 version 1703, the Creators Update, will collect in its default "basic" telemetry setting. The company has also provided details on the kinds of information that can be captured in the optional "full" telemetry setting. Since it was first released there has been widespread concern about Windows 10's data collection, as the operating system collects various kinds of data and sends it back to Microsoft. The company says it uses this information to determine how well systems are running and get a heads up on problems that users are facing. Telemetry isn't new to Windows, but prior to Windows 10 it was always opt-in, through schemes such as the Customer Experience Improvement Program and Windows Error Reporting. If you didn't want to send anything, you could turn it all off. In Windows 10, however, that changed: while the Windows 10 Enterprise version, available to software assurance subscribers, enabled customers to disable telemetry, the regular consumer editions (Windows 10 Home and Windows 10 Pro) did not. At release, there were three options (Basic, Enhanced, Full); as of the Creators Update there are only two (Basic and Full). Basic is the default setting, though members of the Windows 10 Insider Program have their systems set to Full. This mandate, combined with the lack of documentation—Microsoft has never said precisely what the various options mean—has provoked many complaints from privacy-conscious Windows users. The Creators Update represents Microsoft's first real reaction to the outcry. The operating system itself is more explicit about obtaining consent for privacy settings. The out-of-box experience shown during installation has a new settings screen for privacy options, and existing Windows 10 users will be asked to choose their privacy settings during the process of upgrading to the Creators Update. Microsoft has also extended the documentation within the product and online to be clearer and more explicit about what each privacy option controls and what the consequences are of turning the options on and off. But it's publishing the full set of data points that the Basic setting can collect that's the biggest change. Making this available should go some way towards alleviating fears about how invasive the OS is. There isn't a full list of Full telemetry mode data, however; while the company is offering documentation of the kinds of data it can collect, it isn't doing so in the same exhaustive way as it is for the Basic setting. The company is also not offering documentation for older Windows 10 versions nor for the data collection in Windows 7 or Windows 8.1. Enlarge / The privacy settings that people upgrading to the Creators Update will see. Microsoft Marisa Rogers, the "privacy officer" of the Windows and Devices Group, told us that the telemetry data is genuinely useful to making Windows better. As an example the company offered us, there was a problem with the Windows Alarm app. The Alarm app can have more complicated interactions than one might think, due to its interactions with system sleep (it can wake a machine up if necessary) and the notification framework. Some Windows users reported that their alarms weren't consistently going off. As is often the case with annoying bugs, the problem was intermittent, appearing to occur randomly and hence difficult to reproduce for debugging. With information collected at the Full level from a broad range of affected machines, the company's developers were able to ascertain the precise combination of factors leading to problems, and discovered that alarms became more unreliable as they grew older. The bug was fixed, and a patch was deployed. Another problem the company described to us was that certain combinations of audio drivers and audio hardware were resulting in audio that was broken or missing certain special effects. The telemetry data enabled the exact pairings of drivers and hardware that had issues to be pinpointed, enabling a fix to be developed. Microsoft has also been open about how it uses this kind of information to stagger rollouts of major Windows updates. The Creators Update, like the major updates before it, will initially be offered only to configurations that Microsoft has high confidence in; OEM systems that have been explicitly tested are one example. As Microsoft's tracking registers more successful installations—more pieces of third-party software working correctly, more drivers and hardware functioning properly—Windows Update will offer the update to a wider range of PC configurations. After a few weeks, the floodgates will be opened and it will be offered to every system aside from those with known, specific incompatibilities. These phased deployments depend on telemetry data. These practical experiences have also shown Microsoft that some data isn't useful. Accordingly, Rogers said that in the Creators Update this information is no longer being collected, and the total volume of data has dropped by about half. The final alteration being made for the Creators Update is an greater control over the voice data that Cortana collects. The online privacy dashboard will soon include a new section to review and delete any voice data that Microsoft holds. These improvements are unlikely to appease that minority of users that regard the mandatory telemetry as an unacceptable intrusion, but greater clarity about what data gets collected is nonetheless a step forward. Source: Microsoft opens up on Windows telemetry, tells us most of what data it collects (ars TECHNICA - Peter Bright)
  23. Adblock Plus Acquires Pirate Bay Founder’s Micropayment Service Flattr The company behind the popular Adblock Plus software has acquired Flattr, the micropayment service co-founded by Pirate Bay's Peter Sunde. With the deal the two companies hope to take their partnership to the next level, offering publishers a way to get paid without having to show annoying ads. After Pirate Bay co-founder Peter Sunde cut his ties with the notorious torrent site he moved on to several new projects. The micropayment system Flattr is one of his best-known ventures. With Flattr, people can easily send money to the websites and services they like, without having to enter their payment details time and time again. Last year Flattr partnered with Adblock Plus to launch a new service Flattr Plus, allowing publishers to generate revenue directly from readers instead of forcing ads upon them. Flattr Plus is built on the existing micropayment platform that was launched in 2010. Through a new browser add-on it allows users to automatically share money with website owners when an ad is blocked. Today, the cooperation between the two companies is strengthened even further after eyeo, the parent company of Adblock Plus, aquired Flattr. “Over the past ten months, we collaborated closely and in fact, became one team with a joint vision. So it was just natural to remove the remaining structural barriers and make it official,” Sunde says, commenting on the announcement. “We’re excited to continue our work on the Flattr project to give back control to the users of the internet. They should decide how they want to use the internet and how they want to support the content they enjoy.” Talking to TorrentFreak, Sunde says that he’ll stay on as an unpaid advisor. He has no official stake in Flattr so Hollywood shouldn’t expect to see any of the proceeds of the deal. That said, he’s put a lot of work in the company over the past eight years, building it from the ground up, so it’s a big step to let someone else take over. “It’s just that Flattr is my baby and she got married to someone who will take care of her from now,” says Sunde, summarizing his feelings. Flattr co-founder Linus Olsson will stay on to lead the Flattr operation, and other staff members will keep their jobs as well. Sunde will have an advisory role in the company, and continues to work on various side-projects, including a new privacy service he’ll launch soon. Source
  24. Avira Prime: First Look At Avira’s New Premium Service Avira Prime is a new subscription-based service by security company Avira that can best be described as a cross-platform all-in-one service. First, the basics: Avira Prime is available for 9.95 € per month for up to five devices, or 12.95 € per month for up to 25 devices, or yearly payments of 99.95 € / 129.95€ respectively. The service is available for Windows, Mac, Android and iOS operating systems. The available products differ slightly depending on the device. Windows users get access to Avira Antivirus Pro, Avira Phantom VPN Pro, Avira System Speedup Pro, and Avira Software Updater. Mac users get access to the first two programs. Avira Phantom VPN Pro is also included for Android and iOS; Android users get access to Avira Antivirus Security, Avira Optimizer Pro, and Avira AppLock+ Pro on top of that. Apple iOS device users get access to Avira Vault. Avira notes that the company's free services are also available to Prime users, and that they integrate "fully" with the service. Avira Prime Avira made the decision to integrate Antivirus Pro, and not the Internet Security Suite, or even Total Security Suite, with Avira Prime. Avira Prime is controlled via a central dashboard. It allows you to manage all devices and services, add or remove services, and use remote tools on top of that. Another benefit of being an Avira Prime customer is that Avira promises exclusive access to VIP customer support. You probably wonder how it stacks up against other company products. It is clear that you pay more if you would buy all the Avira products individually. A single device license of Avira Antivirus Pro for instance sets you back 34.95 per year. Add to that the monthly 7.95 € subscription fee for Avira Phantom VPN Pro, and you crossed the requested yearly price for Avira Prime already. If you add the other products, Avira System Speedup, Antivirus Pro for Android or Software Updater to the mix, you will definitely spend a lot more than what Prime costs per year. The question is whether you need all those products. The answer is yes if you are already invested heavily in Avira products. If you use Avira Phantom VPN Pro for instance, you pay about the same for Avira Prime if you make a yearly payment for the 5 devices subscription. It may also be a good deal if you are a user of the Total Security Suite, or a mix of other paid company products. Premium support, being first in any queue before any other support requests, may also be worth it depending on your requirements. Basically, if you pay about the same price already for Avira security products and services, then you may find Prime offering the better deal. Since you may install Prime products on up to five (or 25) devices, you may add them to family member devices as well, and control everything using the online dashboard. The situation is different if you are not invested in Avira products yet. Avira Prime is expensive; Avira advertises it as a premium service, and that it is definitely. Spending $100 for security on a home computer, even if it covers five devices and several products, is something that most computer users probably don't want to spend. Now You: What's your first impression of Avira Prime? Source
  25. Kim Dotcom Previews Bitcache, Reveals Built-in Bitcoin Payments The launch date may be revealed soon, judging by the development of the service shown in the shared video The sneak peak was shared by Dotcom over Twitter this past weekend, highlighting the encrypted anonymous content delivery service. According to him, Bitcache will help developers and publishers receive payments to a Bitcache bitcoin address for uploading content onto the Internet, including on Megaupload 2.0, which Dotcom also plans to bring back to life. Dotcom wants the product to be a "trusted global distribution of digital goods," while Bitcache will serve as the payment engine for content shared online. He explained that you could create a payment for any content that you put on the Internet, either via Megaupload or any other file-hosting service or even on a streaming site. The video reveals a simple and clean interface where people can enter the price for downloading or streaming their content, as well as the preferred currency. The equivalent of the price in Bitcoin is revealed before users are asked to supply their wallet details for receiving payments. Bitcache & Megaupload 2: A first look at encrypted anonymous content delivery with build-in Bitcoin payments. Private. Easy. Safe. Tidy. pic.twitter.com/QHjU5pisGe — Kim Dotcom (@KimDotcom) April 3, 2017 Easy to use The interface also shows that you can create wallets with Bitcache, but what is slightly unclear is whether the service will also come with support for other Bitcoin wallets. This type of service is rather cool because it allows people to put a price on their own work, be it just a few pennies, or a hundred bucks. The service will originally support files and video streaming. Dotcom has also said that Bitcache will use off-chain micropayments to avoid congestion delays on the bitcoin blockchain. Kim's plans regarding the resurrection of Megaupload were revealed about a year ago. In October, a fundraiser was held for Megaupload 2 and Bitcache, which managed to gather over $1 million. The launch was supposed to happen in January 2017, but there were some issues with a planned merger with a Canadian company. While delays are always annoying, it seems that Dotcom's new services will finally see the light of day soon. Source