Jump to content
nsane.forums

Search the Community

Showing results for tags 'privacy'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 13 results

  1. Mozilla engineers have borrowed yet another feature from the Tor Browser and starting with version 58 Firefox will block attempts to fingerprint users using the HTML5 canvas element. Canvas blocking is an important addition to Firefox's user privacy protection measures, as canvas fingerprinting has been used for a long time by the advertising industry to track users. Canvas fingerprinting has become widespread in recent years The method has become widespread in recent years after the EU has forced websites to show cookie popups. Because canvas fingerprinting doesn't need to store anything in the user's browser, there are very few legal complications that come with it and this user tracking/fingerprinting solution has become a favorite among ad networks. Canvas fingerprinting works by loading a canvas HTML tag inside a hidden iframe and making the user's browser draw a series of elements and texts. The resulting image is converted into a file hash. Because each computer and browser draws these elements differently, ad networks can reliably track the user's browser as he accesses various sites on the Internet. Canvas fingerprinting is described in better detail in this 2012 research paper. Feature borrowed from the Tor Browser The Tor Browser has fixed this problem by blocking any website from accessing canvas data by default. The Tor Browser displays the following popup every time a site wants to access the canvas element. Tor Browser's canvas fingerprinting blocking system Based on an entry in the Mozilla bug tracker, engineers plan to prompt users with a site permission popup when a website wants to extract data from a < canvas > HTML element. This is similar to the permission shown when websites wish to access a user's webcam or microphone. Firefox 58 is scheduled for release on January 16, 2018. The second feature Firefox takes from the Tor Browser Canvas fingerprinting blocking is the second feature Mozilla engineers have borrowed from the Tor Project. Previously, Mozilla has added a mechanism to Firefox 52 that prevents websites from fingerprinting users via system fonts. Mozilla's efforts to harden Firefox are part of the Tor Uplift project, an initiative to import more privacy-focused feature from the Tor Browser into Firefox. The Tor Browser is based on Firefox ESR, and usually features flowed from Firefox to Tor, and not the other way around. In August 2016, Mozilla also blocked a list of URLs known to host fingerprinting scripts. Previous efforts to improve Firefox user privacy also included removing the Battery Status API. Source
  2. Mozilla engineers have started work on a project named Lockbox that they describe as "a work-in-progress extension [...] to improve upon Firefox's built-in password management." Mozilla released the new extension for employee-use only at first, but users can install it by going to this or this links. Lockbox revamps Firefox's antiquated password management utility with a new user interface (UI). A new Firefox UI button is also included, in case users want to add a shortcut in their browser's main interface to open Lockbox without going through all the menu options. Support for a master password is included, helping users secure their passwords from unauthorized access by co-workers, family members, or others. There are no public plans on Lockbox's future at the moment, but Mozilla will most likely ship it with Test Pilot for some user testing before deciding if to deploy it in the stable branch. Firefox Test Pilot is a Firefox add-on that allows users to install, test, and vote on experimental features that may be added to Firefox in the future. Mozilla has tested several other Firefox features inside Test Pilot before [1, 2]. For example, Firefox's new built-in page screenshot utility — launched through Firefox 55 and 56 — was also tested via Test Pilot. At the moment, Mozilla engineers say Lockbox has only been tested on Firefox 57 and above and that installing on Firefox 56 or lower may not function at all. Also, there's no way to reset the Lockbox master password (at the moment). Source
  3. Pirate Tor Browser Pirate Tor Browser is a bundle package of the Updated Tor client Vidalia, Updated FireFox Portable browser (with Updated foxyproxy addon) and some custom configs , all has been revamped and Updated , Self extracting archive For those wanting to reach torrent webpages they cant reach on a normal browser try the updated pirate browser.. portable.. you might have seen the first version that the pirate bay shared http://piratebrowser.com/ now its been updated and revamped.. better updated links added , updated and added some good extensions to hide yourself online , Pirate Tor Browser version 08 build 7.0.8 Better Pirate Browser version 07 build 56.0.2 - New Pirate.Tor.Browser.0.8.(7.0.8) Better Pirate Browser 0.7 (56.0.2) 27/10/2017 - New HOMEPAGE https://lilfellauk.wordpress.com/pirate-tor-browser/ Download - Pirate.Tor.Browser.0.8.(7.0.8): Site: https://mega.nz Sharecode[?]: /#!Z25lAD4T!2OPkWG4lTEqq7kgEyTNs33LmYXR573b-e4sbfeUHk_8 Download - Better Pirate Browser version 07 build 56.0.2: - New Site: https://mega.nz Sharecode[?]: /#!13ATGQ6L!YgDypu2bvimH6qXZFHdMiXdlePPm1KeFceUfUh8xfd4
  4. Hi, this is the new beta! Yandex just Added more security features It can protect the browser form almost everything! High-quality browser Give it a try The objects of protection: the file browser your browser settings extensions user data (credit card numbers, pins, bookmarks, browsing history) confidential information (passwords, keyboard input, screen contents, etc.) other resources of the browser, affecting its security operating system settings that affect browser security Threats, which protects the module change the files of the browser extension and third-party applications (can be embedded malicious code); theft of user data (passwords, credit card numbers, bookmarks, browsing history); the interception or substitution of downloaded and sent data (MITM attack); any unauthorized changes to browser settings such as default search or security settings; the withdrawal of the application screenshots (used to collect user information); record the application sequence of keystrokes on the keyboard (used to steal passwords); unauthorized removal of the browser or module protection third-party applications. How protection works The protection module is installed with the browser but is a separate application. It only takes a small amount of virtual memory that protects all the user's browser and works even when the browser is closed. The module uses the technology of HIPS. It monitors and warns of potentially dangerous activity programs in the operating system. If the application performs an action that threatens the integrity of the browser protection module blocks the action and reports it. Download it from here Download Yandex Browser (beta) It's beta but stable and reliable. Source Lite - Online Installer: Win (1.3 MB): https://cache-mskdataline01.cdn.yandex.net/download.yandex.ru/browser/beta-custo-int/en/lite/Yandex.exe Standalone Direct links: Win (66.1 MB): https://cache-mskdataline02.cdn.yandex.net/download.cdn.yandex.net/browser/beta-custo-int/en/Yandex.exe Mac (65.3 MB): https://cache-mskdataline11.cdn.yandex.net/download.cdn.yandex.net/browser/beta-custo-int/en/Yandex.dmg Linux - deb x64 (63.7 MB): https://cache-mskdataline03.cdn.yandex.net/download.cdn.yandex.net/browser/yandex/ru/beta/Yandex.deb Linux - rpm x64 (63.5 MB): https://cache-mskdataline05.cdn.yandex.net/download.cdn.yandex.net/browser/yandex/ru/beta/Yandex.rpm
  5. The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea for the development of this little program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but meets my envisaged purpose. The software is still in an early development phase: suggestions and requests will be gladly accepted and considered, if necessary, in the further development! Manual/Instructions + Screenshots - EN Manual/Instructions + Screenshots - DE Changes in 2.5.1.1 (20.10.2017) - The list of telemetry-IP addresses contained two invalid IP-addresses, which meant that the Firewall-rule 19 was not. Homepage Download page Download SHA1-Hash: 29bcc435bd37084566e08a26ebe2a9c78e009397 SHA256-Hash: e40d69a70cf7aeb35dc4d2b1f567b4edaecb10afdd94173980011e8ed9f5c92a .paf Portable Online Installer by @Geez - Updated - New Due to constant changes to download path by developers, updated the installer to read the last number added to the download page to get the latest version. The last installer was unable to get the last version. First screen enter: 1508535683 Site: https://www.upload.ee Sharecode[?]: /files/7578959/W10Privacy_Portable_x.x_Rev1_Multilingual_Online.exe.html
  6. Windscribe VPN 1.80 Build 28 Stable Internet As It Should Be Windscribe is a desktop application and browser extension that work together to block ads and trackers, restore access to blocked content and help you safeguard your privacy online. Learn More. What's New: https://blog.windscribe.com/windscribe-1-80-changelog-bdc9183bcac4 We’ve been working on this version for quite a while, existing installations should prompt you to update the app over the next 48 hrs. Here is what’s new. Changelog: New features LAN proxy gateway — https://windscribe.com/features/proxy-gateway Secure Hotspot (Experimental) — https://windscribe.com/features/secure-hotspot Variable location drawer height Auto login after signup Ability to choose NDIS5 TAP driver Upgrade to OpenVPN 2.4.x with 2.3.x fallback Service notifications Show Pro data-centers to free users Location latency tool-tips added to signal bars Fixed bugs Always on firewall not working on OS boot on some machines Application crashes after connection attempts are exceeded with “minimize to tray” option checked Application freeze with firewall ON requires reboot API calls not made if app starts with no Internet connectivity Custom installation now allows for non-standard install path Auto-enable disabled TAP adapter 100% CPU when app starts with no Internet connectivity Don’t try UDP protocol if system proxy is configured Constant application window size on variable DPI screens Login form DPI bug On multi-screen computers, tool-tips show on primary monitor Other Changes Leave firewall ON if ran out of free bandwidth to prevent IP leak Increase reconnect timeout from 5 min to 1 hour Server list source changed Moved server location update process to separate thread Only do ping tests while disconnected Update available UI change Output installed anti-virus software into debug log for troubleshooting Open survey on application uninstall Installer command line arg support Black and white top bar icon on MacOS Ping nodes in batches instead of all at the same time Allow for verbose OpenVPN logging via Advanced Parameters screen When beta channel is selected, check for updates right away To-do list for next version: IKEv2 protocol support Emergency Connect Firewall whitelisting overhaul Command line interface Wakeup from hibernation fix Add disconnecting state Async DNS resolver Browser Extensions — New Features Downloads: Windscribe for Your Computer: Windscribe for Your Browser: Windscribe for Your Phone: Windscribe for Your Router:
  7. DoNotSpy10 v3.0 Final Overview: DoNotSpy10 is the world’s first antispy tool for Windows 10. Its straight-forward user interface allows you to manage how Windows 10 respects their privacy. Microsoft introduces many new “diagnostic” features with Windows 10. These services help Microsoft collect usage data and thus to provide a better service. However, collecting and sharing your data with one of the world’s leading technology companies puts your privacy at risk. There are services which are able to record your keyboard input, your speech and any other actions of the user. Others share your WiFi credentials with your contact or connect you to networks shared by your contacts. DoNotSpy10 provides you with the opportunity to easily manage what you want to share and what not. While many of the settings represent what you can configure using the Settings and various other apps, there are also tweaks that are not easily accessible through the apps Windows provides. DoNotSpy10 combines them all in one application – it’s time to protect your privacy, let’s start! Requirements: .NET Framework 4.5 or higher Changelog: - https://pxc-coding.com/blog/donotspy10-3-0-fall-creators-update/ Downloads: Direct-Download(Inc Ads): https://pxc-coding.com/downloads/donotspy10/DoNotSpy10-3.0-Setup.exe Installer MD5: 6F3812E499EE6B1D4DA8B94E8191DF04 Installer SHA1: A90FC45BEFF0648B9EB7E232C965F5C96151CB5E DoNotSpy10 v3.0 Portable (PAF) by @DoomStorm Offline installer - shared by @GlacialMan Site: https://www.upload.ee Sharecode[?]: /files/7571379/DoNotSpy10Portable_3.0.0.0.paf.exe.html Mirrors: Site: https://www.multiup.eu/en Sharecode[?]: /download/1323cbbe3dc6eace288c8f8883d94000/DoNotSpy10Portable_3.0.0.0.paf.exe Site: https://dbr.ee Sharecode[?]: /uYa0
  8. Proton VPN 1.2.1 / 1.2.2 / 1.2.3 / 1.2.4 Stable Overview: Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: v1.2.4: https://protonvpn.com/download/ProtonVPN_win_v1.2.4.exe v1.2.3: https://protonvpn.com/download/ProtonVPN_win_v1.2.3.exe v1.2.2: https://protonvpn.com/download/ProtonVPN_win_v1.2.2.exe v1.2.1: https://protonvpn.com/download/ProtonVPN_win_v1.2.1.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ Changelog: v1.2.4: Fixed Fixed Killswitch behavior after failed reconnect: KS will now require user confirm before restoring unencrypted connection v1.2.3: Fixed Fixed crash related to screen resolution changes v1.2.2: Added Added map zoom component support for smaller resolutions Added login window help tooltip Changed Changed app icon Removed empty space in settings window Updated Secure Core route selection Fixed Fixed sidebar toggle button bug after app update v1.2.1: Fixed Fixed crash related to window state change More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches Keeping ProtonVPN Secure New WiFi connection vulnerability discovered. Here’s what you need to know about “KRACK”
  9. Proton VPN 1.1.0 Stable Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Open to Free Users Now! - We are opening up our free VPN to the general public – now available for download! Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.1.0.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches Keeping ProtonVPN Secure
  10. Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of previous systems and new additions to improve security. Both Loopix and Tor are based on the concept of mix networks and are meant to provide a way to send anonymous messages through a complex network. The way Tor achieves this is through its circuit-based onion routing protocol. On the other hand, Loopix uses a classic message-based architecture combined with Poisson mixing — adding random time delays to each message. The end result is an anonymity network that is very secure but also fixes the main disadvantage of classic message-based architectures, which is high-latency. As the UCL team points out in their research paper, the Loopix system has a "message latency is on the order of seconds – which is relatively low for a mix-system." How Loopix works The way Loopix works is very similar to Tor, both being based on the same principles of mix networks. A user connects to a provider (ingress provider), the same way Tor users connect to entry guards. The Loopix provider server sends the user's message through the network through random mix nodes, similar to how Tor sends messages through relays. The message arrives at the intended user's provider (egress provider), where it is stored inside a message box until the user comes online. This is where Loopix is different, allowing the storage of offline messages. Similar to Tor, Loopix also uses encryption by encapsulating messages using Sphinx, a cryptographic message format. In addition, it also uses cover traffic for both when data travels inside the network and when users send or receive messages from the providers. Loopix looks good on paper, until now Researchers say that Loopix's trio of encryption, cover traffic, and randomly delayed messages can counter ISP and nation-state level passive surveillance. Tests using a demo Loopix network showed that "mix nodes in Loopix can handle upwards of 300 messages per second, at a small delay overhead of less than 1.5 ms on top of the delays introduced into messages to provide security." Overall, researchers say the latency is low compared to similar message-based mix networks, making Loopix usable for real-time communications, just like Tor. In fact, a comparison table put together by the research team shows that Loopix is not on par with Tor, but also much more suited for anonymous communications, even when compared to other systems such as HORNET, Dissent, Vuvuzela, Stadium, Riposte, Atom, Riffle, or AnonPoP. But there's a downside to Loopix as well. "Loopix is designed as a system for anonymous communication and it’s properties allow it too be used both for high-latency communication applications, like e-mails, and for low-latency communication applications, i.e., instant messaging," Ania Piotrowska told Bleeping Computer via email, "it is not designed to be used as Tor for web browsing." Currently, the Loopix system is still in its infancy, and more research is needed. Nonetheless, researchers say Loopix is resistant to Sybil attacks, currently one of Tor's biggest problems. More technical details are available in a research paper published in March this year and named "The Loopix Anonymity System," available online here, here, or here. Source
  11. Proton VPN 1.0.10 + 1.0.11 Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Note for free plan: Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.11.exe https://protonvpn.com/download/ProtonVPN_win_v1.0.10.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches Keeping ProtonVPN Secure
  12. How Landmark Right To Privacy Order Impacts You And Me: 10 Points Right to privacy is one of the most ingrained rights of every citizen, the Supreme Court judges have said. The order is likely to have a bearing on several other cases, including one challenging Facebook's access to details of Indian WhatsApp users as a violation of privacy. All India | Reported by A Vaidyanathan, Edited by Deepshikha Ghosh | Updated: August 24, 2017 13:17 IST The right to privacy emerges primarily from guarantee of life and personal liberty, said Supreme Court. New Delhi: Privacy is a fundamental right guaranteed by the constitution, nine Supreme Court judges said today in a unanimous verdict that will affect every citizen. The judges said privacy comes under the Right To Life and Liberty, overruling the governments arguments. Petitioners had challenged the government's Aadhaar biometric programme, which has recorded the fingerprints and iris scans of more than one billion Indians. Here are 10 ways today's judgement on right to privacy impacts citizens: Right to privacy is one of the most ingrained rights of every citizen, the judges have said, overruling two previous Supreme Court judgements and the government's arguments. The judges also acknowledged there must be restrictions within reason on individual privacy. The court said the right to privacy emerges primarily from the guarantee of life and personal liberty; elements of privacy also arise from freedom and dignity guaranteed by the fundamental rights. It is a watershed moment, said Sajan Poovayya, a petitioner in the case. "Whatever the state decides will be checked and tested on that basis. The powers of the state are curtailed to some extent," he told NDTV. Rejecting the government's stand, the court said that the "refrain that the poor need no rights is used through history to violate rights." Udayaditya Banerjee, one of the lawyers who fought for the petitioners, said: "The judgement has stated the obvious, that we have a fundamental right to privacy." Mr Banerjee said the petitioners were worried that the Aadhar scheme, which requires people to share their details including biometric data, held the potential of a "surveillance state". Today's judgement says nothing on the impact on the Aadhaar scheme, which is being heard by a smaller bench. "The verdict will help us in the Aadhaar case," said Mr Banerjee. According to another petitioner, R Chandrasekhar, citizens will be protected against the misuse of information. The order is likely to have a bearing on several other cases, including one challenging Facebook's access to details of Indian WhatsApp users as a violation of privacy. A verdict restoring a ban on gay sex can be challenged after the court today said privacy is protected as an intrinsic part of the right to life and personal liberty. The privacy ruling may affect the DNA Based Technology Bill 2017 to allow the government to set up a DNA databank and use data for forensic purposes,which has raised concerns about privacy. source
  13. Dear friends, Nowadays our privacy is very important. I am interested to know which VPN service do you use and which is the best according to your opinion. Not to all vpn services are enough secure. Recently, has been discovered that HotSpot Shield in some cases could show your real ip. Have a look here : 1.Android 2. Windows Thanks for your time spent with this poll ! :)
×