Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Privacy

Submission + - Ask Slashdot: Best VPN service for Australia? (delimiter.com.au) 1

frrrp writes: Australia has proceeded on its merry way towards being an absolute nanny/surveillance state. Yesterday -

A controversial piece of legislation aiming to bolster the powers of law enforcement agencies has passed the Federal Senate, despite vehement protests from the Greens, who argued strongly that the bill was “yet another” unnecessary expansion of the Government’s surveillance powers in Australia. Entitled the Cybercrime Legislation Amendment Bill 2011, the legislation, amongst other things, introduces a requirements for ISPs to retain data on subscribers’ Internet activities in the context of a warrant being sought. It also broadly brings Australia into line with the Council of Europe Convention on Cybercrime.

The Australian public, and media, have been largely asleep on this issue and, by Parliament standards, the speed with which this legislation has been rushed through must be a new record — with both major political parties colluding to force it through and quash any thoughts of amendment to its draconian scope. So the time has come — VPN is no longer a luxury but a necessity. The question is, which VPN service providers are best for us poor folks on the arse end of the planet? I have more or less settled on probably going with Private Internet Access. Can any of the BigBrains on Slashdot enlighten me further on the subject of personal VPN — the kind that provides the full spectrum of service as a naked direct link does?

Bitcoin

Submission + - On VPNs and Security - Safeguarding your identity (torrentfreak.com)

An anonymous reader writes: TorrentFreak provides several useful tips detailing some necessary, and not so widely known, tips to protect one's privacy online using extra measures on top of VPNs. Some tips include halting all TCP/IP activity upon VPN disconnection, paying anonymously with Bitcoins, amongst others.
Bitcoin

Submission + - Bitcoin War: The First Real Threat to Bitcoin? (privateinternetaccess.com)

An anonymous reader writes: According to the article, someone has taken 15% of the Bitcoin hashing power and is currently filling it with empty blocks. The article says that this might be an attack against bitcoin.

"He is willing to spend money to mine these empty blocks. Essentially, this can lead to a stop in bitcoin transaction processing. Some people who would do this could include governments, banks, competing currencies, or ridiculously wealthy and bored persons who have a vendetta against bitcoin. If this entity obtains 51% of hashing power and fully stops processing transactions while mining against only its own blocks, the block chain will become useless."

Privacy

Submission + - Your ISP will Spy on You Starting July 12, 2012 (cnet.com)

An anonymous reader writes: All major ISPs in the US have announced that they will begin spying on users to detect piracy starting July 12. The RIAA and the MPAA have worked to bring ISPs on board and has dubbed this the "graduated response."

From the article, "Supporters say this could become the most effective antipiracy program ever. Since ISPs are the Internet's gatekeepers, the theory is that network providers are in the best position to fight illegal file sharing."

Privacy Online News has included tips on how to protect your privacy after this goes in effect: https://www.privateinternetaccess.com/blog/2012/03/your-isp-is-going-to-spy-on-you-starting-july-12-2012/

Privacy

Submission + - Windows, Mac OS X and Linux Applications Can Access your Personal Photos too! (privateinternetaccess.com) 1

An anonymous reader writes: With the recent uproar regarding iOS and Android apps accessing private data, rasengan points out that applications on most desktop operating systems are able to access the same data and more. Whether it's paranoia or privacy, application permissions and securities need to mature quickly to keep up with the changing world.

Comment Re:Traditional VPN? (Score 1) 198

Ok, I'm going to give you my complete and honest suggestion. I haven't really posted even a comment on slashdot in years, but I felt that I should provide my in-depth knowledge on this topic. I am an Android enthusiast and have been well versed in other smart phone backends including the Maemo (which is an amazing device. Great choice!)

To begin, on iOS, Android and Maemo you can access a PPTP VPN with no additional effort.

Additionally, on Android and Maemo you can also connect to an OpenVPN based VPN gateway in the event you need stronger encryption. It is often recommended by security experts to avoid encryption such as those implemented within the PPTP protocol like MPPE (mschapv32). On the other hand, however, OpenVPN uses SSL based security which is very much praised throughout the technical company as being secure.

However, on both Android and Maemo there will be some setup time which will have to take place to get OpenVPN working. On the Maemo, it is as simple as installing the OpenVPN application. On Android, however, you will need to ensure that your phone is rooted and that your kernel either has built in TUN support or you may compile your own custom kernel from sources.

If your security is of utmost importance, then go ahead and take the steps to setup OpenVPN on your device. However, if you are just worried about your privacy and nobody is trying to break your encryptions, then PPTP may be enough for your purpose. Personally, I use PPTP when OpenVPN is unavailable.

Now, I would strongly recommend using a provider such as Private Internet Access ( URL: https://www.privateinternetaccess.com/ ) for a VPN service provider since they do in fact offer both PPTP and OpenVPN and also have gateways in both the US and Sweden. Another option would be to setup your own VPN gateway on one of your servers. Personally, I opted for a managed VPN account to avoid the headache. ;)

Hope this helps you timothy!

Slashdot Top Deals

Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.

Working...