MINERO AMAZON BITCOIN

Photo Credits: Metallic Venus, Jeff Koons

20 years have passed since the Matrix was released… hard to believe, I know. Even harder to accept, without feeling a little bit old, especially if you remember being a bright young thing when the movie hit the big screen, back in 1999. Sounds prehistoric? Well, you’re right, it kind of is.

The ideas in the movies however, are more relevant today than ever. The dystopian future in which artificial intelligence takes over humankind, could be one of the supercuts, but the movie itself abounds in symbolisms, referring to the greater, bigger, more meaningful themes of the 21st century and beyond. It is perhaps a new syntax of sci fi/ action movies, the perfect mix of special effects, narrative and style, underpinning philosophical themes. This whole mix is what makes the movie, much more than just a sci-fi, but a cult film, a classic of its genre.

When news about WhatsApp security breach broke, there was something in the way the hacking took place, that screamed to me: THE MATRIX. I’m getting a lot of that, lately.

Not sure if I was following the Aristotelian mimesis or the Oscar Wilde anti-mimesis, in my thought process, but one thing was for sure: there really was “a glitch in the system”.

Remember how Neo uses the phone to “exit” the Matrix? Well, WhatsApp hackers used the same principle, a phone call, only this time to “enter”.

Credits: The Matrix, movie screenshot

In the words of Oscar Wilde or Lana del Rey’s gods and monsters song, I guess life really imitates art. I find this version to be more poetic than prophetic, so I’m sorry Aristotel, I’m taking the Del Rey — Wilde route, this time around.

0.00008 BITCOINS A DÓLARES

Back to reality. Only last week, one of the largest communication apps, WhatsApp, amounting more than 1.5 billion users, was the target of an unprecedented hack, that revealed quite a vulnerability in its security system.

Even though, the app is popular for having end to end encryption on all messages going through its servers, hackers managed to enter the system via in-app voice calls. Basically, the users affected by the hack, got one or two calls from a number unknown to them, which delivered a code in the process of calling. Regardless if the user answered the call or not, the code was shipped.

Nothing a user could’ve done, short of not having the app altogether, could have prevented the infection. WhatsApp has since resolved the security breach and patched the flaw, while urging their users to update the app sooner rather than later.

However this particular security breach is very important from another aspect, that of the technology the hackers used. The hacking tool involved in the cyber attack is reportedly similar, if not identical, to the spyware and surveillance tools used by governments to capture high profile criminals and is often nearly impossible to track. As in this case, hackers could even erase records of the call used to inject the code, after the fact.

The alleged culprit? A company, known as the largest player in the business of surveillance tools, the Israeli cyber security company NSO Group is believed to be the developer of the tool. Even though the hacking tool gives a few cues and has the distinguishing marks of the type of surveillance tools developed by the company, NSO denies the allegations.

The target? Human Rights activists and apparently one lawyer in particular.

The motive? Let’s give a little more context. The alleged targeted lawyer, who spoke in condition of anonymity, is helping a Saudi dissident and several Mexican journalists build a civil case against the NSO. The NSO Group claims to only sell surveillance tools for legitimate targets, selling exclusively to law enforcement and intelligence agencies, but is suspected to do otherwise, in practice, targeting honest individuals and not high profile criminals or terrorists, being involved in illegal surveillance and thus violating human rights.

These are, in a nutshell, the facts so far of last week’s “Game of Phones” finale. But in real life.

Still, the case looks a lot more like Matrix to me. Am I taking it too far? I can’t tell.

Maybe I’m in too deep on this one, but the phone metaphor still echoes in my head. And no, I don’t suppose they’ll open a portal in spacetime any time soon through a phone call, but suffice to say they opened a very dense, resourceful and highly popular messaging app, in the meantime.

And so, could it be that these devices we so often use, be nothing more than pocket-sized surveillance devices we gladly accept?

Ok, that’s an oversimplification and I take that back, but the thought is worth to ponder upon, as it might lead to savvier users and a safer digital environment. As we arrive to a new age kicking and screaming all the way, we might even find our way to Zion. I somehow, take solace in that.

YOUTUBE CUÁNTICO Y BITCOINS

Until Zion, let’s take it each step at a time and see how the 2019 digital world looks like.

In the sharing, internet economy, data is the currency and sometimes even a political weapon to be reckoned with. In other words, data is today an informational, political and economic asset capable of traveling the speed of light in a vacuum, when going through state of the art optical fibers. Able to operate at 99.7% the speed of light according to researchers at the University of Southampton in England. (source: Extreme Tech)

The digital world is now creating tangible value from big data so expect internet privacy to take an even more prominent route in the future. (Ain’t no going back)

Nowadays, security must come in layers, not only in the corporate environment, but on a personal level also.

The number one thing you need to get in line with is having a VPN connection. It’s really simple to use and just like that poof! your data travels through an encrypted tunnel, safe from prying eyes and encrypted all the while.

It won’t save you from all the threats out there, but it will make you less vulnerable.

CÓMO RASTREAR UNA DIRECCIÓN BITCOIN

TRIUNFO PRO BITCOIN

Photo Credit: Online Privacy Risks by Angel Roxas

Web browsers. We use them on a regular, so much so we don’t even realize they’re there, we perceive them as a given, a tool that comes with the territory of internet access. Still, not all web browsers were created equal. Today, we take the measure of some of the most popular web browsers on the market through a security lens and see which one scores best on the challenge.

Frequency of updates, embedded security tools and features are indicators of a good reliable web browser in terms of privacy. Taking the aforementioned criteria into account, here are the most secure web browsers ranked

CÓMO COMPRAR Y ENVIAR BITCOINS EN CASHAPP

Once upon a time, there was Internet Explorer. An undeniable favorite, holding monopoly in the early ages of the proto-internet, Internet Explorer is today a “deserted”web browser, especially since Microsoft introduced Edge. In terms of updates, Microsoft stopped making major updates to IE, as the focus shifted to its successor.

Security Wise, IE can detect malicious or potentially harmful sites, but is lagging behind on a lot of security features of its competitors.

Privacy Wise, you can toggle pop up blockers, have a tracking protection feature, preventing listed sites from dropping cookies upon subscribing in advance to a protection list, but that’s mainly about it, as the browser itself is closed-source (packed widgets remain undisclosed and obscure to the “naked eye”).

DESCARGA DE DATOS HISTÓRICOS DE BITCOIN

As the name suggests, the descendant of Internet Explorer really has an edge over what has otherwise become a meme for delayed effects, in general, in terms of speed .

In what updates are concerned, Edge updates twice a year on average. That’s still a low frequency of updates, when compared to competitors on the market.

It runs in a sandbox making all browser processes contained, the extension support is limited which could potentially limit malicious or simply questionable extensions you may download accidentally.

All in all, privacy and security wise, Edge only ranks at the bottom of the list and it’s still not a very secure browser.

APALANCAMIENTO DE BITCOIN

Developed by the person who also created the CSS web standard, Opera is not only an ingenious browser with a cute face, but it is also a staple for privacy oriented web browsers, the poster child of private web browsing. It runs on Google Chromium system, using Google Chrome’s open-source, which was tweaked to add features of its own.

Updating every 4 to 6 weeks, Opera comes close to a very healthy update frequency, which is once every 3–4 weeks.

From a security standpoint, Opera has integrated fraud and malware protection, has a built-in free VPN, an ad blocker, social messengers like what’s app and facebook messenger, battery saver a VR player among its main features.

The built in VPN however, is known to be tracking logs and bandwidth, not exactly the best choice for a VPN service as it may actually defeat the purpose of using such a tool.

¿SON SEGURAS LAS PLATAFORMAS DE COMERCIO DE BITCOINS?

At almost 80% market share, Google Chrome is leading the rankings for obvious reasons. Those reasons can be summed up to the fact that Chrome is simply a Google product. Just like the web search, YouTube, Gmail or Google Docs, it is only natural that people are naturally drawn to it and inclined to use it, considering the dominant role Google is playing in the online world.

There are usually 6 weeks between its updates as Google automatically updates Chrome. Security Wise, Chrome regularly scores the highest on security tests and moreover Google is actively requesting hackers to discover vulnerabilities, so that the company can later improve those potential loopholes. Still, the fact that Chrome is owned by Google, the larger than life company, that virtually knows “everything” about its users should serve as a bit of warning, in what privacy is concerned.

The standard Chrome version is closed source, everything (if anything) packed inside the code is therefore obscure. Truth be told, there is also an open-source version of Chrome available.

1 BITCOIN EN DPOLLARES

Safari, the default web browser for Mac is usually perceived as being more secure, since Mac devices are arguably less vulnerable to malware. Chrome’s popularity however, pushed it to a marginal fate similar to that of Internet Explorer.

Updates are irregular, but tend to be on the slow side, as weeks between updates can vary between 9 and 47 weeks.

Despite its irregular updates, Safari does a pretty god job security wise, by running web pages contained, in a sandbox, thus preventing malware to infect the entire browser. Safari also introduced a password manager meant to improve the quality and strength of its user’s passwords.

The only culprit of Safari is the fact that is closed sourced, otherwise making a close to perfect impression in terms of security and privacy.

A CUANTO EQUIVALE UN BITCOIN 2018

Brave is the bold, fast-performing, privacy-oriented newcomer dressed in a minimalist attire. The browser updates every 8–9 weeks and it’s still working towards a version v1.0 for desktop. Brave offers a fairly customized browsing experience as it allows the user to remove selected data every time the user closes the app.

A default ad blocker and an HTTPS function allows its users to browse unencrypted sites more secure.

CUALQUIER CAJERO AUTOMÁTICO DE BITCOINS EN EL VALLE DE HUDSON.

Owned by a nonprofit organization, Mozilla is the caliber alternative to Chrome, also harboring a more hyped, privacy-focused version: Quantum.

Mozilla is updated by volunteers with a 6 to 10 week frequency, making it a bit slower than the competition, but keeping an overall regularity to its updates.

Security features include malware protection, add-ons warnings, but perhaps the most important things is the fact that Firefox is open-source and ONG owned.

PROYECTO DE LEY DE ARIZONA PARA CONVERTIR BITCOIN EN MONEDA DE CURSO LEGAL

Tor is probably the true rebel out of the bunch. Based on Firefox, Tor was designed to let users access the world wide web via the Tor network, encrypting traffic and bouncing your data across a network of relays composed of thousands of volunteered computers.

Following Firefox’s bug fixes, most Tor updates happen with a frequency of about 2 weeks. Browsing history of users is not tracked by Tor and cookies are cleared after each session. Add the no script policy and privacy features and you will get a pretty safe browsing experience, probably the safest.

Out of the bunch, Tor is the most secure web browser, for enhanced security and privacy you can always turn to a VPN. A good VPN will have its own servers and encryption protocols designed for it, reducing possible security failures to a minimum. Free VPN services are often an open door to malware and can be easily used by scammers.

In the FREE vs. PAID matter, its is important to understand that most legit businesses will offer 7 days of free trial, but a free connection on a indefinite period of time is sure to get its profit elsewhere; in ways that can harm your security and defeat the whole purpose of having a VPN in the first place.

We suggest you do yourself a favor and invest a good 5 bucks for a reliable VPN like the dedicated VPN you can get from My IP.io or from another reliable provider.

LOGOTIPO DE BITCOIN PNG

5 BITCOINS POR DÓLAR

Credits: Please Shut Down, illustration by Emmanuel Hyronimus

Internet access is nowadays a fundamental human right coined by the UN Human Rights Council, adopted in 2016 by resolution.

However, not all governments respect it, especially not around elections. Across Asia and Africa several governments tried to silence speech through what is called “an internet shutdown”, where access to certain platforms, especially social media, is either restricted or blocked, altogether.

If you read through the first statements of the 32nd session of the UN resolution, the document outlines the importance of preserving internet access as a fundamental human right, “recognizing that the spread of information and communications technology and global interconnectedness has great potential to accelerate human progress, to bridge the digital divide and to develop knowledge societies”.

So having an open and free online environment is not only a matter of rights, but also a condition for progress.

Not only the right to freedom of opinion and expression, or the right to privacy in the digital age, but also innovation and influencing elections is at stake, in the opposite scenario.

In the case of innovation, let’s take the example of net neutrality. This concept argues in favor of keeping an unobstructed online environment as a sine qua non for online freedom, but also innovation and it sure makes a strong case.

Imagine that broadband providers had the liberty of picking favorites, of deciding which service you may or may not access while using their internet service. They could limit or even block access to some products or services, while creating “fast lanes” for others, thus controlling information flow and traffic. New technologies might never see the light of day.

To go even further, imagine your ISP blocking or limiting access to services like Youtube, when Youtube came to shape 18 years ago. Had that been the case, Youtube as we know it, might not even exist today, or not at the same scale, maybe not at all.

Internet shutdowns on the other hand are a different kind of evil, meaning that they usually happen around or during elections and that they usually don’t last long as the economic costs could quickly spiral into hundreds of millions of dollars. However, no less than 134 internet shutdowns occurred in India alone, in 2018. 2019 recorded 19 shutdowns already in the same country, the most recent, just a few days ago “following the terrorist attack against the militants in Jammu and Kashmir’s (Pulwama district, India, 14th of February 2019) in which 45 CRPF personnel died and many others got injured when a Jaish suicide bomber rammed an explosive-laden vehicle into a CRPF bus, Jammu observed a complete shutdown and Mobile Internet services were suspended on 15th February 2019” (source).

So be wary when you hear the “fake news”, national security, public safety reasoning as this may only be a manipulating maneuver to conveniently stop protests from happening and ultimately control elections. And as the saying goes, just because you’re paranoid, doesn’t mean they’re not out to get you.

Credits: Mindshots VII, illustration, Sergio Ingravalle

Let’s also set some expectations before we go on, you can’t really escape a total internet shutdown.

Not really, but you can always try Firechat. Take the example of the “Occupy Central” movement in Hong Kong protests back in 2014, when the concern that the government might cut reception, made protesters head to Firechat, an app that does not require a network to work, functioning on a peer to peer mesh network. The protesters used Firechat to exchange information, figure out which road was blocked by the police and coordinate. There are limits however in using your phone as a “walkie-talkie” that for the sake of the argument we needed to point out.

Not counting Firechat, escaping a total internet shutdown can be a very daunting task.

For partial shutdowns, however, there are plenty of solutions that you can use in order to overcome limitations.

We’ll list the best that we can think of, below:

  1. Become Security Savvy

be aware of the websites you visit and whether they use an SSL certificate, these are the https sites, providing secure browsing while on a particular website.

2. Use a VPN Service like MyIP.io or any other that you trust

a reliable VPN service that keeps your data extra safe, traveling through a tunnel encrypted from end to end, so nobody, not even your ISP will be able to make sense of it, since all your information will go through the VPN server and not your ISP’s. You will also be able to bypass geo-restriction.

3. Use encrypted messaging apps like Signal or any other that you trust

use encrypted messaging and voice-calling similar with Telegraph or Wire.

Credits: Manual Girlsjin, illustration by Sapo Lendário

¿CÓMO SE GENERAN NUEVOS BITCOINS?

¿CUÁNDO SE APRUEBA ETF PARA BITCOIN?

Credits: Dreamer, illustration by Low Meiling

NUNCA VENDAS TU BITCOIN

Fighting the urge of posting yet another facebook post reading “2018, this gotta staaahp!” as I reminisce this year in all its glory is something I can definitely shake. Or can I? Looking back at 2018, as cliche as it may be if you do that in late December, means you too have been sucked by the new year’s resolutions current. So try not to fight it as it swallows you whole, after all, making resolutions kind of makes sense.

COMERCIO DE BITCOINS

Starting with Facebook scandal in April and following with net neutrality repeal in May, 2018 was ringing alarm bells in online security and rightly so with a double sworded twist, both on the technology and law enforcement standpoints. Digital privacy concerns culminated however this summer, when both Russia and China decided to ban VPN services, thus preventing government censorship to be undermined by virtual private networks any longer or by other anonymous browsing tools.

In spite of the orwellian scenario, it’s not yet clear how the censorship ordeal will play out in 2019 and there are still a lot of VPN services that still work in China and Russia.

COMPARTE EL TICKER BITCOIN ETF

The link tax, censorship machines and the so called posible balkanisation of the web, happening this fall at the request of the EU Copyright Directive raised a lot of concerns under three articles that seemed to have control of informational flow at stake. If passed in January of next year, in the current form, the bill might damage the way we use the internet and online freedom of expression in a major way.

Failing to redefine these articles, might lead to permanent surveillance, damaging the open and free internet as we know it with great implication on innovation, proving that sometimes the road to hell is indeed paved with good intentions.

LÍMITE SEMANAL DE BITCOINS DE LA APLICACIÓN CASH

Just as in the case of net neutrality repeal in the USA, these articles of the EU directive are seen as enemies of innovation. Advocates of net neutrality argue in the favor of keeping an unobstructed online field as a vital part of innovation. Their concern is very valid and should be a cause worth fighting for all of us.

BITCOIN EN INGLÉS DE 6 MINUTOS.

In the sharing, internet economy, data is the currency, an informational and economic asset capable of traveling the speed of light in a vacuum, when going through state of the art optical fibers. Able to operate at 99.7% the speed of light according to researchers at the University of Southampton in England. (source: Extreme Tech)

The digital world is now creating tangible value from big data so expect internet privacy to take an even more prominent route in the future.

Nowadays, security must come in layers, not only in the corporate environment, but on a personal level also.

Here are a few things you might want to consider for an overall improved security of your online privacy and data.

Get a VPN service for all your devices:

The number one thing you need to get in line with is having a VPN connection. It’s really simple to use and just like that poof! your data travels through an encrypted tunnel, safe from prying eyes and encrypted all the while. You basically need to pay a monthly subscription and rock on. It’s important that you don’t chose a free VPN as free VPN services are sure to get their profits elsewhere and it’s usually on your broadband expense. So avoid using unreliable free services that offer protection, but are in fact jeopardizing it.

Taking hold of your own digital footprint requires savvy, educated users, that know their rights and are not willing to compromise when it comes to their own privacy.

It’s easy to understand why more and more people resort to using a VPN service, rather than letting their information “fly” to unknown servers where they can be stored indefinitely.

Password Managers

Another simple step you can take to ensure your passwords are strong and that you have them all in order. Passwords managers are not written in stone, so naturally they can be hacked, but is far less likely to have your password hacked than it is to have one and the same password for multiple platforms and have your data compromised by relying on your memory alone.

2Factor Authentification

We know it can be annoying to have an extra layer of access when you’re in a hurry, but remember you will not be prompted with a 2fact auth method if you don’t switch devices often.

Back Up

Back up is the most obvious security measure that you can take, but people are often just not doing it. Regardless if you back up locally on a hard drive or in the cloud, you can do the extra mile and encrypt everything before backing up your data and you can be certain that your data is safe or that you can at least do a roll back to the most recent version previously saved.

Taking a few measures to securely navigate the valley of post-truth are of the essence in fearing no evil. Keeping our heads clear and taking action to protect the digital environment we expose ourselves to on a daily, without having to go to extreme lengths to do so, is the way to go in 2018.

Having a VPN in place is the smart approach to getting around all this. Think at a VPN as the middleman between you and the internet, where your ISP can only see a bunch of encrypted traffic. And since your VPN knows as much as your ISP would, it’s very important to choose a reliable one with a zero log policy and a strong encryption.

Services like MyIP.io will offer you a self-managed VPN platform, delivering fast, secure and reliable VPN service . This platform caters to a wide demographic through three channeled directions: Personal, Dedicated and Business, so it makes for a wonderful choice for corporate or personal use at the same time. Whatever provider you may chose, remember that the smart approach is to use a VPN service that you feel is the best match for you. Until then, stay smart, use a VPN!

TWEET DE PRENSA ASOCIADO JAMIE DIAMANTE SOBRE BITCOIN

20000 SATOSHIS EN BITCOIN

Photo Credit: The Matrix, movie screenshot

As the book Funky Business puts it “the internet is neither good or bad- the internet just is.” Noting a few possible scenarios of how we could use the internet to do harm or good, the book goes to show that the simple inventory of all the things that could go wrong with the internet, also means missing the point and a lot of opportunity.

Today, almost 2 decades after the release of Funky Business, several other important business books are heavily criticizing the market capitalism, raising cause for concern on what capitalism is turning into in the internet, digitalized age. These theories bring to the forefront more of the negative scenarios that could potentially turn dark, in the internet age, stating valid reasons for concern.

Some of the predictions in these books have since come true, on both sides, good and bad, the whole nine yards.

We clearly see today how we are shifting to a new form of capitalism, something called “surveillance capitalism” as Soshana Zuboff predicted, e-business guru and former Harvard professor. This new kind of political and economical system predicted by Zuboff relies on a business model that is looking to hook us all together to this larger than life networks, constantly profiting off one valuable resource: our undivided attention, cashing in on customer data extraction.

PAGINA DE BITCOINS

Photo: Post-Truth Digital Art, Graphic Design, Illustration by Guillo H

But let’s just layoff for a while from books and theories and focus on attention (yeah, you read that right let’s focus on focus itself). You know how people usually say that “the internet offers free access to information” right? Well, think again. What if I told you that the information you are receiving, no matter the medium, is not really free. It comes at the cost of your attention. In other words, information consumes attention. And in the internet age, that means that attention is a commodity that can be sold. Now I know it all sounds straight out of a Morpheus meme, the charismatic Matrix character offering you a choice between the red and the blue pill, but it’s all true ( You hear that Mr. Anderson? That is the sound of inevitability).

There are studies that show the exact dollar figure of your attention down to the hour. For Youtube for example, your attention can be estimated as being worth 4 cents an hour , for the company (You can read more on what is called attention hijacking in “The attention economy is eating our brains” by Dorian Peters here).

Not only does the internet age create products out of your gray matter, but it can also lead to excessive surveillance and the atomization of a police state, proving extremely dangerous in the wrong hands.

For the time being having a VPN in place is a real solution to overturn the effects of excessive surveillance or of any surveillance for that matter. Having your consumer data travel trough an encrypted tunnel from end to end, such a simple yet effective tool as a VPN can prove really helpful for anyone valuing privacy, while bypassing geo-restrictions to access content worldwide.

¿TODAVÍA PUEDES EXTRAER BITCOINS?

3D Rendering Credit: Steve Barrett, Embrio III

But the latest word buzz in technology is not surveillance, nor is it attention, it comes in the form of AI. Perhaps many of us know Elon Musk’s technology endeavors, when it comes to electric cars, high speed transportation, reusable cargo rockets or solar panels through Tesla, Hyperloop, Space X and Solar City. However fewer have heard of his neurotechnology company Neuralink. Neuralink is a neuroscience company basically looking to build an interface for the brain.

In the HBO series Axios, Elon Musk shares a few revelations about AI technologies and how we could avoid the dangers and employ it instead for the greater good of humanity:

“Probably a bigger risk than being hunted down by a drone is that AI would be used to make incredibly effective propaganda that we’re not seeing like propaganda, influence the direction of society, influence elections. Artificial intelligence just hones the message, hones the message, checks, looks at the feedback, makes the message slightly better within milliseconds, it can adapt its message and shift and react to news.” Elon Musk, Axios, HBO serie, season 1, episode 3 — watch an extract of the interview here.

When asked about the interface to the brain Neuralink is trying to develop and when could such an interface implant be available, Elon Musk says: “It’s probably on the order of a decade. And by the way, you kindda have this already, in a weird way in that you have a digital tertiary layer in the form of your phone, your computers, you basically have this computing devices that form a tertiary layer on your cognition. Already.”

Easy to understand why so many studies show that we are in fact hard wired to like these digital constructs that could one day become a part of our biology.

All in all, we don’t know wether Elon is an enthusiast when he predicts one decade until these new technologies could be out on the market or if it’s in fact an accurate estimation of time. They laughed at Jules Verne and boy have they laughed at Elon. In the end however, he seems to always have the last laugh, even if that laugh is a little bitter.

Till then, reminding ourselves that attention is a finite resource, that putting our focus where we need it and leaving it there despite distractions is a job we have the responsibility to achieve on our own.

5 DE FEBRERO DE 2019 PRECIO BITCOIN

BITCOIN SE ESTRELLÓ

Photo Credit: Pink, illustration by Federico Piccirillo

As a rule, general and mundane, Apple devices come with built-in, default, security features, end-to-end encryption in the case of iMessage and generally have their own settings for protection purposes.

Nonetheless, one should remain wary about urban myths such as “Apple devices can’t get hacked”, as all devices including Apple’s are vulnerable and can be hacked particularly easier if you follow the above flawed logic.

As the online privacy issue plot thickens, it is becoming increasingly apparent that we might in fact be talking about internet privacy posthumously, as so many cybersecurity advocated are finding online privacy to be, well, dead.

Is this an exaggeration or is it the actual state of affairs of 2018’s internet, you be the judge! Looking at the major global security events of this year in retrospect might shed a light.

Photo Credit: Pink, illustration by Federico Piccirillo

Starting with the inglorious attempt to block online privacy regulations, made by the US Senate and the House decision, in early April and then the Facebook scandal the same month, followed by the repeal of net neutrality in May- Is it far fetched to say that 2018 was ringing alarm bells in online security? Or is this just the new-normal, a dystopian flavored reality that we all live in and maybe the inherent course of events, given the nature of the internet and what it means today to people, corporations and governments alike?

Add to the mix that much to the surprise of people supporting ideas like “let’s build a wall”, today’s threats are likely to come from the inside. Madonna was right all along, “the enemy is not out there, the enemy is within”. Take that republicans!

Not slipping into an endless rhetoric around the topic of internet security and how you can only get a migraine from pondering the new philosophical digital paradigm, is probably for the better here (especially since I don’t know any migraine remedies). Lucky enough I do have some security advice and that’s all we should be focusing on, so next time if you skip the whole intro to get to the practical point, I won’t mind.

Here are some of the most coveted security apps for your iOS devices, designed to give you an extra layer of security:

  1. 1Password

Keeps all your passwords safe, all in one place.

screenshot from the App Store

1Password is described by its creators as a tool that “remembers all your passwords for you, and keeps them safe and secure behind the one password that only you know.[..] Just add your passwords and let 1Password do the rest.” You can use the tool to periodically re-new your passwords with new strong ones that lo and behold, you don’t have to remember.

2. 1Blocker

a native Safari content blocker entirely supported by its users. You’ll be able to block ads, ad networks, scripts designed to track your activity and many more. Just give it a spin!

3. MyIP.io

a reliable VPN service that keeps your data extra safe, traveling through a tunnel encrypted from end to end, so nobody, not even your ISP will be able to make sense of it, since all your information will go through the VPN server and not your ISP’s. You will also be able to bypass geo-restriction.

4. Signal

encrypted messaging and voice-calling similar with Telegraph or Wire.

5. Keeply

will store your data creating alternate passwords for different levels of access to your device.

MINERÍA DE ROCA NEGRA BITCOIN

Photo: Post-Truth Digital Art, Graphic Design, Illustration by Guillo H

Humanist studies of the XXIst century postulate that beyond the objective and subjective realm of reality, therein lies a 3rd dimension: the intersubjective level.

The intersubjective realm of reality is also a recurrent theme in Yuval Noah Harari’s Homo Deus, part I, where the author carries forward the idea of meaning and how we as homo sapiens designate it.

The notion of post truth seems to be talking about similar ideas or at least to be one effect of the core intersubjective reality we all live in, since the beginning of articulated speech. Post-truth however, is a relatively new term, absorbed by the Oxford Dictionary in 2016 as the international word of the year.

Bear in mind that 2016 was also the year UK voted in favor of Brexit and Trump was elected the leader of the “free world”, so along came the word, organically, to describe the new zeitgeist.

Photo: Truth and Lie Illustration by Ether Gzirishvili

“Post-truth” is used to describe a political culture “in which debate is framed largely by appeals to emotion disconnected from the details of policy, and by the repeated assertion of talking points to which factual rebuttals are ignored”. (source: Wikipedia)

According to a serious body of science we may all be living in a post-truth age, an age in which global warming is discredited and denied even, and where social media is used to manipulate, polarise and divert from objective facts, while exploiting common subjective fears and opinion.

In the sharing, internet economy, data is the currency, an informational and economic asset capable of traveling the speed of light in a vacuum, when going through state of the art optical fibers. Able to operate at 99.7% the speed of light according to researchers at the University of Southampton in England. (source: Extreme Tech)

Photo: Math Men, illustration

The digital world is now creating tangible value from big data so expect internet privacy to take an even more prominent route in the future.

Nowadays, security must come in layers, not only in the corporate environment, but on a personal level also.

Here are a few things you might want to consider for an overall improved security of your online privacy and data.

Get a VPN service for all your devices:

The number one thing you need to get in line with is having a VPN connection. It’s really simple to use and just like that poof! your data travels through an encrypted tunnel, safe from prying eyes and encrypted all the while. You basically need to pay a monthly subscription and rock on. It’s important that you don’t chose a free VPN as free VPN services are sure to get their profits elsewhere and it’s usually on your broadband expense. So avoid using unreliable free services that offer protection, but are in fact jeopardizing it.

Taking hold of your own digital footprint requires savvy, educated users, that know their rights and are not willing to compromise when it comes to their own privacy.

It’s easy to understand why more and more people resort to using a VPN service, rather than letting their information “fly” to unknown servers where they can be stored indefinitely.

Password Managers

Another simple step you can take to ensure your passwords are strong and that you have them all in order. Passwords managers are not written in stone, so naturally they can be hacked, but is far less likely to have your password hacked than it is to have one and the same password for multiple platforms and have your data compromised by relying on your memory alone.

2Factor Authentification

We know it can be annoying to have an extra layer of access when you’re in a hurry, but remember you will not be prompted with a 2fact auth method if you don’t switch devices often.

Back Up

Back up is the most obvious security measure that you can take, but people are often just not doing it. Regardless if you back up locally on a hard drive or in the cloud, you can do the extra mile and encrypt everything before backing up your data and you can be certain that your data is safe or that you can at least do a roll back to the most recent version previously saved.

Taking a few measures to securely navigate the valley of post-truth are of the essence in fearing no evil. Keeping our heads clear and taking action to protect the digital environment we expose ourselves to on a daily, without having to go to extreme lengths to do so, is the way to go in 2018.

Having a VPN in place is the smart approach to getting around all this. Think at a VPN as the middleman between you and the internet, where your ISP can only see a bunch of encrypted traffic. And since your VPN knows as much as your ISP would, it’s very important to choose a reliable one with a zero log policy and a strong encryption.

Services like MyIP.io will offer you a self-managed VPN platform, delivering fast, secure and reliable VPN service . This platform caters to a wide demographic through three channeled directions: Personal, Dedicated and Business, so it makes for a wonderful choice for corporate or personal use at the same time. Whatever provider you may chose, remember that the smart approach is to use a VPN service that you feel is the best match for you. Until then, stay smart, use a VPN!

¿CÓMO PUEDO MINAR BITCOINS?

Photo Credit:Safe & Sorry, illustration by Kurzgesagt

A popular way to refer to a Virtual Private Network or a VPN is the term “ip proxy” a much more popular notion conveying a somewhat more self explanatory meaning. A VPN is thus a tool anyone can have in place to bypass geo restrictions, add another layer of security to their internet connections and finally  getting around the economics and politics of what is ultimately a bandwidth battle among serious players. On the economic side of things we have a new “bright” and “exciting” idea  called bandwidth throttling. This is something that your ISP (Internet Service Provider) is now able to do without notice under the auspices of the new FCC rules – representing the political side of this affair.  Bandwidth throttling means that your ISP can slow down your connection if you happen to access service that your ISP is not partnered with. At the same time, your ISP could also create “fast lanes” to preferred partners creating unfair disadvantages if for example you watch Netflix, instead of Hulu.

Photo Credit:Safe & Sorry, illustration by Kurzgesagt

 

GETTING UNDER THE WIRE

Rather than getting wrapped in all the media headlines and speculation, we say it’s time we cut a shortcut through all the debate and aim for a solution to overthrow the effects of net neutrality repeal. It all sounds very sophisticated, but net neutrality is actually a common thing that can affect your internet connection in a very “tangible” way. If your ISP is no longer legally binded to remain neutral, think of how they can affect your connection by throttling access to services they are not partnered with.

The simplest way to go around this and regain control over the situation is to set yourself up with a VPN service. For example, under the new rules, you could be charged more for accessing Hulu instead of Netflix. With a VPN in place however, your ISP won’t even know what you are accessing, since all your data will appear encrypted.

 

BEFORE BUYING A VPN

But which VPN to pick, you may ask? Since your VPN provider can pretty much know all your ISP knows, it is important to chose a reliable one, ideally with a zero log policy. To spare you the trouble of reviewing different VPN services, we tested things like speed, encryption, locations and costs as main indicators of a good VPN service forMyIP.io VPN.

Here are the features that we you will most definitely find a value in when using our service:

1. High Speed: Fast uploads even for big transfers.

2. Open Ports: Not many VPNs will allow you to use PPTP and even fewer will help you use this feature by guiding you on how to do it. MyIP.io offers comprehensive support given by a very responsive customer support team.

3. Static IPs: Usually an extra feature, static IPs are marketed at extra fees. On a MyIP.io you’ll get a static IP on a $5 plan.

4. Cost: You’ll pay less than $6 if you go with an annual subscription and $8 for a monthly. The costs are even lower for a dynamic IP, which comes with the “personal plan” for less than $3 a month.

5. Master VPN Account for teams: If you decide to go with the “business plan” we will allocate a whole subnet to you or engineer a custom solution to meet your needs. In a nutshell, the business VPN solution allows multiple accounts into one master deck, a convenient scenario in term of having control, management and payment. Simultaneous connections up to 50, on this plan.

6. Strong Encryption and a Zero Logs Policy: My IP.io comes bundled with all the strong encryption protocols, supporting all the latest security protocols such as SSTP, PPTP, IPSec, L2TP, SSTP and 128bit –AES, OpenVPN cipher. They will not keep any logs of your activity on their server, so you can be sure no 3rd party is spying on your data.

7. Locations: You’ll have a diverse location offering to chose from with My IP.io that you can use to bypass geo-restrictions.

In the end, whatever you chose, be aware that a VPN provider is the middleman between you and the world wide web, so make sure you get a reliable one that ticks all your boxes. For us, that’s MyIP.io.

KEY IDEAS THAT YOU CAN KEEP AND CALL YOUR OWN:

hoto Credit:Safe & Sorry, illustration by Kurzgesagt

With all the crazy headlines surrounding the online security, net neutrality ordeals, you kind of get the feeling that it’s been a pretty intense year. But wait 2018 it’s only half way through and signs of weird outcomes are seen almost everywhere, counting the World Cup results as one.

Whether it’s the Facebook scandal, self-driving cars or politics, there’s no denying that technology is taking over and chances are you are affected by all or at least some of these narratives.

Out of the bunch, net neutrality is the one we are focusing on here and how you can circumvent it.

Summing up, the common sense solution to go around net neutrality repeal is to set yourself up with a VPN service. If you take nothing but the main idea from this written material, this is it:

First, make sure your VPN provider has a zero logs policy. Most of VPN providers will claim they don’t keep logs, but will in fact document logging data that they can trace back to you. Going with a service that can not keep this information by design, like MyIP.io, is an exciting option.

And second, beware of throttling of traffic. Your ISP might try and throttle VPN traffic, however it is difficult for your ISP to do so since it can affect all traffic, including the one that goes to their partners and customers.

All in all, net neutrality could be at some point in the future revoked, but even if it is, naturally there will be a great deal of back and forth in this kind of matter. Attempts for another repeal might and will be pushed forward, if the case. ISPs have a lot at stake to simply give in that easy. While fighting a good cause is important, we think that focusing on circumventing the effects of net neutrality repeal is equally important. Especially since, going around it, requires just a simple education and making sure that we’re a bit more savvy then yesterday, when it comes to our individual rights and preserving them in an increasingly digitalized world.

INFORMACION SOBRE BITCOINS

Photo Credit: Google Space, illustration by Muhammad Rifqi Rizaldy

Your Google Activity Should Be Nobody’s Business. Literally. There are businesses taking place in the search bar and far beyond, not only pay per click systems but extensive data collection of all your Google activity, is at the basis of high profiling well.. you, with a big emphasis on your shopping preferences or political affiliation.

Taking a privacy stance when it comes to using the internet is the new “drink responsibly”, so prior to feeling entitled to a private life while online, let’s just start with a clear mind in recognizing how much of what we put out there is actually in our power, slash hands, slash keyboards. And yet another important amendment before we get started, let’s also rise above the inclination of brand association, of trying to find a scape goat. Meaning that regardless if it’s Facebook, Google or big telecom names like say Verizon or Comcast, whichever the brand hype media is taking a stand towards, let’s just admit that privacy breaches and privacy concerns are virtually everywhere. High and low.

So, with realistic expectations of what the online environment means today from two main perspectives as informational medium and marketing tool, we can manage to reach a clearer understanding of what to do in order to preserve privacy, while enjoying all of the perks the online world brings to the table.

Credit Photo: Digital Trip, illustration by Caparo design crew

Today we focus on Google activity and how you can disable it. Google knows a lot about our digital personas, as I would not go as deep into saying that Google knows us, since I remain loyal to the idea that our multifaceted lives and personalities can not be reduced to our digital footprint. And yet the thought of having a personal record with everything you’ve ever clicked on, every character you’ve ever typed in, it’s none the less disenchanting. Bare in mind though, that deleting or disabling such functionalities will not guarantee that your data is being deleted from Google’s servers altogether, but it will sure keep your browsing history from following you around. On the other hand don’t always think that companies like Google or Facebook have all the frivolous reasons to store your data. On many occasions this set of information is used for a better overall experience with the product a particular company is selling, wether is tangible or a service. On top of that, for users performing illegal activities while online, the data Google stores about them can prove very helpful in identifying suspicious or fraudulent activity and in this case, depending on the country’s jurisdiction, Google can be asked under a search warrant or subpoena to provide logs to authorities. This is something that Google admits openly in their annual Transparency Report.

Long story short, if you simply feel more comfortable having your google activity disabled and you’re not looking for any trouble while online, your browsing data should be safe from prying eyes once you get to manage the data Google stores on you.

Credit Photo: Digital Trip, illustration by Caparo design crew

I also find that deleting this data is a good step in preventing the engine in always feeding you what you previously searched for or viewed. That alone can be an enormous black hole you may find yourself into, especially in the case of Youtube, that you can also manage from your Google activity page.

For all the information stored by Google such as your location stored in maps, your contacts stored in calendars and apps, your voice stored in voice searches, your Youtube search and watch history, there’s a disable function you probably never heard about. Here’s a simple and safe guide on how to delete or disable unwanted functions in your Google activity page.

  1. Back up 
    If you’re feeling nostalgic you can download your data before deleting anything by going to Google Takeout here.
    You will receive an email when the download is complete containing a link where you can download your data.

2. Google Activity 
Here you can delete virtually all Google searches.

3. Stop or Pause Your Web and App Activity

After deleting searches you will want to get Google to stop or maybe pause your activity from being stored, you can do that in your Activity Controls Page, the Web and App section here.

For enhanced privacy, people are also turning to VPNs to reclaim or preserve online freedom and privacy and we strongly advice that you do the same.

No longer an exotic tool, VPNs are now entering the mainstream and given the context it’s easy to understand why.

Simply put, when you’re using a VPN, all your data travels through a tunnel encrypted from end to end. In other words, not even your ISP will be able make sense of your data, since you’ll have all your online data happen elsewhere, not going through your ISP servers and encrypted all the while.

But it’s not just Google or your ISP that keeps track of your browsing data, it’s your cell phone provider too, most apps, operating systems, and other services do the same.

Smartphones with preinstalled tracking software, secretly bundled with tracking files are sold everyday, while some companies try to leverage the very problem they created by charging extra for privacy.

Having a gate io in place is the smart approach to getting around all this. Think at a VPN as the middleman between you and the internet, where your ISP can only see a bunch of encrypted traffic. And since your VPN knows as much as your ISP would, it’s very important to choose a reliable one with a zero log policy and a strong encryption.

Services like MyIP.io will offer you a self-managed VPN network platform, delivering fast, secure and reliable VPN service , The platform caters to a wide demographic through three channeled directions:Personal,Dedicated and Business, so it makes for a wonderful choice for corporate or personal use at the same time.

Engineered as a global platform,MyIP.io is a VPN service provider committed to developing applications and services that preserve an open and secure Internet experience while respecting user privacy.

FUENTE BITCOIN

Photo Credit: illustration by Joshua Harvey

Setting yourself up with a reliable, robust VPN service is a real solution to overturn the effects of net neutrality repeal.

Under the new FCC regulation, an ISP has the liberty of charging you more if you watched Netflix instead of Hulu, creating “fast lanes” and unfair advantages to preferred partners. Don’t think your ISP would do that if given the chance? Well, it’s already happening, since net neutrality repeal has gone into effect on June 11th.

With the present “state of affairs” there is no doubt that the online environment is becoming increasingly politicized and the concept of a open but safe internet is in the midst of powerful forces of antagonistic interests fighting each other. A balance between these forces is a desiderate for a healthy environment that we’re not sure how or when we’re going to achieve.

WHAT TO DO?

In the meantime, people are turning to VPNs to preserve access and to reclaim online freedom and privacy and we strongly advice that you do the same.

We tested a few VPN services in terms of speed, security and customer support and MyIP.io stays top of mind. They offer static IPs at no extra costs, have super fast speed for uploads and unparalleled cost to feature ratios.

No longer an exotic tool, VPNs are now entering the mainstream and given the context it’s easy to understand why.

Simply put, when you’re using a VPN, all your data travels through a tunnel encrypted from end to end. In other words, your ISP will not be able to block access or make sense of your data, since you’ll have all your online activity happen elsewhere, not going through your ISP servers and encrypted all the while.

But it’s not just your ISP that keeps track of your browsing data, it’s your cell phone provider too, most apps, operating systems, and other services do the same. Smartphones with preinstalled tracking software, secretly bundled with tracking files are sold everyday, while some companies try to leverage the very problem they created by charging extra for privacy.

Moreover, it’s not just the American net neutrality repeal, UK also passed a bill that basically allows internet history snooping, the infamous bill is known as the Snooper’s Charter (suggestively enough!). This British bill requires that every ISP keeps your search history for 1 full year.

And matters seem to only get worse in the future. Taking hold of your own digital footprint requires savvy, educated users, that know their rights and are not willing to compromise when it comes to their own privacy.

It’s easy to understand why more and more people resort to using a VPN service, rather than letting their information “fly” to unknown servers where they can be stored indefinitely.

An exact break down of all the things you can use a VPN for would maybe further clarify this topic.

We listed the most popular ones we could think of:

1. Torrents

Torrents are not all illegal, but for an ISP is really difficult to set the legal ones from the illicit, so very often that not they block this kind of activity. Having a VPN in place will camouflage the subject of your downloads and will make it harder for your ISP to track and block torrenting.

2. Security

Think of your health records, your banking details and other sensitive information that you might use while online. A VPN will encrypt that information and will keep your connection secure at all times.

3.Geo-restricted content

Every time you travel you get a different set of content according to your location. Sticking to your country of residence through a VPN while outside the country will leave your content unchanged, like say your Netflix catalog. On the other hand, changing your IP location to one that allows you to watch the World Cup in Russia as it happens is also a VPN away.

4. Research or journalism

Research data or revealing a sensitive issue to the public through journalism is something that people might strive extra to acquire access to. Having that data encrypted through the help of a VPN will spare you the trouble.

5. VOIP services

Using services like Skype or FaceTime to interact to your peers at work, may be a common thing inside your company. VOIP security is still lagging behind, but a VPN will help secure your connections, so you don’t have to.

6. Public Wi-Fi in airports or coffee shop

Notorious for welcoming prying eyes, airports and public Wi-Fi spots are not to be used sans VPN protection.

8. Gaming

Your connection to your gaming comrades can be direct through a VPN, resulting in increased load times and limited buffer overflows. You will also be able to get the latest releases of your favorite games as they happen and not wait for them to hit your location upon schedule.

10. Checking your competition out

It’s pretty easy for anyone to track the source of their traffic through their Analytics account so you too can be spotted checking your competition out. You can still do that undisturbed and anonymous with the help of a VPN service.

Having a VPN in place is the smart approach to getting around all this. Think at a VPN as the middleman between you and the internet, where your ISP can only see a bunch of encrypted traffic. And since your VPN knows as much as your ISP would, it’s very important to choose a reliable one with a zero log policy and a strong encryption.

Services like MyIP.io will offer you a self-managed VPN platform, delivering fast, secure and reliable VPN service . This platform caters to a wide demographic through three channeled directions: Personal, Dedicated and Business, so it makes for a wonderful choice for corporate or personal use at the same time. Whatever provider you may chose, remember that the smart approach is to use a VPN service that you feel is the best match for you. Until then, stay smart, use a VPN!