What? But I thought that was the whole purpose of Chrome private browsing mode, Incognito.
That’s actually what everybody thought. But it turns out Incognito mode doesn’t keep you that private after all. It’s more like a hideout from your work colleagues or family, because the ISP can still see all the websites you’ve lusciously browsed, along with your boss and government.
Did you know that your Internet Service Provider (a.k.a. ISP) can see your entire browsing history and online traffic? Unless you hide your IP and use confirmed privacy solution, you stand no chance to keep your online life private. Read More
More than 2 billion people are living under online censorship
This is more than enough for CyberGhost team to continue our fight for the free internet in 2016 with even more power and over 650 servers worldwide.
But the news from the Web Index Report is not great: “The internet is less free, more unequal, and web users are at increasing risk of indiscriminate government surveillance”. In 2013, the report showed over 30% of Web Index countries were blocking politically or socially sensitive Web content to a moderate or extreme degree. In 2014 that figure went up to 38%.
“Many governments, companies, schools, and public access points use software to prevent Internet users from accessing certain websites and Internet services. This is called Internet filtering or blocking and is a form of censorship. Content filtering comes in different forms. Sometimes entire websites are blocked, sometimes individual web pages, and sometimes content is blocked based on keywords contained in it. One country might block Facebook entirely, or only block particular Facebook group pages—or it might block any page or web search with the words “falun gong” in it.”
Use CyberGhost to access safely censored content and protect your online privacy!
Click to Tweet
And in recent days, other massively used apps, such as Whatsapp, have been blocked for short periods in Brazil and United Arab Emirates.
The current censorship situation around the world
At the same time, there is a fragile legal frame to support online freedom, with 84% of the countries having no effective laws and practices to protect the privacy of online communications. China is leading the top of countries blocking and filtering the web content. According to the same report, Uruguay allows its citizens the most online freedom.
When governments really cross the line, violating fundamental rights, like Turkey, during the “Big Ban” from March 2014, when the government blocked several web pages and access to YouTube, Twitter and Soundcloud, international organizations and companies react strongly. Several countries pressured Erdogan’s government to release the ban and CyberGhost offerd 30.000 Premium keys to Turkish citizens so they can use the internet unrestricted.
So there is hope. Out of the 45 Web Index countries with extensive constraints on speech, only seven (about 16%) seem to censor more heavily online than offline.
What can you do?
Use a trusted VPN to access safely the censored content and protect themselves and their online privacy. In some cases, like the case of some journalists in conflict areas, even their life.
Here’s a video that explains how hiding your IP helps you unblock restricted websites and banned apps:
If you want to learn more on how to avoid being tracked online, read these 3 essential tips.
Does your government block access to an app or website? Enter here and tell us which ones and we will fight to help you unblock them with Cyberghost.
Does your government block access to an app or website? Use #CyberGhost to unblock them safely!
Click to Tweet
So we just have to keep on reporting the abuses and demanding better laws to sustain online privacy for everybody, while using encrypted online connection.
In the past few days, media reported about how parts of the US IT industry resist the espionage plans of the US government – triggered by Apple’s refusal to hack the phone of a suspect and prospectively install backdoors for secret services. What exactly is Apple required to do? And why is the company’s resistance so important? Also concerning VPNs …
For the first time in history, the government asks a company not just to assist in the investigation of an offense, request that no one would actually complain about; but publicly demanding Apple to develop a completely new software that makes the onsite security of its devices and features superfluous. This demand is affecting the security features that impact all Apple users and anyone who communicates with Apple’s users, and which are essential in the prevention of digital crimes. Bottom line, the company is forced to develop a master key that unlocks every single iOS device.
What would be the new changes? If FBI is successful, three major changes should be implemented by Apple:
Currently, iOS can be adjusted so that it clears the internal keys after 10 unsuccessful password entries. FBI wants the software without this feature.
After each unsuccessful password entry to unlock a device, iOS prolongs the time until another attempt can be made. The FBI wants the new software to accept an infinite number of entries without breaks.
iOS requires that passwords are entered manually. The FBI would like the possibility to enter passwords electronically, so one can run automatically a variety of options in a short period of time.
FBI's demand is affecting all Apple users and anyone who communicates with them. #PrivateLivesMatter
Click to Tweet
If FBI’s requests will be approved, not only would Apple suffer of a bigger image loss than the one triggered by the Snowden revelations, but there would arise a fatal situation for citizens and businesses alike. By default, built-in back doors would not only be available for the US government, but potentially for others as well, especially for known enemies of the western countries like Iran, North Korea and Russia, but also the competing national economies, hackers and cybercriminals.
It’s rather naïve to believe that for the sake of all citizens, governments are the only ones trying to keep an eye on encrypted data. This rather reveals how much the thinking of law enforcement agencies has developed in only one direction: understanding total surveillance with themselves as luminaries of the planet, morally unassailable and almost uncontrollable anyway.
Another step towards 1984 2.0
And it would be only the first step, because once the protection of devices is gone, VPNs are just the next target on the hit list. If Apple’s refusal fails in court, the enforcement of backdoors for encrypted Internet access via virtual networks is only a matter of time. And besides: US companies operate globally. What arguments will be used for denying the Chinese government to do the same? And the Iranian? Who then has the last word when it comes to separate the evil from the good? And how exactly is the Russian mass surveillance different from the US one?
We hope you’ve been enjoying CyberGhost 5.5 these past weeks and also that you’ve been having a blast testing our new features: the powerful ad blocker, the smart data compressor, and the vigilant malicious content detector.
This article is the last installment in our “CyberGhost 5.5 new features” series and it’s here to tell you how we protect you against malicious websites and phishing attempts.
The future will not only be about thinner, faster, and bendable smartphones, but it will definitely also be about security and bigger online threats.
Let’s imagine a scenario where you don’t need to take photos anymore because Google will simply choose the best pictures from a live stream of the day’s events just to make your life easier.
Soon you won’t even need to decide what to eat, your Android phone will know exactly what you need and what you like, showing you the most suitable foods for your age. So long decision paralysis, right?
But there’s so much hype around the future of Android that we forget to see the obvious threats, the alarmingly increasing number of Android malware, and the criminal activities carried out on smartphones.