Categories
News

A New 13-inch MacBook Pro With Scissor Keyboard Might Be Ready Next Month [Report]

With the MacBook Air and 16-inch MacBook Pro now sporting the new Scissor keyboard in lieu of that awful butterfly keyboard, it's only a matter of time before we get to see a 13-inch MacBook Pro with the same input method.


[ Continue reading this over at RedmondPie.com ]

Categories
News

The Latest Apple Watch Series 5 Hit All-Time Low Prices

The Apple Watch Series 5 is the hottest wearable on the market right now and Amazon is offering various models with up to a $50 discount applied. Normally these things would sell for prices starting from $399, but right now they start at just $349.


[ Continue reading this over at RedmondPie.com ]

Categories
News

Daily Deals: save big on Amazon smart devices, Sonos smart speakers, and more

Welcome to our Daily Deals column, where we round up the best tech deals from around the web. Here you’ll find discounts on everything from Apple products to accessories, video games and much more. But you better hurry, these prices won’t be around forever!
Categories
News

CBS drama ‘All Rise’ will use FaceTime and Zoom to shoot an upcoming episode

Apple's FaceTime, along with Zoom, will help producers of the CBS drama series "All Rise" shoot an upcoming episode about the global coronavirus pandemic.
Categories
News

Apple TV+ goes behind the scenes of the anthology series ‘Amazing Stories’

Apple has shared a behind the scenes look at the anthology series "Amazing Stories", which is available now on Apple TV+.
Categories
News

Movie Company Boss Urges US Senators to Make Streaming Piracy a Felony

The Senate Judiciary Subcommittee on Intellectual Property is actively looking for options through which the US can better address online piracy.

During a hearing last month, various experts voiced their opinions. They specifically addressed measures taken by other countries and whether these could work in the US, or not.

Pirate site blocking and upload filtering emerged as the main topics during this hearing. While pros and cons were discussed, movie industry insiders including Millennium Media co-president Jonathan Yunger framed these measures as attainable and effective.

After the hearing, senators asked various follow-up questions on paper. Last week we reported how former MEP Julia Reda answered these by stressing the importance of affordable legal options. Yunger, however, takes another approach.

In his answers, which were published before the weekend, he reiterates the power of website blocking. In addition, Yunger also brings a second, previously unmentioned issue to the forefront: criminal penalties for streaming piracy.

“The second thing that we could easily do in the United States is close the legal loophole that currently allows streaming – which accounts for the vast majority of piracy today – to be treated as a misdemeanor rather than a felony,” Yunger writes.

Under US law, streaming and downloading piracy are seen as two different offenses. Not just from a technical point of view, but also in the way they are punished. Streaming is seen as a misdemeanor, with a maximum penalty of one year in prison, while other forms are a felony, which can lead to five years of jail time.

Lawmakers tried to change this with the Commercial Felony Streaming Act in 2011, and later with the SOPA and PIPA bills. These bills all failed and as a result the gap between streaming and traditional file-sharing remains today.

In his answers, Yunger notes that ‘this loophole’ was completely accidental as streaming wasn’t a thing yet when the DMCA was enacted. Putting it on par with other forms of piracy would greatly help to address the streaming piracy problem.

“If we could make this adjustment to the law, it would effectively shut down a cottage criminal industry of websites, app developers, and set top box sellers in America who are profiting enormously from illegal streams of movies, television shows, and live events,” Yunger notes.

“These streaming services are an existential threat to our industry. Both the Department of Justice and the Copyright Office have recognized this threat to creativity and the American economy and have supported this change to the law,” he adds.

Millennium Media’s co-president says that there are dozens, if not hundreds, of Americans who’ve made a business out of criminal streaming. This isn’t a surprise for the Department of Justice. However, it’s harder to effectively prosecute these people under current law.

“We must change existing law to create a more powerful deterrent for Americans to engage in streaming piracy, and to allow the DoJ to prosecute these criminals who are engaged in massive levels of infringement with the same felony penalties that apply to illegal downloading and distribution,” Yunger notes.

These comments are not entirely new. Several copyright holders and industry groups have argued the same in recent years. Thus far, this hasn’t resulted in any legislative changes, but it looks like pressure is building.

In a way, it feels like history is repeating itself. Almost ten years ago, the same arguments were being made. At the time, website blocking and felony steaming made their way into concrete bills. These were eventually ‘shelved’ after massive public protests, but according to Yunger and others, it might be a good idea to reintroduce them, perhaps in a more modern form.

A copy of Jonathan Yunger’s full responses to the Senator’s questions is available here (pdf).

Drom: TF, for the latest news on copyright battles, torrent sites and more. We also have an annual VPN review.

Categories
News

The 2020 iPad Pro Can Disconnect Its Microphone To Prevent Snooping

The 2020 iPad Pro can disconnect its microphone to prevent snooping. Here's how this much-needed security feature works.


[ Continue reading this over at RedmondPie.com ]

Categories
News

8 Bad VPNs You Must Avoid to Protect Your Privacy

We highly recommend that all people use VPNs—there’s no doubt about that. Indeed, there are many reasons to always use a VPN online, including but not limited to improved personal privacy.

But not all VPNs are worth using. In fact, some VPNs are so bad that you’d actually be better off not using anything, than routing your traffic through their servers. Here are some warning signs to look out for, plus specific VPN services to avoid if you value privacy.

What Makes a VPN Bad for Privacy?

Country of Origin

vpns - mobile security

Never connect to a VPN server that’s located in one of the “Five Eyes” countries. Those are US, UK, Australia, New Zealand, Canada. Also avoid the “Nine Eyes” countries (France, Norway, Denmark, The Netherlands). And avoid the “Fourteen Eyes” countries (Belgium, Italy, Germany, Spain, Sweden).

The governments of these countries either spy on their own citizens, spy on each other’s citizens, swap such spying intelligence with each other, or otherwise enable and encourage spying in some way. These countries are likely to pressure and acquire intelligence from VPN servers operating in their territories.

Activity Logging

When connected to a VPN, all of your internet traffic is routed through the VPN’s server. Some keep minimal logs. This might be the IP from which you connected and the time of your connection. Others keep full track of browsing habits, websites visited, apps used, etc. Logs are bad because they allow activity to eventually be traced back to you.

Even VPN services that promise “no logging” can’t be trusted at face value. They might not participate in “activity logging” but may actually be logging other things. How do you know whether a VPN’s no-logging claim is trustworthy? You have to read their…

Terms of Service

A VPN service’s Terms of Service outlines exactly what you can expect as a user: what kind of activity is forbidden, what’s tracked, what’s not, etc. When in doubt, you should contact the service and ask questions to determine what their logging policy is really like.

Some things to keep in mind:

  • Should they log anything related to your connection, including IP or connection time, then it can eventually be traced back to you.
  • If they won’t block accounts, even ones that are highly abusive of the system, then there’s a good chance the service truly is log-free.
  • If they claim they can block accounts without logging information that can identify you as a user, then you should pry into how it works. Most of the time, they won’t be able to give you a clear answer, in which case you should assume logs are somehow involved.

Lack of OpenVPN

computer internet user

VPNs can operate using many different “types” of connections. L2TP and PPTP are some of the more popular. But they have glaring flaws that make them poor options for privacy. OpenVPN is the best protocol because it’s open source and offers the strongest encryption of traffic.

Leak Test Failure

Sometimes your actual connection to the VPN server can be compromised. For example, your PC goes to sleep and doesn’t reestablish the VPN connection upon waking, or you switch from Wi-Fi to Ethernet, or your router gets unplugged and you have to plug it back in.

Even when you’re “successfully” connected to the VPN, some of your traffic may not be routed through that connection. This is called a leak, and it undermines the entire point of using a VPN for privacy.

Certain VPN clients are better than others in this regard. So you should periodically check up on this using so-called leak testsWebRTC Leak Test, IPLeak, and DNS Leak Test, just to name a few. Visit each test twice: once without VPN, once with VPN. Your IP addresses should be different both times.

Free Service

coins bitcoin

One of the most common VPN myths is that free VPN services are good enough. It turns out that free VPNs come with a lot of risks. The main one is that such services need to pay for servers and bandwidth somehow. If users aren’t paying anything, then they need to generate revenue some other way. Most often this is by selling user data and information.

Free trials for paid services are fine. But unlimited free services are not. So, as with most things, you get what you pay for, and privacy is not cheap. We always recommend paid VPNs over free.

Lack of Anonymous Payment

One more thing to keep in mind: if you want to add an additional layer of obfuscation, you might prefer a VPN service that takes anonymous payments. Whereas a credit card or PayPal account can be traced back to you, cryptocurrencies like Bitcoin don’t leave such a breadcrumb trail to follow.

Which VPNs Should You Avoid?

It’s one thing to speculate whether a particular VPN service is safe or unsafe based on what they say and what they promise. It’s something else altogether when a VPN service is caught red-handed as far as tracking activity, keeping logs, selling user data, etc.

If you value your privacy, here are the VPN services you want to avoid—ones that have been shown and proven to violate user privacy in one way or another.

1. Hola

Back in 2015, Hola was found to do something that no other VPN service does: turn the PCs of its users into “exit nodes,” allowing other Hola users to route their traffic through said nodes. Hola sold this bandwidth to a third-party service. A violation this egregious puts Hola squarely in the category of services to NEVER use ever again.

2. HotSpot Shield

In 2017, a privacy group made a claim against HotSpot Shield for “intercepting and redirecting traffic to partner websites, including advertising companies.” This claim accused HotSpot Shield of logging connection details, which directly went against its privacy policy. A 2016 research paper [PDF] had previously found HotSpot Shield “injecting JavaScript codes” and “redirecting e-commerce traffic to partnering domains.”

3. HideMyAss

In 2011, the Federal Bureau of Investigation tracked a hacker’s activities back to an IP address belonging to the HideMyAss VPN service. The FBI acquired activity logs from HideMyAss and used them to catch and prosecute the hacker. Despite the illegality of the hacker’s actions, this incident made one thing clear: HideMyAss does keep traceable logs.

4. Facebook Onavo VPN

In early 2018, it came to light that Facebook’s built-in “Protect” feature for mobile apps was really just the Onavo VPN it acquired back in 2013. Regardless of how effective it is at protecting users, there’s one thing that ought to deter you: Onavo will collect your mobile traffic data to “improve Facebook products and services, gain insights into the products and service people value, and build better experiences.”

5. Opera Free VPN

In 2016, the Opera browser introduced a new “free unlimited VPN” feature available to all users. But despite the naming, Opera Free VPN is not a VPN in the truest sense. It’s more like a web proxy, and Opera does collect usage data which may or may not be shared with third parties.

6. PureVPN

In 2017, the Federal Bureau of Investigation tracked and arrested an alleged stalker after acquiring information on his activity using the PureVPN service. Despite PureVPN’s no-logging promise in its privacy policy, it turned out that they kept enough information to be able to identify the accused when cooperating with legal authorities.

7. VPNSecure

Not only is VPNSecure headquartered in Australia (a “Five Eyes” country), but a 2016 research paper [PDF] found IP leaks and DNS leaks with the service, plus “egress points” for residential users, which is similar to the “exit nodes” concept that sunk Hola above. The paper suspects but does not confirm that the bandwidth of users may be being used without their knowledge. However, if you want to be safe, you should probably stay away.

8. Zenmate

In 2018, a test by vpnMentor found that ZenMate (along with HotSpot Shield and PureVPN) suffered from IP leaks, which could give away your identify even when using the internet with an established VPN connection through ZenMate. This, coupled with the fact that ZenMate was slow to respond to these findings, makes us wary of their respect for user privacy.

Beware of Security Breaches

Another two VPN services you may want to think twice before using are NordVPN and TorGuard. In 2019, both VPNs were attacked by hackers. The hackers were able to access some information, although not login credentials. As neither company keeps user traffic logs, user traffic information was not compromised.

Companies suffering from a security breach is not unusual. Though you would hope that a VPN company would have better security than average. However, what was really worrying about this incident was the way that both companies responded. NordVPN did not disclose to its customers that a breach had occurred. TorGuard disputed whether the breach was really important.

There were accusations of blackmail and threats of court cases between the two companies.

In any case, it’s unlikely that any of this would have an effect on the security of customers in practice. However, it does not show either company in a flattering light. Both companies seem more interested in protecting their brand than in protecting their customers.

Privacy-Conscious VPNs You Can Trust

As of now, there are only a handful of VPNs with no-logging policies that privacy-minded folks trust. To learn more about what to look for in a VPN, see our advice on how to choose a VPN provider. We recommend ExpressVPNCyberGhost, and Private Internet Access.

Read the full article: 8 Bad VPNs You Must Avoid to Protect Your Privacy

Categories
News

iOS 14 Wallpaper Settings Leaked, Code Reveals Home Screen Widgets, More

iOS 14 Wallpaper settings have just leaked, while a code has revealed some Home Screen widgets and more. Here are the deals.


[ Continue reading this over at RedmondPie.com ]

Categories
News

Stay Safe, Stay Home: How To Use NordVPN To Access Global Netflix Library From Any Country

Here's a step-by-step guide on how to use NordVPN to access any Netflix library, including shows meant for the US, from your country.


[ Continue reading this over at RedmondPie.com ]