You Are Not Anonymous

It’s our last VPN myth-busting week here at Golden Frog. Today we’re sharing some information about the VPN alternative Tor in Myth #10. Myth #10: Tor is a better alternative than a VPN Reality: Tor is frequently cited as an alternative to using…

Tor is not anonymous

Help Bring Down the Great Firewall of China

There’s a petition circulating the Internet asking United States President Obama to bring down the Great Firewall of China. The Great Firewall imposes restrictive censorship on Internet users in China. This petition to bring down the Great Firewall echoes much of what Golden…

We the People Great Firewall Petition

Public Wi-Fi: Think Before You Connect

There’s been a lot of talk about the dangers of public Wi-Fi lately. From a recent Digital Trends article outlining these dangers, to last week’s report of AT&T using an airport hotspot to serve ads, to Skycure’s recent study on unsecured connections at…

blog_wifi_warning

Encryption Fundamentals: What Everyone Should Know

Encryption is an essential tool and a fundamental right. It should be easy to use and available to the entire population, and should not contain any backdoors.  Golden Frog advocates strongly for encryption, and we’ve outlined four key principles of encryption below. 1….

Encryption Fundamentals

Privacy Companies Don’t Always Keep Your Data Private

And not all VPN providers are created equal. This week, we’re debunking myths about what privacy companies actually do with your data, and how VPN service providers can vary dramatically. Check out Myth #8 and Myth #9 to learn more now. Myth #8:…

VPN Myths 3rd Party Data Sharing

Google Currently Unblocked in China

There’s some big news in Internet censorship today – Google is reportedly unblocked in China. Blockedinchina.net, a website that reflects which sites in China are currently blocked, displays Google’s unblocked status in provinces around the country. The site is reportedly unblocked due to…

An Inside Job: How the IoT is Changing Home Security

Several articles have come out recently about the Internet of Things (IoT) and the privacy risks associated with it. Most devices on the IoT connect through Wi-Fi, so if your connection isn’t secure neither are those devices. This means things like your smart…

Internet of Things IoT Security

SXSW 2016: Vote for Golden Frog’s Panels

Golden Frog submitted 2 panels to the SXSW PanelPicker this year, and we really want to be selected to present! The first panel is a group presentation with our friends from the Center for Democracy and Technology (CDT) and SpiderOak titled “Online Privacy…

SXSW 2016 Panels Privacy and Encryption

Beyond the Wall: Escaping China’s Great Firewall

A recent op-ed in the New York Times by Murong Xuecun stated, “You shouldn’t let a wall decide what you know.” He was referring to the Great Firewall of China (GFW), and how important it is for Internet users in China to bypass…

Great Firewall of China Escape

Does Your VPN Provider Run Their Own Network?

Or do they rent their servers or use a hosting company? This week, we’re debunking two more VPN myths – Myth #5 and Myth #6. The main takeaway: if your VPN provider doesn’t run their own network, you are not anonymous. Myth #5:…

VPN Providers Rent Servers