Security. Privacy. Shopping. Travel. |

August 2014

IceBrowser’s Indiegogo Campaign Is Live!

By |August 28th, 2014

The IceBrowser Indiegogo campaign is officially up and running
Your Internet: Encrypted. Offshore, secured, and private. Not only will you be able to browse the web privately and securely from their encrypted servers in Iceland  – they also provide some cool perks.

While this first iteration is a very promising and capable start, we need your support to build our network of well-kept servers and feature set. While web browsers are finally starting to understand the need for privacy and security online, corporations, government organizations, and cyber criminals are updating their tactics at an even […]

September 2014

Net Neutrality: Don’t Break the Net

By |September 8th, 2014

Net neutrality prevents corporate ISP providers from telling you what types of content you are authorized to view online and provides a level playing field for everyone. There are no Internet fast lanes or slow lanes (unless you are on dial-up). The entire purpose of net neutrality is that cable and phone companies should treat all websites on the Internet equally.
For example, Comcast would probably like to promote NBC’s content over ABC’s to its Internet subscribers. That’s because Comcast and NBC are affiliated. But net neutrality prevents Comcast from being able to discriminate, and it must display both NBC’s and […]

August 2014

Website policies & the immortal soul clause

By |August 20th, 2014

Do you ever read website policies (terms and conditions, terms of service, privacy policies, and other policies) at all the free websites that you sign up for? Do you really know (without a shadow of doubt) what terms and conditions you are actually agreeing to? Seriously, most people don’t have a clue — and most don’t even know if they sold their soul for an online purchase.

The immortal soul clause
Four years ago GameStation played an April fools prank and added an immortal soul clause to their terms of service whereby 7,500 online shoppers agreed to grant the company a non transferable […]

July 2014

Cocoon Plug-in Update

By |July 30th, 2014

Using Cocoon with a PC? Cocoon works with Firefox 30 and below! If you’re having troubles with Cocoon and Firefox 31, click here and follow these instructions to get browsing securely once more!
Uninstalling Instructions
How to Uninstall Firefox for PC

Open Add/Remove programs from the Control Panel, alternately:

Control Panel > Programs > Programs and Features
Locate Mozilla Firefox, right click to uninstall
Do not check “Remove my Firefox personal data and customizations”.
Click “Uninstall”

How to Uninstall Firefox for Mac

Open the Applications folder using the Finder.
Locate the Firefox application.
Drag the Firefox program to the Trash Can

Re-installation Instructions
How to Install Firefox 30 for PC

Download Firefox […]

We are looking for guest bloggers!

By |July 25th, 2014

Guest Blogger Search
We are looking to widen our circle nationwide and over-the-pond for guest bloggers who want to help spread the word about Internet privacy, security, travel, corporate and government surveillance, and miscellaneous topics (such as how to’s and personal web surfing stories) . If you have interesting and out-of-the-box ideas, awesome grammar, and know how to spell — please join the Cocoon blog to help spread the word. We can’t promise a contributor spot to everyone, but we will carefully review and respond to every submission that we receive. Unfortunately. at this time we cannot pay for content but we will […]

IceBrowser opens beta launch today

By |July 9th, 2014

Ice Browser ehf,  is on a privacy mission with the introduction of their new product: IceBrowser beta (that goes live today). By routing all user browsing data through Icelandic servers, their goal is to make the Internet safer by keeping user information private. In Iceland access to information and online communication is free from government interference, and has been rated as one of the top five countries for data privacy.

Sensing increasing public wariness about government snooping on the Internet, a California company is offering to route its encrypted browsing service through Iceland, promising a new layer of security starting in beta this […]

Surveillance, Loopholes, & XKeyscore

By |July 3rd, 2014

Surveillance Loopholes
A new academic working paper released on Monday by Harvard University and Boston University outlines how the U.S. government can conduct mass surveillance on U.S. citizens by using secret loopholes to bypass the Fourth Amendment. With knowledge that DNS is vulnerable to manipulation — the U.S. government has the ability to redirect U.S. traffic to servers outside the country and vacuum it up. The researchers told ZDNet that the paper was aimed solely to broaden the understanding of the current legal framework and that current legislation enables unrestrained spying capabilities. The researchers did not  reflect on whether or not DNS redirection […]

June 2014

Today let’s ‘reset the net’ against Mass Surveillance

By |June 5th, 2014

As  post-Snowden revelations continue to shadow us  — the US government continues to remain omniscient and omnivorous in the mass collection of global communications. 

Over the decades, as technology advanced, surveillance became easier and easier. Today, we find ourselves in a world of ubiquitous surveillance, where everything is collected, saved, searched, correlated and analyzed. —Bruce Schneier, Special to CNN

May 2014

Online advertising can be very, very bad

By |May 30th, 2014

Advertising (as defined by Wikipedia), is a form of marketing communication used to encourage, persuade, or manipulate an audience to take or continue to take some action.
Online Advertising
Advertising can get dirty. A new report released earlier this month: Online Advertising and Hidden Hazards to Consumer Security and Data Privacy by Senate Homeland security committee’s permanent subcommittee on investigations, concluded that while the Internet (as a whole) contains significant vulnerabilities, malware attacks delivered through online advertising are a real and growing problem.
A visit to an online news site may trigger interactions with hundreds of other parties that may be collecting information […]

Surveillance: Omniscient and omnivorous

By |May 22nd, 2014

With the government spying on just about everything that we do online, as well as offline — it is important that we take extra precautions to make it more difficult for the government to spy on us. Though we can’t stop our private data from government interception at the upstream level; we can utilize online tools to strategically place obstacles in the path of intercepted communications on fiber cables. In order to even begin to thwart government surveillance, we will have to trade digital convenience and learn to think strategically—and that means thinking of  privacy outside the box.

NSA Surveillance
As  post-Snowden revelations continue to shadow us  […]