Welcome to the Private Internet Access Blog

  • Secure Public WiFi: Wireless Security Tips

    Secure Public WiFi: Wireless Security Tips

    San Jose will be launching a free WiFi service to its residents starting in the summer of 2012.  The free, unsecured municipal WiFi in San Jose will be free to the public and secured for the government.  As the public facing free WiFi service is unsecured, it is up to the user to enable wireless Read more

  • Pullin’ a Rabbit out of a Black Hat

    Pullin’ a Rabbit out of a Black Hat

    Step 1 – Hack a computer. Step 2 – ? Step 3 – Profit. In the past, step 2 generally consisted of several intricate steps that required a significant amount of effort and skill.  Even if a system was filled with valuable data, it was highly unlikely that any of said data was actually valuable Read more

  • Interview with nanotube, founder of the Bitcoin-OTC, IRC’s Marketplace on Bitcoin, Multisigs and Security

    Interview with nanotube, founder of the Bitcoin-OTC, IRC’s Marketplace on Bitcoin, Multisigs and Security

    The peer to peer (P2P), anonymous crypto currency with cash-like properties known as Bitcoin has quickly become a formidable payments medium in contemporary society. New products and services are born almost daily as these cash-like payments have created new ways to conduct business online. I had the opportunity to speak with Daniel Folkinshteyn, founder of Read more

  • Windows, Mac OS X, and Linux Applications can access your Photos, Contacts and Data too!

    Windows, Mac OS X, and Linux Applications can access your Photos, Contacts and Data too!

    The recent privacy debacle surrounding third-party iOS applications and Android applications has garnered serious attention.  Researchers have discovered that minimal to no permissions are required for applications on these devices to access one’s contacts, photos, and other considerably confidential data. However, the fact is, this lack of a permission-based implementation has existed in almost all consumer-based operating Read more

  • Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet

    Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet

    Anonymity has proven itself a vital property of society.  Dating back to the beginnings of time, anonymous writings have been found in many great literary works, including but not limited to Cave Paintings, Hieroglyphs, The Bible, Tom Sawyer, as well as the same Federalist Papers that helped in the ratification of the US Constitution. The Read more