Skip to content

VPN connections...

Solved Privacy
37 2 6.1k 1

Did this solution help you?
Did you find the suggested solution useful? Support 💗 Sudonix with a coffee
If your organisation needs deeper expertise around infrastructure, security, or technology leadership, learn more about Phenomlab Ltd. Many of the deeper technical guides behind Sudonix are published there.

Related Topics
  • Best email provider?

    Solved Privacy email
    4
    3 Votes
    4 Posts
    553 Views
    @JAC no problems.
  • 2 Votes
    4 Posts
    824 Views
    @DownPW This won’t be the first time that Amazon and others like them are being bought to account. I recall seeing a documentary on the TV recently where they sent in a reporter with secret cameras to film the strict regimen and constant threat of being fired for not meeting targets that workers are placed under. The surveillance just takes this to a whole new level in my view and it’s like being placed under a microscope for constant scrutiny. This goes well beyond the surveillance placed on prisoners!
  • 12 Votes
    8 Posts
    2k Views
    @crazycells good question. Gmail being provided by Google is going to be one of the more secure by default out of the box, although you have to bear in mind that you can have the best security in the world, but that is easily diluted by user decision. Obviously, it makes sense to secure all cloud based services with at least 2fa protection, or better still, biometric if available, but email still remains vastly unprotected (unless enforced in the sense of 2fa, which I know Sendgrid do) because of user choice (in the sense that users will always go for the path of least resistance when it comes to security to make their lives easier). The ultimate side effect of taking this route is being vulnerable to credentials theft via phishing attacks and social engineering. The same principle would easily apply to Proton Mail, who also (from memory) do not enforce 2fa. Based on this fact, neither product is more secure than the other without one form of additional authentication at least being imposed. In terms of direct attack on the servers holding mail accounts themselves, this is a far less common type of attack these days as tricking the user is so much simpler than brute forcing a server where you are very likely to be detected by perimeter security (IDS / IPS etc).
  • 19 Votes
    30 Posts
    4k Views
    @phenomlab 100%.
  • iPhone Data and privacy

    Privacy apple privacy
    2
    4 Votes
    2 Posts
    915 Views
    Here’s a very useful video that will walk you through the privacy features of Android - mostly around the ones you should disable to get the most out of the experience
  • Google sued for unauthorised use of NHS data

    Privacy google data
    1
    1 Votes
    1 Posts
    488 Views
    No one has replied
  • KeepSolid VPN Unlimited DEAL

    Configure keepsolid vpn
    53
    18 Votes
    53 Posts
    11k Views
    @JAC said in KeepSolid VPN Unlimited DEAL: although all are going to have their own flaws one way or another, Exactly that - none of them are going to suit every individual purpose. You have to read the reviews, decide what functionality you need, and then make a judgement call for yourself (and your own unique needs). There is no “wrong or right”, although I would steer clear of those that do not have a no-logs policy for privacy reasons alone.
  • VPNs & Netflix

    Solved General
    6
    1 Votes
    6 Posts
    1k Views
    I believe I’ve connected to a different VPN since and it’s worked even with the app.