Category Archives: Software

VPNs Protect You but Aren’t a Substitute for Antivirus

VPNs get a lot of praise for their ability to boost one’s privacy online. Many wrongfully assume that because VPNs hide their IP address and offer a high level of encryption, they’re protected without antivirus software.

In actuality, VPNs and antivirus software serve completely different purposes.

Although using a VPN makes it nearly impossible to determine your identity through certain means, it won’t stop other methods to get hold of your private data such as phishing.

It’s estimated that one-fourth of PCs have no virus protection. That’s a camp you don’t want to be in. Unprotected machines are 5.5 times as likely to get infected.

Cybercriminals have gotten craftier and bolder than ever. On top of that, bad actors are taking more action than ever. Cyberattacks increased 125% in 2021 compared to the previous year. And there are no signs of it slowing down.

The bad guys have adapted and so will internet users. Those who use both antivirus and VPN are being proactive and are best prepared for threats now and in the future.

How Antivirus Software Protects You Online

One of the key components of antivirus software is its database. Online threats are always evolving so antivirus software downloads the latest threat database automatically before scanning your computer.

Security software either detects threats in real-time as soon as they appear or during a scheduled or manual scan of your hard drive. If malicious code is detected it’s either quarantined or deleted.

Malware is a generic term that includes many types of harmful software such as viruses, trojans, worms, and spyware. The next category everyone needs to be aware of is phishing. This is when bad actors pretend to be legitimate companies and services to extract personal data such as login details and credit card numbers.

Security software such as Norton 360 and Kaspersky Internet Security have a comprehensive approach so you’re defended from information security threats, network attacks, phishing attacks, and spam.

How VPNs Protect You Online

Data is incredibly valuable to businesses and institutions. There’s a whole industry dedicated to it, often referred to as big data. In 2022, the big data analytics market size was estimated to be worth USD 272 billion.

Private data is also valuable to shady third parties and cybercriminals which is the most immediate threat to the average internet user.

Thus, with each passing year, it’s more and more important to be mindful of how you protect your privacy online. There are plenty of improvements you can make by drilling down into the privacy settings of the online services you use. However, companies will never give you full control of your privacy. By using a VPN, you easily and effectively level up your privacy across all the apps and platforms of your choice.

VPN is short for Virtual Private Network. Essentially, you can think of a VPN as a tunnel that encrypts all data that moves between your internet connection and your device.

It replaces your true IP address with an IP associated with the location you select. This makes it nearly impossible for people and organizations to determine who you are and where you’re located by viewing your IP address.

To learn about the top 3 VPN services recommended on LetMeBy, visit this page.

Using Both Antivirus Software and a VPN is the Best Defence

Antivirus software and VPN apps complement each other perfectly. One if your best defense against malware and the other is your best defense against companies, third parties, and organizations compiling data about you based on your actions online.

VPNs have security benefits as well as it encrypts data during transit. This protects you from attackers that aim to intercept data going to your device or network. Once the data has reached your device, it’s up to antivirus software to deal with threats.

Antivirus software is essential. This is why Windows Defender is pre-installed on any current Windows machine. VPNs have seen an incredible boost in adoption in the past several years, but not every internet user needs a VPN. Everyone can benefit from using a VPN, but you need to value your online privacy to want it.

Wide-ranging security software is becoming more common. These solutions include both antivirus and VPN software.

Is Windows Defender Enough?

You might be old, but are you old enough to remember downloading McAfee on your new PC after installing Windows XP?

Windows has come a long way since then in terms of security features. Before the release of Vista, Windows users had to get third-party antivirus to protect their computers. Today, Windows Defender is preinstalled and Windows automatically downloads and applies the latest security updates.

Windows machines don’t really need third-party antivirus software since Windows Defender is perfectly capable.

The main reason to get third-party antivirus software is you find its features compelling. For example, gamers appreciate “gaming mode” which is found in software such as Kaspersky Internet Security. By enabling it, functions such as system scans and notifications won’t interrupt your gaming experience while the antivirus works in the background.

Full security suites provide the most added value. These software packages protect you from spam, unsafe websites, shady applications, webcam breaches, and more.

Conclusion

It’s easy for Windows users. Simply add a VPN to complement the antivirus software already preinstalled: Windows Defender. This gives you protection where it matters most. Still, when something is easy, we sometimes lose sight of what’s working for us in the background. Antivirus software is essential and VPNs are in no way a replacement for it.

Online privacy and protecting yourself from malware are related and more than ever there’s overlap between the two. However, for the best solution is to use both a VPN and antivirus.

Brave Browser vs. Firefox: Which Is Best for Privacy?

First released in 2004, Firefox has long been an alternative for people who want to venture beyond the obvious web browser choices.

Firefox was once a popular browser, but its user base has largely moved on. In 2010, roughly 30% of internet users browsed with Firefox. Today, it’s dropped dramatically to under 3%.

Brave’s market share is much smaller than that with a mere 0.05% using it on desktop.

Right now, the vast majority are satisfied with what Apple, Google, and Microsoft have to offer.

There’s no doubt that Safari, Chrome, and Edge are capable. However, if you’re looking to level up your online privacy one of the first things to consider changing is your web browser. Mainstream browsers have many strengths and advantages, but top-tier privacy generally isn’t one of them.

Both Firefox and Brave put privacy front and center and use it to differentiate themselves from their much larger competitors.

Under the Hood

Before getting into the nitty gritty it’s helpful to know about the foundation these browsers are built on.

Brave is built on Chromium which is Google’s open-source browser. Thus, in terms of the technology that powers it, it has a lot more in common with Chrome than Firefox. Think of it like Chromium is the engine but its feature set is based on a philosophy that puts emphasis on user privacy.

Firefox is a unique platform and ecosystem developed by Mozilla. Web browsers that are developed from the ground up are a rarity. Many alternative browsers such as Opera are powered by Chromium. Also, typically browsers are built by corporations, but Firefox is made by a foundation. Mozilla is focused on principals such as keeping the internet open and accessible to all. Firefox is part of its family of products it calls “privacy-first.”

Now, let’s dig deeper into each browser’s privacy features and how they perform in the real world to determine which one is right for you.

Tracker Blocking

Brave features tracker blocking out of the box with ‘Brave Shields.’

In the browser, you can click the Brave logo to the right of the address bar to quickly view stats about blocked trackers and ads. This is a handy way to see how many trackers are on websites you frequently visit. A small number that specifies the number of trackers blocked also appears on top of the logo which is nice since it saves you a second or two.

Firefox for desktop has what it calls ‘Enhanced Tracking Protection.’

By clicking on the shield icon to the left of the address bar in Firefox you get a little report about known trackers on the websites you visit. At first glance, the presentation isn’t as slick as Brave’s. However, by clicking through to its ‘Protections Dashboard’ you’re greeted with a breakdown of all the types of trackers it blocked throughout the week.

Verdict: Tie

Brave and Firefox block trackers and cookies comprehensively. In fact, one Redditor tested them with d3ward’s website and Adblock Tester and both were given a score of 100%.

When Brave and Firefox’s websites get into the specifics of what’s blocked, they emphasize different things. For example, Brave optimizes scripts that can affect performance, and it catches third parties that use cloaking to try to bypass ad blockers.

Firefox pays special attention to social media trackers in its reports. It also blocks cryptomining which is malware nefarious websites use to employ their visitors’ computers to mine crypto for them.

Private Window

Often private window features are only for local privacy. In other words, they exclude websites you visited from your history when it’s enabled. Additionally, there aren’t other traces left over from browsing such as search bar entries, cookies, and cached files.

Brave goes a step beyond with its Private Window. Uniquely, it comes with two different variations. First, is its normal Private Window that stops sites from being added to the list in the History menu. Second, is its Private Window which uses Tor to hide your identity with incredible thoroughness. It does come at the cost of loading speed. So, it’s a tool you’ll only want to use when online anonymity is a critical factor.

Firefox has a Private Window feature that’s pretty much identical to the one found in mainstream browsers such as Chrome’s incognito mode. It performs its function of enhancing local privacy admirably. But it does nothing to boost your anonymity online versus regular browsing.

Verdict: Brave Wins

Brave’s ability to browse with Tor might go unnoticed by many, but it actually makes private browsing truly anonymous as the name implies. Tor offers its own browser as well but this is the perfect way for people to get their feet wet.

Fingerprinting

Many websites and online services use digital fingerprinting to identity devices. It gathers data about your operating system, browser, your hardware setup, screen resolution, etc. Some of these items may seem insignificant but when they’re all added together it’s a reliable way to pinpoint you.

Sites such as Cover Your Tracks and Browser Leaks will test your browser to see how big your digital footprint really is.

Brave did the best in tests since it dynamically changes fingerprint data to make it difficult or impossible to track its users. Essentially, the fingerprint data is there, but it’s useless to its recipients.

Firefox has a persistent fingerprint. Rebooting your system or relaunching your browser won’t improve matters.

Verdict: Brave Wins

VPN Features

Changing your browser is often the first step on the road towards better online privacy. Getting a VPN is the second.

VPNs sit between the internet and your device so true anonymity can be achieved. They offer the highest level of encryption so your location and actions can’t be tracked by companies and third parties.

Brave offers a paid VPN service called Brave VPN. It’s powered by Guardian and it protects five devices.

Firefox also has a VPN product called Mozilla VPN. It’s developed directly by Mozilla and like Brave’s offering, it can be installed on five devices.

Verdict: Tie

You can use any VPN service with Brave or Firefox. You merely have to install the associated VPN app to create a protected connection in any applications you use. If you’re interested in taking advantage of this feature, be sure to view the top 3 VPNs recommended by LetMeBy here.

Conclusion

Firefox and Brave are both excellent browsers that live up to their claims of putting privacy first. They are nearly neck and neck when it comes to their implementation of most privacy features. However, Brave has an edge due to its fingerprinting capabilities and integration of Tor in its Private Window.

Overall, Brave’s user experience feels a bit more modern. Firefox has kept up but its roots as a browser that’s been around since the mid-2000s are apparent in its user interface at times. Some may notice that Brave’s performance is snappy as it utilizes RAM very efficiently.

On the other side of the coin, Firefox is well-established and widely supported. It plays nice with pretty much any website.

Crypto Isn’t Anonymous and Exchanges Are a Big Part of It

If you asked a person on the street if cryptocurrency is anonymous many would say yes.

It certainly looks anonymous. A Bitcoin address is a long string of randomly generated letters and numbers. If you were to send a friend Bitcoin you wouldn’t see their name anywhere during the process. And your friend who received it wouldn’t see who it came from.

In actuality, crypto is pseudo-anonymous. Anybody can look up an address on the public blockchain and see a full history of the transactions that have been made. They just don’t know who the people are behind those transactions.

Cybercriminals have been tracked down through their crypto addresses time and time again by blockchain forensics firms that have aided authorities. Thus, while it isn’t straightforward to associate a crypto address with a real person it can be done reliably by specialists.

The first thing you need when you get into crypto is an account at an exchange like Coinbase or Kraken. Since they’re the entry point, they’ve been given the role of making sure their customers are real people. Unfortunately, that means online privacy has become a pipedream for crypto investors.

So, Why Do Exchanges Need to Confirm Your Identity Exactly?

Crypto exchanges have been scrambling in recent years to stay compliant with government regulations. Since then, they have become more vigilant about confirming that customers are who they claim to be.

Crypto exchanges routinely ask users to provide ID and take a selfie to verify their identity. Verification could be necessary to complete any meaningful action, such as creating an account, transferring crypto to a wallet on the exchange, or withdrawing crypto.

The reasons for identity verification can be vague or even misleading on their websites.

When faced with the question of why it’s necessary, Binance puts it back on the customer. In their support center, users are met with a list of justifications. They could have accessed their account with multiple IP addresses, not completed face verification, or not enabled two-factor authentication.

Uphold simply tells customers that providing ID and a selfie helps them verify your identity, and keep their platform secure.

To give credit where it’s due, Coinbase wins for transparency on this. They confirm that the primary reason it’s done is for compliance:

“Coinbase uses identity verification in order to comply with Know Your Customer (KYC) laws. KYC is a way to identify and confirm that a customer is who they say they are. It’s a multi-step process that helps prevent the creation and use of fraudulent accounts.”

Have Regulators Taken Away Crypto’s Superpower of Pseudo Anonymity?

We’ve covered that crypto isn’t truly anonymous, but that doesn’t mean its pseudo-anonymity isn’t useful or desirable.

Cryptocurrency provides the ability to make peer-to-peer transactions that are the closest thing we have to digital cash.

Once you put an institution between you and the recipient, it takes away what’s great about crypto. One could argue that it’s even less anonymous than traditional finance when it’s used like that.

The technology itself cannot be regulated. So, exchanges and crypto on-ramps have been given the task of keeping tabs on their customers. If people keep using these services like banks to store their coins, they’ll act more and more like banks.

When Sharing Your Personal Data Isn’t Worth the Risk

The fewer exchanges that have your photo ID, the better. You may trust the company, but people need to consider the possibility of your personal data being intercepted by a nefarious third party.

Crypto exchanges are common targets for cybercriminals. And these days, the personal data of crypto investors is a valuable asset.

Be strategic about which exchanges you choose to use. Many have opened accounts to get access to hot new coins and then rarely or never accessed these platforms after the hype settled down. Determine what you need going forward and close the accounts that aren’t necessary.

Get Your Coins Off of Exchanges!

“Not your keys, not your coins” is a popular phrase used by crypto enthusiasts. When you have your crypto on an exchange, guess who controls the keys? Hint: it isn’t you.

Exchanges are not banks. They’re best used as an on-ramp and for trading and that’s it. If there’s a security event, some exchanges attempt to reimburse their customers’ losses, but it’s certainly not guaranteed nor insured by FDIC.

Finding a way to secure your coins and put them into cold storage requires technical chops, knowledge, and in some cases, the right gadgets. Additionally, crypto exchanges typically charge withdrawal fees on top of the network fees associated with the coin. Thus, there are barriers in place that make people put off securing their coins.

Whatever you have to do, it’s almost always worth it. Get your coins off of exchanges. Consider picking up a Trezor One [Amazon] or Ledger Nano S [Amazon] for long-term storage.

Conclusion

Bitcoin was created so people could be their own bank. Instead, exchanges have become the banks for crypto assets at the cost of the privacy of its holders.

It’s time to reconsider how we use crypto exchanges. Customers have to share their ID and take a selfie to confirm their identity. The question is: how safe is our personal data in their hands?

Online Privacy Has Become “Very Creepy” Says Mozilla

If you ever felt we’ve come dangerously close to George Orwell’s dystopian vision in 1984, you’re on to something. Big Brother isn’t watching but the products we use every day and the companies behind them certainly are.

They’re best known for their web browser, Firefox, but Mozilla is also an online privacy watchdog. Since 2017 they’ve been reviewing products and assessing what data is collected and who it’s being shared with.

Their annual consumer Creep-O-Meter takes all those findings, distills them, and gives you a big-picture view of the current state of digital privacy and where we’re headed.

According to the oversized, shocked emoji on their site, things aren’t looking good. The state of digital privacy is “very creepy.”

The Good News: Online Security Has Improved

The report isn’t all doom and gloom.

More companies are using encryption and giving their customers automatic updates. So, while companies are hungry for personal data, and they’re typically sharing it to make additional revenue, the data is generally sent securely. That means it’s much harder for third parties to intercept personal data illegitimately.

It’s important to remember that companies might not always make decisions that put their customers first but they’re not the threat. Rather, consumers should be most concerned about nefarious third parties that steal private data.

The Bad: Long Privacy Policies and Products that Don’t Work Offline

If you’ve skipped privacy policies, skimmed others, and occasionally read sections of them, you’re in the majority.

Insanely long privacy policies that no human possibly has time to read are the norm. If you’re ambitious enough to go through one, the legal jargon and lack of clarity may give you just as many questions as answers.

A machine learning analysis found that since 1996 the typical privacy policy has grown to over 4,000 words.

Another growing trend is products that need an internet connection to operate, with no “offline mode.”

Devices use so many online services today that it’s tricky to give people a decent user experience without the internet. And since there isn’t much incentive for companies to offer the ability to go offline, many companies have given up on the idea.

Going offline is the simplest, most effective way to protect your private data. When apps and gadgets neither offer a way to use them offline nor manage privacy settings, customers are left with a choice: accept data practices they might not be comfortable with or stop using them entirely.

New Cars Are the Creepiest Products

Perhaps the biggest shocker of all is that 100% of car makers failed to pass Mozilla’s privacy test.

If you’re looking for car brands that are slightly less aggressive about collecting and using your personal data, you won’t find much. All the big auto manufacturers are practically moving in lockstep.

Nissan won for the highest creep factor. The Japan-based company collects data about “sexual activity, health diagnosis data, and genetic information” according to Mozilla.

And when it comes to overall privacy with the most room for improvement, Tesla took the cake. Tesla was given an “X” in every category in their report about the state of privacy in car brands.

Most Gadgets Have Mics and Cameras

Perhaps it’s just too tempting to harvest data about customers when all the tools are built right into the products. Over 90% of gadgets, apps, and cars have a mic, a camera, or both.

The products with the highest “creepiness” may surprise you. Gaming consoles, smart video doorbells, smart speakers, and GPS watches were common near the top of Mozilla’s “Privacy Not Included” list.

Video call apps such as Apple’s Facetime were some of the worst when it comes to data privacy policies.

Quick Tips to Take Control of Your Privacy

  • Opt-out: When you install apps, you could be given the opportunity to limit or stop data collection and sharing. If privacy settings are available, poke around and see if you can make changes that will improve your online privacy.
  • Check permissions and deny access as needed: Android and iOS allow you to manage which apps have access to your location, contacts, camera, etc. as well as in what circumstances they’re permitted to access them. It’s a good practice to review these permissions every now and again.
  • Clear private data companies have about you: Tech companies such as Google and Meta allow you to delete your personal data they store on their servers. If you continue to use their services, they’ll resume collecting data in most cases but at least you’ll start fresh.
  • Use a VPN: Add a layer of anonymity and encryption between your device and the internet with a virtual private network. It allows you to easily hide your IP address which is one of the key ways you are identified online. Learn about the top 3 VPN services here.
  • Delete apps you’re not using: It may be surprising to some, but apps you don’t even use can still collect data about you. Old apps that haven’t received security updates may contain personal information that is low-hanging fruit for data thieves.
  • Read the privacy policy: No, not the privacy policy, right? It might be duller reading material than the phonebook, but if you use an app or product every day it’s important to know how it handles your data.

Conclusion

The smart technology we have in our homes has added efficiency to our lives and connected us to the world, but it has its costs.

More than ever companies are using their products to collect and share the personal data of their customers. The big data industry provides lucrative opportunities to manufacturers. Tough economic times have corporations looking for alternative revenue sources.

Before you set up an “always on” device in your home such as a smart speaker or smart video doorbell, consider if the upside outweighs the downside. Products in certain categories have privacy drawbacks across the board.

Casual Games like Minecraft Have Tons of Cheaters

Online shooters have a long history of issues with cheaters. When gamers start their rants about cheating, they often describe getting swiftly and unfairly shot down in Call of Duty, Fortnite, or Apex Legends.

This may be a surprise to some: Casual games actually have an even bigger problem with cheaters than shooters.

According to a recent study by Surfshark, casual titles are at the top of the list of games with the most interest in cheating methods. Minecraft, Among Us, Roblox, and The Sims 4 all made their top 10.

They created the list by adding the total number of views on YouTube videos that showed people how to cheat for a given game. It’s not the most accurate method, as a game’s ranking is just as dependent on its overall popularity as people’s intention to cheat. Still, the data gives us a good indication of the total population of cheaters in each game.

Cheaters in Minecraft

Created by the Swedish game developer Mojang Studio, Minecraft [Amazon] is a gaming sensation nobody could have predicted. It’s simple in its approach while most other popular video games embrace realistic graphics and complex storylines. In Minecraft, players build their surroundings and learn to survive and possibly thrive in pre-generated worlds.

According to the metrics tracking site Activeplayer.io, Minecraft has over 168 million active players per month. Surfshark found there were 30,560,700 YouTube views associated with cheating in Minecraft. So, if cheaters watched an average of 10 videos that would mean there are roughly 3,056,070 of them.

Minecraft offers astonishing possibilities, and for players who still want more, there are over 100,000 mods available. Mods are fun and harmless in single-player mode, but when mods are used in multiplayer it becomes a source of frustration for other players.

Cheaters in Among Us

Among Us is an online multiplayer social deduction game developed by Innersloth. It’s a murder mystery game in which one to three players are randomly chosen as imposters. Players explore a spaceship named “The Skeld,” the headquarters of the company MIRA, a research base on the planet Polus, or an Airship. You work together with online players to determine who can be trusted, and who can’t.

According to the metrics tracking site Activeplayer.io, Among Us has over 49 million active players per month. Surfshark found there were 15,984,835 YouTube views associated with cheating in Among Us. So, if cheaters watched an average of 10 videos that would mean there are roughly 1,598,484 of them.

There are two main paths Among Us cheaters can take. The first is when players covertly communicate with other players who are actually their friends. Even if the cheater’s character is dead or not on the other player’s team, they share tips about who the impostor is or who it isn’t. The second path is to hack the game. Cheaters use this method to kill everyone instantly, find out who’s an impostor, or allow their character to move insanely fast.

Cheaters in Roblox

Roblox is a game within a game. Its creator system turns everyday people into game creators. Games like Work at a Pizza Place, Hide and Seek Extreme, Pet Simulator X, and Jailbreak put players in novel scenarios they don’t experience in mainstream titles. It is community-focused in terms of competing in challenges as well. In fact, Roblox games can support up to 100 players.

According to the metrics tracking site Activeplayer.io, Roblox has over 201 million active players per month. Surfshark found there were 10,835,172 YouTube views associated with cheating in Roblox. So, if cheaters watched an average of 10 videos that would mean there are roughly 1,083,517 of them.

Roblox cheaters buy or obtain scripts that let them do things in the game that are normally impossible. These exploits allow them to fly around, walk through walls, teleport, shoot through walls, and do other strange actions.

Cheaters in The Sims 4

The Sims 4 [Amazon] is a social simulation game that replicates everyday life and makes even the mundane fun. Players can build and furnish a home for their characters aka “Sims,” dress them and send them out into the world to start their career, hang out in the city, or visit a horse ranch. Completing objectives is optional, with the main focus of the game being on making choices and exploring the interactive environment.

According to its publisher EA, The Sims 4 has over 70 million active players. Surfshark found there were 10,808,200 YouTube views associated with cheating in The Sims 4. So, if cheaters watched an average of 10 videos that would mean there are roughly 1,080,820 of them.

Players can cheat on their significant others in The Sims, but this is about the other kind of cheating! The Sims 4 features built-in cheat codes that allow players to gain money, improve their skills instantly, escape death, and a lot more. As if that wasn’t enough there’s a vast number of fan-made mods available as well.

Conclusion

Shooters and RPGs are top genres when it comes to the number of people who use exploits to cheat. However, the casual genre is king.

Cheaters typically can’t do anything to harm players outside the game, but they’re still an annoying menace.

Every popular online game has cheaters so don’t let it dissuade you from enjoying your favourite games. Most game developers work hard to make sure cheaters don’t ruin the experience for everyone.