Tag Archives: Tor

Tor, VPN or Proxy – Which is Right for You?

Records of an average person’s browsing history may not be worth much, but when you add every citizen of the U.S. to the equation, the value becomes millions of dollars.

ISPs want your personal data so they can sell it to the highest bidder or find ways to upsell you. Advertisers and titans of Web search want to track your online activity so they can display products you’re most likely to be interested in. Finally, governments want access to your online activities, in case they find a reason to monitor them.

These players are becoming a bigger threat to your online privacy by the day, and it’s about time you stood up to this menace. It starts by protecting yourself, namely with Tor, a VPN, or a proxy.

There’s no perfect solution, however, it should be said they’re not all in the same league either. So, let’s look at the pros and cons of each of these technologies.

Tor

What is it?

Known as “the onion router,” Tor is free software that allows you to join their anonymity service. Tor directs traffic through a network of thousands of relays run by volunteers around the world. It makes it very difficult if not impossible for someone to monitor your online activity, and also prevents site owners from seeing your true location.

Over the years, Tor Browser has become the main focus of the Tor Project. It integrates Tor’s technology with a Web browser, making it straightforward to use. Tor Browser requires no setup. However, it won’t hide your activities in other apps such as email, FTP, torrent client, etc.

Only accomplished tech aficionados should tackle their Expert Bundle which is the standalone flavor of Tor. It allows you to manually configure programs to work with it.

Pros

  • Not only is Tor free software, but it’s also a free service which is amazing.
  • Tor Browser is easy to use.
  • Tor Expert bundle allows you to hide your IP address on apps beyond your web browser.

Cons

  • In terms of speed, expect varying degrees of slow. Considering all your browsing data is bouncing around various relays worldwide, it’s understandable why. The other reason is advancements in the network and software are dependent on altruistic contributions, which are short in supply.
  • Since launching in 2002 it has created a reputation for being a favored tool of cyber criminals, spammers, and dissidents. Attempts to hide yourself with it can backfire as Tor users are viewed with suspicion. It can be a red flag for services, businesses, or organizations that can detect its use.

Visit the Tor Project site.

VPN

What is it?

A VPN extends a private network across a public network. It acts as a fast, secure bridge between your computer and the internet, encrypting your data as you browse the web.

With a VPN enabled, websites you visit and prying eyes online can’t see your real IP address. Instead, they’ll see the IP associated with the VPN service. VPNs also allow you to bypass geographic restrictions by allowing you to assume an IP associated with a different country.

VPN access is a service, and just like internet access, you’ll be billed monthly to use it.

Pros

  • Paid service so servers are robust, reliable, and fast.
  • Quality VPN services have huge networks of servers located around the world.
  • Used for professional applications by IT professionals. VPN users are generally granted more trust than Tor or proxy users.
  • Services offer extensive software for use with any OS (desktop or mobile) and with any application.

Cons

  • You need to subscribe to a service with an associated monthly fee.
  • Some companies block their users from accessing services with a VPN.
  • Premium VPNs are generally fast, but using a VPN might cause weaker performance in highly demanding applications such as online gaming.

View a comparison of top VPNs.

Proxy

What is it?

Before VPNs exploded in popularity, proxy servers, and web proxies were the go-to method for hiding your identity. Similar to a VPN a proxy is a gateway between your home network and a public network such as the Internet.

When viewing lists of proxy servers published online, you’ll come across three types: anonymous, elite, and transparent. Basically, the slower the proxy type, the more secure the connection. So transparent is the fastest, and the least secure. Anonymous is in the middle, and elite is the most secure. An elite proxy even tries to hide the fact you’re using a proxy, but it’s the slowest type.

Unlike VPNs which allow you to set up one centralized app that will anonymize all your activity no matter which application you’re using; proxies require extensive configuration. You’ll need to learn the the proxy options well in each app as you’ll likely need to change servers often in search of a solution with decent speeds.

Many companies see proxies as legacy technology and have removed its support from their software to focus on VPN features.

Pros

  • Both free and paid proxies are available although most will want a VPN if they choose to pay.
  • Free proxy lists are plentiful, many of which are checked continuously to ensure the list is fresh and that the proxies are indeed online.

Cons

  • Free proxy servers are run by individuals, not companies that operate with at least some ethical standards.
  • Free proxies are used and abused by spammers and malicious users so you may find the proxy server IP is banned by the site you wish to use.
  • Each app is configured separately with proxies. This can be time-consuming and frustrating due to the likely need to change your proxy server often.

View a free proxy list.

The Final Verdict

Free proxies and Tor are fine for dabblers. However, if you wish to hide your identity on an ongoing basis, you’ll probably lose patience with the unreliability, slow speeds, or hoop-jumping (in the case of proxies) associated with these methods.

The top VPN services recommended here on LetMeBy are fast, trustworthy, and generally the best option for nearly everyone. The only downside is you’ll need to pay for it, but since most VPNs are so fairly priced, this isn’t much of a drawback.

Photo: Ed Ivanushkin

The Best Web Browsers for Privacy

Ever noticed an ad for a product you just talked about appear while you were browsing the internet?

Once ads for the same thing follow you around the web, you start to wonder what caused it. And you wonder if tech companies know more about you than you’re comfortable with.

Often the easiest way to boost your online privacy is simply to switch your browser. Today there are privacy-focused browsers that don’t require tweaks or extensions to block trackers.

Mainstream browsers are a mixed bag. Some have adapted well to people’s growing concerns about being tracked online. Understandably it’s challenging for big companies to make changes that might hurt their bottom line, even if it’s in the short term. Apple’s Safari and Mozilla Firefox are two examples of well-known browsers that have managed to put the privacy needs of their users first.

Now that we’ve covered the primer, let’s dive in! Here are the best browsers available today for people that value online privacy.

Brave

If Brave isn’t one of the first browsers that come to mind for the best online privacy features it should be.

Mozilla Firefox has been around for quite a while and most have heard of it or used it. Well, guess what? There’s a connection here. Brendan Eich is the CEO of Brave, and he was also one of the co-founders of Mozilla.

By default, Brave blocks display ads and trackers. The concept behind it is unique as its purpose isn’t to eliminate all ads. Rather, it displays its own native ads that look like browser notifications and it rewards its users with Basic Attention Token. And yes, BAT is a token built on Ethereum with real value. Suddenly, ads aren’t a nuisance because internet users are compensated for their attention.

If you rarely want to see ads or don’t want to see ads at all regardless of the rewards, there are settings for all of that.

Brave is a great everyday browser for people that value privacy, but you can’t use it for everything. Some websites are set up to require certain data and important functions might refuse to work with Brave. In this situation, it’s best to launch a mainstream browser like Chrome or Safari for the sake of convenience.

Tor Browser

Many online privacy aficionados haven’t tried Tor Browser yet, but they’re probably used Tor at some point in their journey. Tor, which is short for “The Onion Router,” is free software that enhances privacy and hides your online activity from prying eyes.

Tor Browser takes the unique privacy technology established in Tor and builds it into a web browser. It sends web data through a multistep encrypted route that includes at least three nodes.

The downside of Tor has always been speed. It’s the price you pay for its thorough approach to anonymous browsing. Thus, Tor Browser is a good choice for tasks with privacy of utmost concern, but it’s not going to replace your go-to browser.

VPNs also encrypt your data like Tor. So, if you’re looking for a good balance between anonymity and browsing speed a VPN is the best option. Check out LetMeBy’s reviews of the top 3 VPNs.

DuckDuckGo Browser

DuckDuckGo is a privacy-focused search engine that doesn’t collect or share private information about its users. Other search engines have tried to find their niche and have faded over the years, but DuckDuckGo is stronger than ever because it promises a benefit people actually care about.

Its latest offering is its web browser. Its looks and most of its basic functions will look familiar to users of Chrome and Edge. And it’s based on the same idea as the DuckDuckGo search engine. The browser blocks trackers and ads that follow you around the web.

People that visit YouTube frequently will appreciate its unique video feature called Duck Player. It opens YouTube videos in a view free from distractions such as recommendations.

It removes ad targeting and tracking, but it doesn’t remove YouTube ads altogether. Rather, the ads won’t be based on your activity and browsing history.

Firefox

Mozilla is a not-for-profit Foundation that aims to put people before profit and fight for an internet that’s accessible and open to everyone. Although that may sound idealistic Mozilla has proven over the years that it can make software just as good as big corporations.

These days nearly everyone uses Chrome or Safari. Back in 2009, Firefox was at its peak with over 32% browser market share. Many stuck with Firefox for years but once they switched to Chrome, they never looked back.

We can speculate about all the reasons Firefox lost popularity over the years. One thing is certain. Google preinstalls Chrome on its Chromebooks. Apple preinstalls Safari on its devices. And Microsoft preinstalls Edge in its operating system. People always needed to make the conscious decision to download Firefox, and with so many good options most stopped bothering.

It’s time to give Firefox another look.

Firefox has privacy features mainstream browsers don’t have such as automatic DNS over HTTPS and cookie blocking.

Blocking everything that tracks you doesn’t always lead to a good user experience. Firefox’s Enhanced Tracking Protection allows you to block or allow certain types of cookies and content.

Network settings are integrated right into Firefox, which allows you to use a proxy with it without affecting other apps. Other browsers such as Chrome and Safari approach this differently. To use a proxy or VPN you have to apply it system-wide.

Safari

Apple disrupted the tech world when it first released App Tracking Transparency in iOS. For the first time ever, Apple users could easily opt out of being tracked. And given the choice, most people did.

Although it’s less talked about, you can also prevent cross-site tracking in Safari on Mac OS. You merely go to Safari’s privacy settings, select “Prevent cross-site tracking” and you’re done.

Most popular browsers have a private browsing mode. Safari has an edge over many because it uses DuckDuckGo by default. With it enabled, beyond your browser not remembering the sites you visited, the search engine itself won’t collect data based on your searches.

Another handy feature in Safari that encourages good habits is its password generator. It suggests strong passwords, saving you time and confirming that your passwords are keeping up with current standards.

Safari’s Intelligent Tracking Prevention limits the amount of your data that’s sent to Apple and third parties. This means that long-term cookies are only stored on your device for sites you use regularly.

Chrome with Privacy Extensions

If you prefer to deploy online privacy features a la carte, don’t mind tweaking settings, and enjoy Google’s ecosystem, this could be the right option for you.

Google Chrome is by far the most widely used browser and that means it’s one of the best when it comes to customizing its features with extensions. Simply put, Chrome isn’t a privacy-first browser out of the box, but you can make it into one.

Want to block trackers? Add an extension such as Privacy Badger or Ghostery. Don’t want to see ads? Install Adblock Plus or uBlock Origin.

There’s a slight catch. Extensions can break, lose their support, or lose their effectiveness as technology progresses.

One of the biggest pluses is that you can experiment and find the extensions you like the most. You’re not married to built-in features that may not offer the approach to privacy you want.

Why Companies Want Your Data

Data is a huge industry, and it’s a growing one. The global big data market was estimated to be worth $162.6 billion in 2021. It’s forecasted to reach $273.4 billion by 2026.

The concept is simple. You more businesses know about consumers’ likes, dislikes, interests, careers, hobbies, and a multitude of other things, the more they can sell.

Many people don’t think marketing works on them. But the evidence says otherwise. Clicks on targeted ads can be as much as 670% higher. Additionally, 80% of users actually reported to prefer tailored ads. People notice what interests them, and data makes it possible to serve people both the content and ads most likely to be relevant to their interests.

The Tug of War Between the Wants of Advertisers and of Users

Some of the biggest tech companies are in a challenging spot. If users aren’t happy their business is in jeopardy. And if advertisers aren’t happy it’s in trouble too.

Apple’s move to allow users to easily control if they wanted to see targeted ads or not was part of a big shift in the industry.

It’s become standard practice to collect data about users and also to give them tools to manage their data on different platforms. In other words, if you want better privacy you typically have to drill down into the settings to make it happen.

Conclusion

As more become aware of the importance of online privacy, more are taking another look at the web browser they use every day.

For too long popular browsers have been synonymous with good. And while the most used browsers are excellent, they’re usually not the top choices in terms of privacy.

Any browser’s privacy can be leveled up significantly by enabling a VPN. If you take the time to choose a browser with robust privacy features as well those ads that follow people around will be far behind you.

How to Unblock Instagram at School or Work

Social media allows us to accomplish diverse tasks: from video chats with friends to spreading the word about your company’s services.

Use of apps like Instagram may be productive and relevant to what you’re doing at school or work, however many people scroll through content to slack off.

So, many institutions have opted to ban social media apps entirely, and network administrators are able to follow through on this by blocking access to URLs like https://www.instagram.com/.

Situations can arise where you need to check Instagram to do your work, but the network won’t allow it. And this is when bending the rules on occasion may be reasonable.

Can Insta be Productive?

Content on Instagram varies a lot and it has evolved considerably from a place to take in beautiful photos or post photos of your road trip. In fact, education, business and self-improvement are very popular topics on the platform.

Instagram can be enriching or a waste of time depending on your habits. It’s important to be mindful of the accounts you follow. While a lot of the photos on Instagram will merely be a distraction at school or work, some of it provides succinct knowledge that could actually save you time.

If used correctly, it can increase your productivity. However, few people have the discipline to pull this off.

The app has a great feature that allows you to limit the time on spend on it daily. To use it, go to “Settings”, then tap on “Account.” Next, tap “Your Activity” and you’ll see reminder and notification settings.

Unblock Instagram

Use Phone Data

If you launch Instagram and can’t view your feed, try turning off Wi-Fi and enabling wireless data.

There’s a good chance this will work because Wi-Fi uses the network which has internet access rules applied by the admin, while mobile data works independently of the local network.

Get a VPN

If you don’t have mobile data or don’t want to use up your monthly bandwidth, you can also use a Virtual Private Network (VPN) to access Instagram.

A VPN service allows you to choose a new IP that is associated with the location of your choice. This provided IP allows you to bypass restrictions set by the network admin while still connecting to the network via Wi-Fi.

It’s the best solution for people that want to hide their identity, location, or unblock apps and websites. You need to be subscribed to VPN service, many of which are fast and affordable.

To get started, learn more about the best VPNs that are recommended here most.

Use Your PC with Tor

If you simply want to browse Instagram and don’t need to post, using your PC is an alternative that is often overlooked.

If the URL https://www.instagram.com/ is blocked on all devices, you may be able to download and install Tor. This is proxy software that allows you to use the IP of another user connected to the Tor network.

Once the software changes your IP, Instagram will be unblocked. It’s free but be warned that it’s not as safe or nearly as fast as a VPN.

Typically, Tor should be a last resort, only to be used temporarily then uninstalled. This approach will only work at small businesses that don’t restrict which software can be installed.

Wrapping It Up

Use these tips responsibly and enjoy your new-found access to Instagram!

As the app can be useful at both school and work, blocking access might not be the best policy. However, it’s best to be as respectful of the restrictions even if you’re forced to bypass them at times.

Best Chrome Extensions that Protect Your Privacy

From ad and tracker blocking, HTTPS, advanced proxy to interfacing with the Tor network, the right extensions can turn Chrome into a dream machine.

It’s time to stop passively allowing corporations, shifty sites and shady third parties to feast on any private data they can manage to grab. Now that you’re on to them, arm yourself with some of the following top privacy-enhancing extensions for your browser.

AdBlock

Browsing history, cookies and other various data is exploited aggressively by Advertisers. So that gas barbeque you showed a fleeting interest in will definitely be showing up again in cube ads – haunting you for days. Changing your privacy settings on the most common offender’s sites makes a difference, but who has the time?

Adblockers are the most popular extensions out there and AdBlock continues to be the dominant force in this arena. Big boys in tech have devised methods to force their ads to display even when AdBlock is enabled. However, it’s still a great way to generally declutter your Web experience.

Ghostery

Almost every major site out there uses cookies and tracking technology, and it builds a profile of you based on your activity. Worse, there are suspicious third parties with malicious agendas far worse then just attempting to sell you the latest widget.

Ghostery finds every instance of trackers embedded on the sites you visit. It then gives you the ability to tailor how you handle these trackers depending on the level of trust you have for the site in question.

HTTPS Everywhere

Major sites have made the switch to beefed-up HTTPS security but many smaller operations haven’t caught up. This means ISPs can easily access your browsing on these sites if laws allow in your country.

Big names in anonymity software EFF and the Tor Project have joined forces to give web users a secure experience on every site. Insecure HTTP sites are automatically converted to secure HTTPS thus preventing surveillance, account hijacking, as well as some varieties of censorship.

Proxy SwitchyOmega

SwitchyOmega provides an alternative to digging though the advanced setting section in Chrome, and the chore of filling and clearing proxies in the config dialog of your OS. This is a powerful, timesaving idea for power users, because just one proxy server will often not get you very far, especially the free variety. Enter all your proxy servers IPs, plus port, protocol, then switch between them quickly with a mere click.

Kronymous

Formerly called KroTor, this extension allows you to access the Tor network. It’s a more advanced alternative to the easy-to-use Tor Browser that requires no configuration and works out of the box. Tinkerers will love the extensive options Kronymous provides, plus the ability to continue using your preferred browser, Chrome.

Cupcake

Cupcake aims to make Tor “the onion router” tastier by giving it a pathway into your web browser. A plain, happy or sad cupcake is displayed depending on the status of the proxy, signifying not in use, in use, or disabled respectively. Chrome users that don’t need the extensive options found in Kronymous may prefer this.

Open in Tor Browser

Sometimes the simplest solutions are the best, not to mention the least likely to break. Open in Tor Browser is perfect for Chrome users that occasionally want to switch to true incognito mode with Tor Browser when viewing sensitive content. The only catch is you’ll need to install a minimal native client for it to open links correctly in Tor Browser.

Graphic: Sean MacEntee