Just Because You’re Paranoid Doesn’t Mean They’re Not Out To Get You.

Most Coveted Security Apps For ios That Actually Work

Photo Credit: Pink, illustration by Federico Piccirillo

As a rule, general and mundane, Apple devices come with built-in, default, security features, end-to-end encryption in the case of iMessage and generally have their own settings for protection purposes.

 

Nonetheless, one should remain wary about urban myths such as “Apple devices can’t get hacked”, as all devices including Apple’s are vulnerable and can be hacked particularly easier if you follow the above flawed logic.

 

 

As the online privacy issue plot thickens, it is becoming increasingly apparent that we might in fact be talking about internet privacy posthumously, as so many cybersecurity advocated are finding online privacy to be, well, dead.

 

 

Is this an exaggeration or is it the actual state of affairs of 2018’s internet, you be the judge! Looking at the major global security events of this year in retrospect might shed a light.

 

Starting with the inglorious attempt to block online privacy regulations, made by the US Senate and the House decision, in early April and then the Facebook scandal the same month, followed by the repeal of net neutrality in May- Is it far fetched to say that 2018 was ringing alarm bells in online security? Or is this just the new-normal, a dystopian flavored reality that we all live in and maybe the inherent cou

Photo Credit: Pink, illustration by Federico Piccirillo

rse of events, given the nature of the internet and what it means today to people, corporations and governments alike?

Add to the mix that much to the surprise of people supporting ideas like “let’s build a wall”, today’s threats are likely to come from the inside. Madonna was right all along, “the enemy is not out there, the enemy is within”. Take that republicans!

Not slipping into an endless rhetoric around the topic of internet security and how you can only get a migraine from pondering the new philosophical digital paradigm, is probably for the better here (especially since I don’t know any migraine remedies). Lucky enough I do have some security advice and that’s all we should be focusing on, so next time if you skip the whole intro to get to the practical point, I won’t mind.

Here are some of the most coveted security apps for your iOS devices, designed to give you an extra layer of security:

1Password

Keeps all your passwords safe, all in one place.

 

1Password is described by it creators as a tool that “remembers all your passwords for you, and keeps them safe and secure behind the one password that only you know.[..] Just add your passwords and let 1Password do the rest.” You can use the tool to periodically re-new your passwords with new strong ones that lo and behold, you don’t have to remember.

 

 

 

 

 

2. 1Blocker

a native Safari content blocker entirely supported by its users. You’ll be able to block ads, ad networks, scripts designed to track your activity and many more. Just give it a spin!

 

 

 

 

 

 

 

 

3. MyIP.io

a reliable VPN service that keeps your data extra safe, traveling through a tunnel encrypted from end to end, so nobody, not even your ISP will be able to make sense of it, since all your information will go through the VPN server and not your ISP’s. You will also be able to bypass geo-restriction.

 

 

 

 

 

 

4. Signal

encrypted messaging and voice-calling similar with Telegraph or Wire.

 

 

5. Keeply

 

will your store data creating alternate passwords for different levels of access to your device.

 

Online Security in the Post-Truth Era

Photo: Post-Truth Digital Art, Graphic Design, Illustration by Guillo H.

Humanist studies of the XXIst century postulate that beyond the objective and subjective realm of reality, therein lies a 3rd dimension: the intersubjective level.
The intersubjective realm of reality is also a recurrent theme in Yuval Noah Harari’s Homo Deus, part I, where the author carries forward the idea of meaning and how we as homo sapiens designate it.
The notion of post truth seems to be talking about similar ideas or at least to be one effect of the core intersubjective reality we all live in, since the beginning of articulated speech. Post-truth however, is a relatively new term, absorbed by the Oxford Dictionary in 2016 as the international word of the year.
Bear in mind that 2016 was also the year UK voted in favor of Brexit and Trump was elected the leader of the “free world”, so along came the word, organically, to describe the new zeitgeist.  
 

Photo: Truth and Lie Illustration by Ether Gzirishvili

“Post-truth” is used to describe a political culture “in which debate is framed largely by appeals to emotion disconnected from the details of policy, and by the repeated assertion of talking points to which factual rebuttals are ignored”. (source: Wikipedia)
 
According to a serious body of science we may all be living in a post-truth age, an age in which global warming is dicredited and denied even, and where social media is used to manipulate, polarise and divert from objective facts, while exploiting common subjective fears and opinion.
 
In the sharing, internet economy, data is the currency, an informational and economic asset capable of traveling the speed of light in a vacuum, when going through state of the art optical fibers. Able to operate at 99.7% the speed of light according to researchers at the University of Southampton in England. (source: Extreme Tech)
 
The digital world is now creating tangible value from big data so expect internet privacy to take an even more prominent route in the future. 
 
Nowadays, security must come in layers, not only in the corporate environment, but on a personal level also.
 
Here are a few things you might want to consider for an overall improved security of your online privacy and data. 
Get a VPN service for all your devices: 
 
The number one thing you need to get in line with is having a VPN connection. It’s really simple to use and just like that poof! your data travels through an encrypted tunnel, safe from prying eyes and encrypted all the while. You basically need to pay a monthly subscription and rock on. It’s important that you don’t chose a free VPN as free VPN services are sure to get their profits elsewhere and it’s usually on your broadband expense. So avoid using unreliable free services that offer protection, but are in fact jeopardizing it.
 
Taking hold of your own digital footprint requires savvy, educated users, that know their rights and are not willing to compromise when it comes to their own privacy.
It’s easy to understand why more and more people resort to using a VPN service, rather than letting their information “fly” to unknown servers where they can be stored indefinitely.
Password Managers
Another simple step you can take to ensure your passwords are strong and that you have them all in order. Passwords managers are not written in stone, so naturally they can be hacked, but is far less likely to have your password hacked than it is to have one and the same password for multiple platforms and have your data compromised by relying on your memory alone.
2Factor Authentification 

We know it can be annoying to have an extra layer of access when you’re in a hurry, but remember you will not be prompted with a 2fact auth method if you don’t switch devices often.

Back Up

Back up is the most obvious security measure that you can take, but people are often just not doing it. Regardless if you back up locally on a hard drive or in the cloud, you can do the extra mile and encrypt everything before backing up your data and you can be certain that your data is safe or that you can at least do a roll back to the most recent version previously saved. 
 
 
Taking a few measures to securely navigate the valley of post-truth are of the essence in fearing no evil. Keeping our heads clear and taking action to protect the digital environment we expose ourselves to on a daily, without having to go to extreme lengths to do so, is the way to go in 2018.

Having a VPN in place is the smart approach to getting around all this. Think at a VPN as the middleman between you and the internet, where your ISP can only see a bunch of encrypted traffic. And since your VPN knows as much as your ISP would, it’s very important to choose a reliable one with a zero log policy and a strong encryption.

Services like MyIP.io will offer you a self-managed VPN platform, delivering fast, secure and reliable VPN service . This platform caters to a wide demographic through three channeled directions: Personal, Dedicated and Business, so it makes for a wonderful choice for corporate or personal use at the same time. Whatever provider you may chose, remember that the smart approach is to use a VPN service that you feel is the best match for you. Until then, stay smart, use a VPN!

IP Proxy Services aka VPNs, A Safe Haven After The Net Neutrality Repeal

Photo Credit:Safe & Sorry, illustration by Kurzgesagt

A popular way to refer to a Virtual Private Network or a VPN is the term “ip proxy” a much more popular notion conveying a somewhat more self explanatory meaning. A VPN is thus a tool anyone can have in place to bypass geo restrictions, add another layer of security to their internet connections and finally  getting around the economics and politics of what is ultimately a bandwidth battle among serious players. On the economic side of things we have a new “bright” and “exciting” idea  called bandwidth throttling. This is something that your ISP (Internet Service Provider) is now able to do without notice under the auspices of the new FCC rules – representing the political side of this affair.  Bandwidth throttling means that your ISP can slow down your connection if you happen to access service that your ISP is not partnered with. At the same time, your ISP could also create “fast lanes” to preferred partners creating unfair disadvantages if for example you watch Netflix, instead of Hulu.

Photo Credit:Safe & Sorry, illustration by Kurzgesagt

 

GETTING UNDER THE WIRE

Rather than getting wrapped in all the media headlines and speculation, we say it’s time we cut a shortcut through all the debate and aim for a solution to overthrow the effects of net neutrality repeal. It all sounds very sophisticated, but net neutrality is actually a common thing that can affect your internet connection in a very “tangible” way. If your ISP is no longer legally binded to remain neutral, think of how they can affect your connection by throttling access to services they are not partnered with.

The simplest way to go around this and regain control over the situation is to set yourself up with a VPN service. For example, under the new rules, you could be charged more for accessing Hulu instead of Netflix. With a VPN in place however, your ISP won’t even know what you are accessing, since all your data will appear encrypted.

 

BEFORE BUYING A VPN

But which VPN to pick, you may ask? Since your VPN provider can pretty much know all your ISP knows, it is important to chose a reliable one, ideally with a zero log policy. To spare you the trouble of reviewing different VPN services, we tested things like speed, encryption, locations and costs as main indicators of a good VPN service forMyIP.io VPN.

Here are the features that we you will most definitely find a value in when using our service:

1. High Speed: Fast uploads even for big transfers.

2. Open Ports: Not many VPNs will allow you to use PPTP and even fewer will help you use this feature by guiding you on how to do it. MyIP.io offers comprehensive support given by a very responsive customer support team.

3. Static IPs: Usually an extra feature, static IPs are marketed at extra fees. On a MyIP.io you’ll get a static IP on a $5 plan.

4. Cost: You’ll pay less than $6 if you go with an annual subscription and $8 for a monthly. The costs are even lower for a dynamic IP, which comes with the “personal plan” for less than $3 a month.

5. Master VPN Account for teams: If you decide to go with the “business plan” we will allocate a whole subnet to you or engineer a custom solution to meet your needs. In a nutshell, the business VPN solution allows multiple accounts into one master deck, a convenient scenario in term of having control, management and payment. Simultaneous connections up to 50, on this plan.

6. Strong Encryption and a Zero Logs Policy: My IP.io comes bundled with all the strong encryption protocols, supporting all the latest security protocols such as SSTP, PPTP, IPSec, L2TP, SSTP and 128bit –AES, OpenVPN cipher. They will not keep any logs of your activity on their server, so you can be sure no 3rd party is spying on your data.

7. Locations: You’ll have a diverse location offering to chose from with My IP.io that you can use to bypass geo-restrictions.

In the end, whatever you chose, be aware that a VPN provider is the middleman between you and the world wide web, so make sure you get a reliable one that ticks all your boxes. For us, that’s MyIP.io.

KEY IDEAS THAT YOU CAN KEEP AND CALL YOUR OWN:

hoto Credit:Safe & Sorry, illustration by Kurzgesagt

With all the crazy headlines surrounding the online security, net neutrality ordeals, you kind of get the feeling that it’s been a pretty intense year. But wait 2018 it’s only half way through and signs of weird outcomes are seen almost everywhere, counting the World Cup results as one.

Whether it’s the Facebook scandal, self-driving cars or politics, there’s no denying that technology is taking over and chances are you are affected by all or at least some of these narratives.

Out of the bunch, net neutrality is the one we are focusing on here and how you can circumvent it.

Summing up, the common sense solution to go around net neutrality repeal is to set yourself up with a VPN service. If you take nothing but the main idea from this written material, this is it:

First, make sure your VPN provider has a zero logs policy. Most of VPN providers will claim they don’t keep logs, but will in fact document logging data that they can trace back to you. Going with a service that can not keep this information by design, like MyIP.io, is an exciting option.

And second, beware of throttling of traffic. Your ISP might try and throttle VPN traffic, however it is difficult for your ISP to do so since it can affect all traffic, including the one that goes to their partners and customers.

All in all, net neutrality could be at some point in the future revoked, but even if it is, naturally there will be a great deal of back and forth in this kind of matter. Attempts for another repeal might and will be pushed forward, if the case. ISPs have a lot at stake to simply give in that easy. While fighting a good cause is important, we think that focusing on circumventing the effects of net neutrality repeal is equally important. Especially since, going around it, requires just a simple education and making sure that we’re a bit more savvy then yesterday, when it comes to our individual rights and preserving them in an increasingly digitalized world.