Author Archives: J. Hawthorne

Top VPN-Ready Routers for Your Home Network

Once the domain of networking specialists in a business setting, routers with VPN capabilities built-in are now accessible to everyone. It’s become one of the top features people look for when choosing a new router for their home network.

It’s true, there’s another way to enable a VPN at the router level.

You can get a router from FlashRouters with business-class DD-WRT firmware installed for you or install it yourself. However, going in this direction isn’t recommended unless you’re comfortable with the complexity it will add to running your network. Simply put, it isn’t as elegant a solution for the average user or small business.

For most people, it makes sense to choose a wireless router with simple, intuitive firmware that’s VPN-ready out of the box. There are more choices than ever that do just that.

VPN-Friendly Brands

Many of the top router brands have followed the lead of Asus and Synology by including VPN features. Nevertheless, the fact remains that both of these names remain the top choices. They are consistently releasing feature-rich routers that allow you to easily connect to a VPN service.

This guide focuses on the brands that offer VPN features across their product line. This empowers you to choose a specific router based on your needs. And to make things easy, a top pick was chosen from both the Asus and Synology camps.

Router You Need vs. One You Want

Accessing the Internet through a VPN uses up more of the router’s resources than a regular connection. Consequently, pay special attention to the CPU specs. A dual-core processor running at 1.0 GHz or greater is recommended. This is to ensure the router CPU doesn’t bottleneck the performance of web browsing, torrents, and downloads.

You need a capable router if you plan to use a VPN, but if taken too far you’ll overpay for a router with horsepower you’ll never tap into. If you live in a very large house, have a big family and/or ISP offering a bleeding-edge connection speed, going high-end may be worth it. However, you don’t need one of the beefiest models just to connect to a VPN.

Asus Wi-Fi Routers

With competitive prices, a wide selection of routers, and deep VPN capabilities across the board, Asus is a good place to start your search.

AsusWRT is the stock firmware preinstalled on Asus routers. It supports OpenVPN, L2TP, and PPTP encryption protocols.

Although not as cutting-edge on the software side as Synology, Asus knows hardware. They’ve been a major player in computer hardware since 1989.

ASUS RT-AC86U (AC2900) (1.8 GHz – dual-core) [Amazon]

ASUS RT-AX3000 (1.5 GHz – tri-core) [Amazon]

ASUS RT-AX88U PRO (2.0 GHz – quad-core) [Amazon]

Top Pick: Asus RT-AC86U [Amazon]

Despite its playful exterior meant to appeal to gamers, this is a serious router. It’s powerful enough to cover very large homes and brings cutting-edge tech to the masses.

Asus boasts blistering data transfer speeds of up to 2900 Mbps. The Wi-Fi signal is transmitted dual-band (2.4 + 5 GHz) via the latest 802.11ac MU-MIMO technology. That’s an impressive feat considering the reasonable price point.

Inside there’s a 1.8 GHz dual-core processor, 512 MB of RAM, plus 256 MB of flash storage.

Synology Wi-Fi Routers

Synology is primarily known for its excellent NAS solutions. Nevertheless, the company managed to impress tech enthusiasts with their first router, the RT1900AC, and they’ve built upon that foundation by adding the powerhouse RT2600AC and then the mesh-friendly MR2200AC.

The easy-to-navigate Synology Control Panel allows you to painlessly set up and connect to a VPN service. There is comprehensive protocol support, which includes OpenVPN, PPTP, and L2TP/IPSec.

This interface is like a sleek mini-OS dedicated to your router. And it’s a fresh yet familiar approach.

Synology MR2200AC (717 MHz – quad-core) [Amazon]

Synology RT2600AC (1.7 GHz – dual-core) [Amazon]

Synology RT6600ax (1.8 GHz – quad-core) [Amazon]

Top Pick: Synology RT2600AC [Amazon]

The RT2600AC is Synology’s former flagship, and it’s now its mid-range offering. This model improves on their first router the RT1900AC in every way. As a formidable unit with four antennas, the gargantuan appearance is matched by solid performance.

Although those who crave AX Wi-Fi speeds should opt for the Synology RT6600ax, most households will be well served by the RT2600AC.

MU-MIMO and the latest 802.11ac Wave 2 standard is supported, giving the router a top speed of 800Mbps and 1733Mbps on the 2.4GHz and 5GHz radios respectively.

It’s powered by a dual-core 1.7 GHz CPU and has 512 MB of DDR3 memory.

Wrapping It Up

Home users are ready for routers with VPN features, but open-source firmware solutions like DD-WRT may not be ready for them. That’s because technical know-how is still needed to gain the rich feature set.

Asus and Synology have managed to balance ease of use with advanced features. So while many are focused on router hardware specs, the importance of superior firmware can’t be ignored.

How to Hide Your IP in Transmission

There are two primary ways to hide your IP address in a BitTorrent client: with a proxy server or a VPN.

Many software developers have moved away from including proxy configuration options as the technology has been overshadowed by VPNs. Transmission is no exception.

The latest version of Transmission has no built-in proxy features. It was removed after version 2.11.

transmission-02-535x535The software developer took it out citing the reason: “Proxy support was not very good – we only support tracker proxies, not peer ones.”

You can still easily hide your IP and identity in Transmission with a VPN such as NordVPN by using the VPN client software they bundle with the service.

Once the client software is connected to the VPN all your online activity will be made anonymous by the VPN service, whether you use Transmission to download torrents on your Mac or simply for browsing the web.

People who prefer to use a proxy server either have to stick with Transmission 2.11 despite its limitations or switch to alternative software like µTorrent.

Best Chrome Extensions that Protect Your Privacy

From blocking ad trackers and password management to connecting to the Tor network, the right extensions can turn Chrome into a dream machine.

Privacy-related extensions are some of the most popular extension downloads out there. And with good reason. Chrome is the leading browser right now, but in terms of advanced privacy features it leaves much to be desired.

It’s time to stop passively allowing corporations, questionable websites, and shady third parties to feast on all the private data they can grab. Now that you’re on to them, arm yourself with some of the following privacy-enhancing extensions for your browser.

AdBlock

Insights into browsing habits and personal data are hot commodities to advertisers. Data allows the ads you see to be more relevant. So that gas barbeque you showed a fleeting interest in will be showing up again in banner ads – haunting you for days. Changing your privacy settings on the most common offender’s websites gets the job done, but who has the time?

Adblockers are the most popular extensions available and AdBlock continues to be the dominant force in this arena. The big boys in tech have devised methods to force their ads to display even when AdBlock is enabled. However, it’s still a great way to generally declutter your online experience.

LastPass

The days of using the same easy-to-type password for pretty much everything are long gone, but the bad habit remains. According to Exploding Topics, 32% of internet users reuse the same password across 5 to 10 websites and apps.

Nowadays, a strong password that is unique to one particular app or website is a must. It’s your first line of defense, followed by two-factor authentication. The only challenge is remembering all those passwords, and that’s where LastPass comes in.

LastPass’s Chrome extension allows you to access all your passwords in Chrome without the need to switch to a separate app. LastPass has a reputation for being easy to use, but having all your online accounts handy in Chrome takes this to the next level.

Click&Clean

Managing the local privacy of your web browser such as cache, cookies, downloads, and browsing history can be a chore in Chrome. And it takes more time than people realize.

Click&Clean gives you an easy-to-use interface for clearing private data with just one click. The ability to automatically clean your browsing data when you close your browser is particularly useful for people who share a computer with others. It even includes a privacy test to see if there are any holes in your online privacy practices.

Ghostery

Almost every major website out there uses cookies and tracking technology, and it builds a profile of you based on your activity. Worse, there are suspicious third parties with malicious agendas far worse than just attempting to sell you the hottest fragrance.

Ghostery finds every instance of trackers embedded on the sites you visit. It then gives you the ability to tailor how you handle these trackers depending on the level of trust you have for the site in question.

Proxy SwitchyOmega

Proxy SwitchyOmega provides an alternative to digging through the advanced settings section in Chrome, and the chore of filling in and clearing proxies in the config dialog of your OS. This is a powerful, time-saving extension for proxy power users. Just one proxy server often won’t get you very far, especially of the free variety. Enter all your proxy server’s IPs, plus port, and protocol, then switch between them quickly with a mere click.

Kronymous

Formerly called KroTor, this extension allows you to access the Tor network. Tor is one oldest and most trusted names associated with anonymous online browsing.

Kronymous is a more advanced alternative to the easy-to-use Tor Browser that requires no configuration and works out of the box. Tinkerers will love the extensive options it provides, plus the ability to continue using their preferred browser, Chrome.

Cupcake

Cupcake aims to make Tor aka “the onion router” tastier by giving it a pathway into your most used web browser. A plain, happy, or sad cupcake is displayed depending on the status of the proxy, signifying not in use, in use, or disabled respectively. Chrome users who don’t need the extensive options found in Kronymous may prefer this cute, user-friendly approach.

Tor Browser

Sometimes the simplest solutions are the best, not to mention the least likely to break. The Tor Browser extension is perfect for Chrome users who occasionally want to switch to true anonymity with Tor Browser when viewing sensitive content.

GoodExtensions has made the power of Tor available to Chrome users by bundling everything that is needed in one download without the need to configure anything. The only catch is this isn’t an official extension published by the team at the Tor Project. This is likely because the Tor Project wants you to use their browser also called Tor Browser rather than a Chrome extension.

Graphic: Sean MacEntee

Tor, VPN or Proxy – Which is Right for You?

Records of an average person’s browsing history may not be worth much, but when you add every citizen of the U.S. to the equation, the value becomes millions of dollars.

ISPs want your personal data so they can sell it to the highest bidder or find ways to upsell you. Advertisers and titans of Web search want to track your online activity so they can display products you’re most likely to be interested in. Finally, governments want access to your online activities, in case they find a reason to monitor them.

These players are becoming a bigger threat to your online privacy by the day, and it’s about time you stood up to this menace. It starts by protecting yourself, namely with Tor, a VPN, or a proxy.

There’s no perfect solution, however, it should be said they’re not all in the same league either. So, let’s look at the pros and cons of each of these technologies.

Tor

What is it?

Known as “the onion router,” Tor is free software that allows you to join their anonymity service. Tor directs traffic through a network of thousands of relays run by volunteers around the world. It makes it very difficult if not impossible for someone to monitor your online activity, and also prevents site owners from seeing your true location.

Over the years, Tor Browser has become the main focus of the Tor Project. It integrates Tor’s technology with a Web browser, making it straightforward to use. Tor Browser requires no setup. However, it won’t hide your activities in other apps such as email, FTP, torrent client, etc.

Only accomplished tech aficionados should tackle their Expert Bundle which is the standalone flavor of Tor. It allows you to manually configure programs to work with it.

Pros

  • Not only is Tor free software, but it’s also a free service which is amazing.
  • Tor Browser is easy to use.
  • Tor Expert bundle allows you to hide your IP address on apps beyond your web browser.

Cons

  • In terms of speed, expect varying degrees of slow. Considering all your browsing data is bouncing around various relays worldwide, it’s understandable why. The other reason is advancements in the network and software are dependent on altruistic contributions, which are short in supply.
  • Since launching in 2002 it has created a reputation for being a favored tool of cyber criminals, spammers, and dissidents. Attempts to hide yourself with it can backfire as Tor users are viewed with suspicion. It can be a red flag for services, businesses, or organizations that can detect its use.

Visit the Tor Project site.

VPN

What is it?

A VPN extends a private network across a public network. It acts as a fast, secure bridge between your computer and the internet, encrypting your data as you browse the web.

With a VPN enabled, websites you visit and prying eyes online can’t see your real IP address. Instead, they’ll see the IP associated with the VPN service. VPNs also allow you to bypass geographic restrictions by allowing you to assume an IP associated with a different country.

VPN access is a service, and just like internet access, you’ll be billed monthly to use it.

Pros

  • Paid service so servers are robust, reliable, and fast.
  • Quality VPN services have huge networks of servers located around the world.
  • Used for professional applications by IT professionals. VPN users are generally granted more trust than Tor or proxy users.
  • Services offer extensive software for use with any OS (desktop or mobile) and with any application.

Cons

  • You need to subscribe to a service with an associated monthly fee.
  • Some companies block their users from accessing services with a VPN.
  • Premium VPNs are generally fast, but using a VPN might cause weaker performance in highly demanding applications such as online gaming.

View a comparison of top VPNs.

Proxy

What is it?

Before VPNs exploded in popularity, proxy servers, and web proxies were the go-to method for hiding your identity. Similar to a VPN a proxy is a gateway between your home network and a public network such as the Internet.

When viewing lists of proxy servers published online, you’ll come across three types: anonymous, elite, and transparent. Basically, the slower the proxy type, the more secure the connection. So transparent is the fastest, and the least secure. Anonymous is in the middle, and elite is the most secure. An elite proxy even tries to hide the fact you’re using a proxy, but it’s the slowest type.

Unlike VPNs which allow you to set up one centralized app that will anonymize all your activity no matter which application you’re using; proxies require extensive configuration. You’ll need to learn the the proxy options well in each app as you’ll likely need to change servers often in search of a solution with decent speeds.

Many companies see proxies as legacy technology and have removed its support from their software to focus on VPN features.

Pros

  • Both free and paid proxies are available although most will want a VPN if they choose to pay.
  • Free proxy lists are plentiful, many of which are checked continuously to ensure the list is fresh and that the proxies are indeed online.

Cons

  • Free proxy servers are run by individuals, not companies that operate with at least some ethical standards.
  • Free proxies are used and abused by spammers and malicious users so you may find the proxy server IP is banned by the site you wish to use.
  • Each app is configured separately with proxies. This can be time-consuming and frustrating due to the likely need to change your proxy server often.

View a free proxy list.

The Final Verdict

Free proxies and Tor are fine for dabblers. However, if you wish to hide your identity on an ongoing basis, you’ll probably lose patience with the unreliability, slow speeds, or hoop-jumping (in the case of proxies) associated with these methods.

The top VPN services recommended here on LetMeBy are fast, trustworthy, and generally the best option for nearly everyone. The only downside is you’ll need to pay for it, but since most VPNs are so fairly priced, this isn’t much of a drawback.

Photo: Ed Ivanushkin

Privacy-Respecting Search Engines That Don’t Track Your Activity

Chrome calls it Incognito Mode. In Firefox and Safari, it’s Private Browsing, while Microsoft Edge labels it InPrivate. People are demanding better privacy online, and big tech companies have made their moves to cater to that need through their browsers.

However, local privacy on your computer or device and online privacy are two very different things.

It’s easy to presume that your online activity is hidden when private browsing modes are enabled, but in reality, that isn’t the case. The privacy changes occur on your end (regarding cookies, history, etc.), while data is still collected by the sites you visit.

The Search for the Best Online Privacy

The most reliable way to stop search engines and apps such as Google, Bing, Facebook, and TikTok from tracking your usage is to stop using their services altogether.

Undoubtedly, smaller search engines that deliver better privacy have other shortcomings.

You need to say goodbye to personalized experiences based on past activity. The ability to log in and customize your settings for future visits isn’t always available. And of course, Google will typically be a few steps ahead in terms of the quality of their search results.

Nevertheless, if beefed-up privacy is what you need, it’s a small price to pay. By sticking with a major search engine when you don’t mind being tracked and using a privacy-first search engine the rest of the time, you get the best of both worlds.

So, what are the alternatives to the big dogs? Likely, many of these names will be new to you. Maybe it’s time for more people to open their minds about search engines and give the up-and-comers a chance.

1. DuckDuckGo

While your neighbour probably hasn’t heard of it, DuckDuckGo has built its name up to the point where its first option for privacy focused searchers.

Not tracking their customers’ usage in any way is DuckDuckGo’s calling card. The emerging search engine doesn’t collect your data, store it, or share it. As advertisers are notorious for using data collected from searches, this also means you won’t have to look at annoying ads for the electric lawnmower you just researched two minutes ago.

2. WolframAlpha

It’s a “computational knowledge engine,” and if that means nothing to you, it pulls from a massive database of knowledge and does its best to tailor that data based on your search. So rather than asking Web pages for the answers, WolframAlpha is a solution in itself. No, it won’t replace a traditional search engine for everything, but it sure beats Encyclopedia Britannica.

3. Startpage (by Ixquick)

Startpage trumpets itself as “the world’s most private search engine.” It takes advantage of Google search technology while tossing out the company’s privacy rulebook. There is also a proxy feature to increase anonymity even more; by enabling it none of the sites you visit can see your IP.

4. Yippy

With Yippy you can filter out results that aren’t relevant to your interests by selecting categories, using tag clouds, and sources. This may be a breath of fresh air for users that are tired of sites attempting to guess what you want all the time rather than just asking.

Yippy doesn’t track searches and doesn’t display customized ads either.

5. Swisscows

Hulbee AG, the Swiss-based software company behind Swisscows, utilizes a data cloud for a more intuitive connection to information and for quicker load times. It manages to provide intelligent, relevant results without probing its users.

By encrypting searches, Swisscows protects you against third party attacks and data leaks. It doesn’t leave any tracks when you search on the site: topics, IP addresses and personal information are not stored. And for those looking to protect themselves from the wrong side of the internet that can sometimes show its face at inappropriate times, it’s family friendly too.

6. Disconnect Search

With a little help from DuckDuckGo, plus the giants at Bing and Yahoo, Disconnect Search piggybacks on great existing search technology but doesn’t record your IP or your history.

For higher levels of security Pro (blocks trackers and malware) and Premium (masks location, IP with a VPN) services are also offered.

7. Lukol

This one is simple: it’s Google, but with a proxy server added to the chain to hide your identity. Lukol keeps tabs on fraudsters and shady sites, safeguarding you from attacks you might not see coming.

Visual learners will appreciate that results have images pulled from corresponding Web pages next to links.

8. MetaGer

Privacy comes naturally to this German outfit; every search is completed with respect for your privacy. They don’t save your IP, and the fingerprint of your browser. Cookies aren’t used nor are tracking pixels. Data is encrypted though the HTTPS protocol so your ISP can’t see your searches either.

Options to browse with a proxy or through the anonymous TOR network are available to those willing to put in the effort.

Photo: jpbr