Author Archives: J. Hawthorne

Improve Your Privacy on Social Media: Top Mistakes to Avoid

Who isn’t on social media these days? 60% of the global population and 93% of all internet users use social media apps. You may have never imagined your grandma would get decorating ideas before you do on Pinterest, but it’s happened.

It’s given us unparalleled opportunities to stay connected but it’s also made maintaining our online privacy a bit complicated.

We grew up with cautionary tales of how famous people like Michael Jackson, Elvis, and Marilyn Monroe were driven to the edge by the loss of their privacy. Of course, we never thought normal people would face the same challenges on a smaller scale.

Most people who are doing something enterprising or of public interest need to market themselves, whether they’re entrepreneurs, politicians, musicians, or authors. If you want to succeed, it’s part of the game. But that doesn’t mean you can’t keep your private life private.

Here are key privacy mistakes that can be easy to make on social media. Do your best to avoid them and sleep soundly knowing you’ve done your part.

You reveal personally identifiable information

Many mistakenly believe that because they don’t have a high profile on social media, have low income, or have bad credit, identity theft isn’t something to be concerned about. It is!

Today’s bad guys are organized, savvy, and they’ve got incredible tech at their disposal. You might not think it’s a big deal to reveal your email address, your username, or another small piece of information that’s associated with your identity. Remember that criminals can potentially build databases to piece together information over time.

Generally, avoid posting documents issued to you by governments, institutions, or businesses online. Leaking small pieces of personal data such as account numbers, or even your mailing address can come back to haunt you one day and it’s commonly done. In fact, according to a study by Experian, Americans have posted an average of 3.4 pieces of sensitive information online.

You overshare about personal events

Oversharing can mean many things. It can mean getting into an emotionally-charged state and posting about one’s personal drama. It can mean talking poorly about your ex or your former employer and getting into detail about past experiences.

It’s a tougher issue than it might seem because we bond with others by sharing things about ourselves, including our vulnerabilities.

If you post regularly on social media you have to reflect and be honest with yourself. Determine which parts of your life you’re comfortable with being public knowledge and which parts you prefer to keep private. Once the cat’s out of the bag there’s no going back.

Some people are proficient at discovering dirt about people and then spreading gossip. That’s not something you have control of, but don’t make it easy for them by creating a record that can be repurposed as ammunition.

Remember that many are generally unsympathetic to the problems of others. Tell the few you most trust your personal news to get it off your chest and leave it at that.

You reveal your exact location

Geotagging is incredible from a technological perspective. People who are interested in the happenings in an area can tap on the location and see related posts. Thus, it adds to the discoverability of your content.

If overused, geotagging gives people a way to track your activities. More and more it’s being used with precision so that people know which neighbourhood you’re in, right down to the restaurant you’re dining at.

Use geotagging judiciously. You can flex some by letting your followers know you’re visiting New York City without naming the bagel shop.

You post photos of your children publicly

The average parent posts nearly 1,500 pictures of their child online before age five according to a study by Nominet.

Parents are proud of their kids. They’re a huge part of their world, and that’s wonderful. However, sometimes we have to remind ourselves that Instagram isn’t a family photo album.

Ever heard the term “sharenting?” It’s when parents publicize personal information about their child online. People wouldn’t imagine sharing detailed private information about their friends online, but “sharenting” is incredibly common. And it’s usually done without permission by the child.

Many parents don’t think about it, but a photo or video that is funny or cute might not be seen the same in the future. At best, it will be slightly embarrassing to your child. At worst, it could negatively impact their reputation later in life.

When we post content publicly, we create a record that can be accessed by people with bad intentions and by automated technologies. It opens your child up to risks such as facial recognition tracking, online security threats, and worse.

You accept friend requests from strangers

Bots and people who are pretending to be someone else (aka catfish) are incredibly common on social media.

Platforms like Facebook give you the opportunity to approve or deny friend requests. Not much good can come of adding someone you don’t recognize. Adding them could expose you and your friends to online security threats, scams, surveillance, and misleading information.

You share information about people without their permission

Social media tends to polarize people these days. One camp believes in the power of personal branding. Their careers depend on putting themselves out there online. The other camp is known to launch into rants about how social media is destroying the fabric of society.

There are a million and one reasons someone wouldn’t want you to post a group shot with them in it on social media. It’s best to never make assumptions. Let people know if you plan to post something about them online so they can opt out.

Posting photos or information about people could have ramifications for them you didn’t consider, whether it’s at their job or in their marriage. It might not strike you as fair or reasonable but you don’t want to be blamed for sparking a conflict.

You don’t use audience selection features

Want to share a story about your career journey but don’t want your ex-employer to see it? Some social media content falls into a gray area in terms of privacy decisions. Luckily, there’s a middle ground in-between public and private posts.

Apps like Facebook and Instagram allow you to create lists of people and deliver content to that audience only. Sometimes you can exclude people or a list of people from seeing a post or story as well.

For example, Instagram allows you to make a “Close Friends” list. And on Facebook, you can add people to your list of “Acquaintances.”

You don’t remove bots and fake accounts that follow you

On Platforms like Facebook and LinkedIn housecleaning your list of connections is easy because both sides have to agree to connect out of the gate.

It’s trickier to manage your followers on apps like Instagram and TikTok when you have a public account. It’s an ongoing process.

Every now and again, check your follower list and remove suspicious accounts. With practice, you’ll see patterns and it’ll be easy to spot certain types of fake accounts and scammers. In many cases, it won’t be clear what their objective is. But if there are clues that it isn’t a real person, it’s best to remove them rather than ignore them.

You don’t manage your tagged photos

Social media apps don’t have many restrictions when it comes to who can tag you in photos. In fact, on apps like Instagram spammers will tag you just so you’ll look at their post. And no, the image never has anything to do with you.

When potential employers or potential dates start digging through your profile, tagged photos are the first things they look at.

There are bound to be photos you’re tagged in that don’t send the right message. Take the time to check it every now and again, and remove your tag from the not-so-flattering shots, or the photos that reveal personal information you’re not comfortable with sharing with everyone.

You take questionable online quizzes

Facebook quizzes were huge back in the early days of the platform. People installed apps just to find out which character they are in Friends.

Quizzes seem like a fun and harmless way to share your personality traits with your friends. The problem is that the people who complete them usually don’t know who’s gathering their data and for what purpose.

If you think about it, quizzes are the perfect way for shady developers to extract data from people such as their name, birthdate, and other personal information. It doesn’t seem like much of a threat until you consider it can be pieced together and used for nefarious purposes.

You don’t use privacy settings and features

Every major platform has privacy features, and they usually go way beyond the ability to make your account private.

From hiding Likes on your post to limiting commenting to people you follow, social media apps allow you to use a lot of nuance when it comes to privacy. Experiment so that you’re confident in deploying privacy features when they’re most needed.

One of the key areas to investigate is the permissions the app has to access the data on your phone. Check its level of access to your photos, videos, location data, your mic, etc.

Location, camera, and microphone permissions can be set to “All the time,” “Allow only while using the app,” “Ask every time,” or “Don’t allow” on Android. There are no right or wrong answers here except that it makes sense to have stricter privacy settings on features you rarely use or don’t use.

Blocking access can break functionality in the app. So, test it before deciding how to approach your permission settings.

Conclusion

Let’s be clear, social media has plenty of benefits. Your online privacy is important but so is connecting with other amazing humans.

The key is to remind yourself of these privacy pitfalls before you hit the post button. Sometimes it’s easy to get caught up in the moment and reveal too much.

I hope you leave this article with some takeaways that will make your online journey a bit smoother. Stay safe!

6 Reasons to Skip Signing Up on a New Social Media App

In the earlier days of social media, it was simple. People created an account on Facebook first to connect with their old college buddies. Then, perhaps they got LinkedIn or Twitter. And in many cases, that was it!

Today it seems like there’s a new social media app popping up every month. And when they do keep showing up in your feed oh boy do most of them get overhyped.

If it’s a casual platform it’s where all the cool kids are at. If it can benefit your career, thought leaders want you to believe if you’re not investing in it, you’re falling behind.

The social media craze isn’t going away anytime soon. Knowing when to pass on a new app can put you ahead of the pack.

1. The Time Sink

Just as the number of social media apps has increased, the hours we spend on them have too.

From 2012 to today the time people spent on social media has been steadily trending upwards. The stats get downright alarming when we look at young age groups. In fact, a study by Real Research found that over 38% of teens use social media for over 8 hours a day.

Do you wish you watched more TV as a kid? Of course not, right? It makes you wonder how we’ll view our social media use today in the future. Eventually, social media and heavy smartphone usage will be dethroned by the next big thing. And at that point, we’re bound to gain more clarity about how much value social media brought to our lives in comparison with the time we spent on it.

Social media is a powerful tool with plenty of benefits. But no activity is so important that it should consume our lives.

2. Privacy Concerns

When people think about online privacy, they often think about how their personal data is gathered, how their data is used, and privacy policies.

It encompasses so much more than that.

On many new social media platforms, anyone can follow you and not all of them have the best intentions. There’s so much personal information that can potentially be leaked by the content you post itself.

Employers use social media to screen candidates. Posting photos of children is something that needs to be carefully considered for their safety. One slip-up can give away your location, or reveal parts of your life not everyone should be trusted to know. The list of privacy concerns is quite endless.

New social media apps haven’t been around long enough to put robust privacy options in place. If it allows you to make your account private that greatly impacts the number of people you can reach. Ultimately, it’s a blunt instrument.

Mature platforms allow you to manage privacy on a more granular level. For example, Facebook allows you to create lists and exclude groups of coworkers or acquaintances from seeing certain content. Advanced privacy features like this aren’t available on new apps and likely will never be available.

Some new social media sites track your web traffic, mine data from your profile and private messages, or share your data with third parties. Review the app’s privacy policy and trust your gut when it comes to whether you trust the company with your data or not.

3. Flash in the Pan or Here to Stay?

Getting in early is a big part of success. Influencers, celebrities, and authors that have built massive followings on apps like Instagram, TikTok, and X (formerly Twitter) have proven it time and time again.

As time passes it tends to get harder to make your mark on a platform as it gets more saturated with creators. The best time to dive in is when many users are still spectators. More people that consume but don’t make content means more attention for those who do create.

So, why would you ever wait on the sidelines?

The truth is we easily forget all the social media apps that had a brief moment in the sun and then lost the interest of most of its users and failed to get new ones.

Maybe you remember when it was common to hear about Clubhouse, BeReal, and Mastodon. Going further back, you might recall when Google+ shut down, or when Myspace lost its appeal and transformed into a glitter and spam-filled abandoned amusement park.

Social media apps that remain popular for several years or decades are actually the exception, not the rule.

4. Is This Mic On?

When it comes to your potential audience, it pays to look beyond the hype and study the numbers.

Established platforms like Instagram have been adding active users for many years. Thus, even new apps that had an incredibly successful launch have nowhere near the audience as older social media sites do.

Of the people that have created an account, most are not fully invested in the new platform. Like you, they’re testing the waters and determining if it’s worth it to stick around. If the app gained a user base quickly it can lose it just as fast.

Let’s study a bit of social media history, shall we?

Meta launched Threads in July 2023 to compete with Twitter. It got up to 100 million users in less than a week which looked incredibly promising. However, by the end of July over 50% of its users had already left.

With so many established alternatives, it’s challenging for new apps to retain their user base.

5. Barebones, Isn’t It?

No social media app is launched with a full set of advanced features. The options you considered to be basic on mature platforms simply aren’t present on new apps.

It takes years for apps to hit their stride when it comes to their features and identity. Just think about how much Instagram has changed over the years. It started as a basic photo-sharing app. Over time, Instagram added Stories, improved video capabilities, and Reels to stay competitive with other apps.

Giving up features doesn’t seem like a big deal until you experience it. It usually feels like going backward. You may find that you’re not willing to accept a lesser user experience just to jump on the latest bandwagon.

6. Technical Woes

If there’s one constant with technology, it’s that not everything works as it should all the time.

New social media sites haven’t been rigorously tested by users. So, there are bound to be issues the developers missed. Its early users become the app’s beta testers and arguably its guinea pigs.

Spammers can scammers are always looking for new opportunities. And there are fewer tools at a new app’s disposal to curtail undesirable behaviour. Dealing with bad actors inevitably leads to situations in which legitimate users face frustrating hurdles.

Apps are incredibly complex and challenging to manage. Thus, solving tech issues is like a game of whack-a-mole. And the newer the app, the more moles tend to pop up.

Conclusion

Feel like you’re missing out because you’re not using one of the latest social media apps? Don’t sweat it because you’re dodging the headaches as well.

Sometimes watching and waiting is the wise move. The perfect time to invest in a new app typically isn’t when it first becomes available. It’s good to get in early, but best to skip the days when the app hasn’t made its long-term potential clear.

The Best Web Browsers for Privacy

Ever noticed an ad for a product you just talked about appear while you were browsing the internet?

Once ads for the same thing follow you around the web, you start to wonder what caused it. And you wonder if tech companies know more about you than you’re comfortable with.

Often the easiest way to boost your online privacy is simply to switch your browser. Today there are privacy-focused browsers that don’t require tweaks or extensions to block trackers.

Mainstream browsers are a mixed bag. Some have adapted well to people’s growing concerns about being tracked online. Understandably it’s challenging for big companies to make changes that might hurt their bottom line, even if it’s in the short term. Apple’s Safari and Mozilla Firefox are two examples of well-known browsers that have managed to put the privacy needs of their users first.

Now that we’ve covered the primer, let’s dive in! Here are the best browsers available today for people that value online privacy.

Brave

If Brave isn’t one of the first browsers that come to mind for the best online privacy features it should be.

Mozilla Firefox has been around for quite a while and most have heard of it or used it. Well, guess what? There’s a connection here. Brendan Eich is the CEO of Brave, and he was also one of the co-founders of Mozilla.

By default, Brave blocks display ads and trackers. The concept behind it is unique as its purpose isn’t to eliminate all ads. Rather, it displays its own native ads that look like browser notifications and it rewards its users with Basic Attention Token. And yes, BAT is a token built on Ethereum with real value. Suddenly, ads aren’t a nuisance because internet users are compensated for their attention.

If you rarely want to see ads or don’t want to see ads at all regardless of the rewards, there are settings for all of that.

Brave is a great everyday browser for people that value privacy, but you can’t use it for everything. Some websites are set up to require certain data and important functions might refuse to work with Brave. In this situation, it’s best to launch a mainstream browser like Chrome or Safari for the sake of convenience.

Tor Browser

Many online privacy aficionados haven’t tried Tor Browser yet, but they’re probably used Tor at some point in their journey. Tor, which is short for “The Onion Router,” is free software that enhances privacy and hides your online activity from prying eyes.

Tor Browser takes the unique privacy technology established in Tor and builds it into a web browser. It sends web data through a multistep encrypted route that includes at least three nodes.

The downside of Tor has always been speed. It’s the price you pay for its thorough approach to anonymous browsing. Thus, Tor Browser is a good choice for tasks with privacy of utmost concern, but it’s not going to replace your go-to browser.

VPNs also encrypt your data like Tor. So, if you’re looking for a good balance between anonymity and browsing speed a VPN is the best option. Check out LetMeBy’s reviews of the top 3 VPNs.

DuckDuckGo Browser

DuckDuckGo is a privacy-focused search engine that doesn’t collect or share private information about its users. Other search engines have tried to find their niche and have faded over the years, but DuckDuckGo is stronger than ever because it promises a benefit people actually care about.

Its latest offering is its web browser. Its looks and most of its basic functions will look familiar to users of Chrome and Edge. And it’s based on the same idea as the DuckDuckGo search engine. The browser blocks trackers and ads that follow you around the web.

People that visit YouTube frequently will appreciate its unique video feature called Duck Player. It opens YouTube videos in a view free from distractions such as recommendations.

It removes ad targeting and tracking, but it doesn’t remove YouTube ads altogether. Rather, the ads won’t be based on your activity and browsing history.

Firefox

Mozilla is a not-for-profit Foundation that aims to put people before profit and fight for an internet that’s accessible and open to everyone. Although that may sound idealistic Mozilla has proven over the years that it can make software just as good as big corporations.

These days nearly everyone uses Chrome or Safari. Back in 2009, Firefox was at its peak with over 32% browser market share. Many stuck with Firefox for years but once they switched to Chrome, they never looked back.

We can speculate about all the reasons Firefox lost popularity over the years. One thing is certain. Google preinstalls Chrome on its Chromebooks. Apple preinstalls Safari on its devices. And Microsoft preinstalls Edge in its operating system. People always needed to make the conscious decision to download Firefox, and with so many good options most stopped bothering.

It’s time to give Firefox another look.

Firefox has privacy features mainstream browsers don’t have such as automatic DNS over HTTPS and cookie blocking.

Blocking everything that tracks you doesn’t always lead to a good user experience. Firefox’s Enhanced Tracking Protection allows you to block or allow certain types of cookies and content.

Network settings are integrated right into Firefox, which allows you to use a proxy with it without affecting other apps. Other browsers such as Chrome and Safari approach this differently. To use a proxy or VPN you have to apply it system-wide.

Safari

Apple disrupted the tech world when it first released App Tracking Transparency in iOS. For the first time ever, Apple users could easily opt out of being tracked. And given the choice, most people did.

Although it’s less talked about, you can also prevent cross-site tracking in Safari on Mac OS. You merely go to Safari’s privacy settings, select “Prevent cross-site tracking” and you’re done.

Most popular browsers have a private browsing mode. Safari has an edge over many because it uses DuckDuckGo by default. With it enabled, beyond your browser not remembering the sites you visited, the search engine itself won’t collect data based on your searches.

Another handy feature in Safari that encourages good habits is its password generator. It suggests strong passwords, saving you time and confirming that your passwords are keeping up with current standards.

Safari’s Intelligent Tracking Prevention limits the amount of your data that’s sent to Apple and third parties. This means that long-term cookies are only stored on your device for sites you use regularly.

Chrome with Privacy Extensions

If you prefer to deploy online privacy features a la carte, don’t mind tweaking settings, and enjoy Google’s ecosystem, this could be the right option for you.

Google Chrome is by far the most widely used browser and that means it’s one of the best when it comes to customizing its features with extensions. Simply put, Chrome isn’t a privacy-first browser out of the box, but you can make it into one.

Want to block trackers? Add an extension such as Privacy Badger or Ghostery. Don’t want to see ads? Install Adblock Plus or uBlock Origin.

There’s a slight catch. Extensions can break, lose their support, or lose their effectiveness as technology progresses.

One of the biggest pluses is that you can experiment and find the extensions you like the most. You’re not married to built-in features that may not offer the approach to privacy you want.

Why Companies Want Your Data

Data is a huge industry, and it’s a growing one. The global big data market was estimated to be worth $162.6 billion in 2021. It’s forecasted to reach $273.4 billion by 2026.

The concept is simple. You more businesses know about consumers’ likes, dislikes, interests, careers, hobbies, and a multitude of other things, the more they can sell.

Many people don’t think marketing works on them. But the evidence says otherwise. Clicks on targeted ads can be as much as 670% higher. Additionally, 80% of users actually reported to prefer tailored ads. People notice what interests them, and data makes it possible to serve people both the content and ads most likely to be relevant to their interests.

The Tug of War Between the Wants of Advertisers and of Users

Some of the biggest tech companies are in a challenging spot. If users aren’t happy their business is in jeopardy. And if advertisers aren’t happy it’s in trouble too.

Apple’s move to allow users to easily control if they wanted to see targeted ads or not was part of a big shift in the industry.

It’s become standard practice to collect data about users and also to give them tools to manage their data on different platforms. In other words, if you want better privacy you typically have to drill down into the settings to make it happen.

Conclusion

As more become aware of the importance of online privacy, more are taking another look at the web browser they use every day.

For too long popular browsers have been synonymous with good. And while the most used browsers are excellent, they’re usually not the top choices in terms of privacy.

Any browser’s privacy can be leveled up significantly by enabling a VPN. If you take the time to choose a browser with robust privacy features as well those ads that follow people around will be far behind you.

How to Hide Your IP Address on Android

As VPNs have become widely used and smartphone processing power has exploded, Google has equipped Android with powerful VPN features.

Although there are apps that can hide your IP on Android, you can do the same thing right within the OS. Android has a built-in VPN client that supports many of the most popular VPN protocols.

This tutorial teaches you how to utilize a VPN service to mask your IP with no additional software.

Note that this guide was created using a Samsung smartphone. Your version of Android may look a bit different.

Step 1

Using a VPN has become the standard solution for anonymous browsing, making it next to impossible to trace activity back to your true IP address.

Before you get started with exploring the connection settings in Android, you need to have a VPN.

One of the first things to check is the VPN protocols supported by your version of Android. There’s a good chance it’ll be IKEv2/IPsec MSCHAPv2, IKEv2/IPsec PSK, and IKEv2/IPsec RSA. VPN technology is evolving quickly. Google moves to the fastest and most secure new protocols and leaves the rest behind.

Next, be sure that the VPN service you plan to use supports the same protocols as your version of Android.

I used a free VPN for testing purposes. And while free services can get the job done for light use, paid options are the fastest and offer superior security.

If you’re looking for a VPN, LetMeBy has reviewed the top 3 VPN services. Alternatively, if you’re in a hurry, here are the VPNs most commonly recommended on this blog:

Step 2

Locate “Settings” either by browsing your apps or by swiping down at the top of the screen to reveal the quick settings menu.

To access your settings from the quick settings menu, tap the cog icon at the top right of the screen.

Step 3

Now that the “Settings” menu has appeared, scroll down to “Connections” and tap it.

The options here control how you connect to the internet, connect to your mobile provider, Bluetooth devices, etc.

Step 4

Scroll down to “More connections settings” near the bottom. Tap it.

Step 5

In the “More connections settings” screen, go to “VPN.”

Step 6

If you’ve never set up a VPN before this screen will be mostly blank with text that says “No VPNs.”

Tap the icon at the top right that looks like three dots stacked on top of each other. Choose “Add VPN profile.”

Step 7

A new options screen called “Edit VPN network” will appear.

Give your VPN a name. Next, select a protocol that is supported by your VPN, and enter the server address.

Scroll down and enter the username and password provided to you by your VPN service provider.

Tap “Save” and test it to be sure you’ve connected to the internet through the VPN. You can open your web browser and visit What Is My IP Address to verify that your IP address has changed.

All Done

Congrats! Your IP is now hidden on Android!

How to Hide Your IP Address in Chrome

Ever wonder how it’s possible to hide your IP address? Technically, it isn’t. In order to hide your real IP, you must replace it with a different IP address.

To do this, you need to use a VPN or proxy server. Either one assigns your device with a new IP so nobody can see your true IP address online. And that’s the basic idea behind achieving anonymity in Chrome.

Unlike browsers like Firefox which allow you to enter settings proxy settings natively, Chrome refers you directly to your OS network settings. Thus, you actually have to change the settings in your operating system.

Whether you use Windows or a Mac, this guide has you covered.

Step 1

Locate the options icon to the far right of the Chrome browser window and click on it. The icon looks like three dots stacked on top of each other.

A pull-down menu will appear. Select “Settings” near the bottom.

Step 2

The settings page will appear directly in the browser window. On the left, you’ll see a tool icon with “System” next to it. Click it.

Step 3

Under the “System” settings you’ll see an option that says “Open your computer’s proxy settings.” Click it.

Step 4

In order to complete the next steps, you’ll need the info associated with your VPN or proxy server.

The VPN Route

VPN services provide you with a domain name or IP address, login, and password.

The Proxy Route

To use a proxy server, you need a domain or IP, and sometimes a login and password are required as well.

Which Should You Use?

Proxies and VPNs both hide your IP, but only a VPN will encrypt your data being sent and received from the internet.

If you’re looking for a VPN, check out LetMeBy’s reviews of the top VPN services. Or, scroll down to the list below for a quick peek. They’re all fast, inexpensive ($10/month or less), and highly recommended.

Recommended services:

Avoid free proxy services for anything other than testing. They’re almost always unusably slow. Plus, I wouldn’t trust my browsing data with most of the small operations offering it.

Step 5

Windows – Proxy

You’ll be directed to the “Proxy” menu under “Network & Internet” settings in Windows.

You can set up Windows to either detect your proxy settings automatically or you can enter your proxy manually.

To do it automatically, make sure “Automatically detect settings” is switched on. You’re good to go!

If you choose to do it manually, switch on “Use a proxy server” under “Manual proxy setup.” Enter your proxy server IP or domain name, plus the port number if required.

Note that Windows doesn’t support usernames and passwords for proxies out of the box. It requires you to create a two-step proxy in that circumstance which goes beyond the scope of this guide.

Windows – VPN

Click “VPN” at the left of the “Network & Internet” settings window.

Next, hit the plus (+) icon next to “Add a VPN connection.”

The VPN entry options will appear in the window. Enter the domain or IP, login, and password you were given by your VPN service provider.

Mac OS – Proxy

The “Network” window will appear with the “Proxies tab” selected. To use a proxy, check the box next to “Secure Web Proxy (HTTPS)” [preferable] or “Web Proxy (HTTP)” depending on the service.

Check the box next to “Proxy server requires password” and enter the login and password provided to you if it’s required.

Mac OS – VPN

Using a Mac with a VPN varies with different versions of Mac OS. Apple has done an excellent job of outlining the processes here.

Step 6

Congrats! You’re now ready to browse with your true IP hidden from prying eyes. Go back to Google Chrome and surf to your heart’s content.