Latest news with #SamBent


Geeky Gadgets
16-07-2025
- Geeky Gadgets
The Shocking Truth Behind Tor's OS Spoofing Removal
What happens when the very tools we trust to safeguard our privacy begin to erode that trust? The Tor Project, long heralded as a champion of online anonymity, has sparked outrage among its users after quietly removing a critical feature: operating system (OS) spoofing. This feature once masked users' operating systems, creating a unified 'anonymity set' that made it harder for adversaries to track individuals. But in a move that many see as a betrayal of its core mission, the organization not only eliminated this feature but also denied its removal in an official newsletter—despite evidence to the contrary. For a project built on transparency and user empowerment, this contradiction has left its community reeling, questioning whether the Tor Project is still the privacy advocate it claims to be. Sam Bent provide more insights into the growing rift between the Tor Project and its user base, unpacking the implications of removing OS spoofing and the broader concerns about transparency and accountability. Readers will gain insight into how this change impacts their anonymity, why critics are accusing the organization of gaslighting, and what this controversy reveals about the shifting priorities of privacy-focused tools. At its heart, this is a story about trust—and what happens when it's fractured by the very entities tasked with protecting it. As the dust settles, one question looms large: can the Tor Project regain the confidence of its users, or has it crossed a line it cannot come back from? Tor Browser Privacy Controversy What Is OS Spoofing, and Why Does It Matter? OS spoofing was a feature in the Tor Browser that masked users' operating systems, making it appear as though all users were running Windows. By creating this uniformity, the feature established a consistent 'anonymity set', which reduced the likelihood of users being identified based on their operating systems. This was particularly important in combating tracking and fingerprinting techniques that rely on unique system attributes to identify individuals. In 2025, the Tor Project removed this feature, exposing users' actual operating systems—whether Linux, macOS, Windows, or others—in HTTP headers. The implications for privacy are far-reaching: Users are now categorized by their real operating systems, fragmenting the anonymity set and reducing collective protection. Adversaries can more easily identify users through passive fingerprinting , which analyzes system-specific attributes such as OS type. , which analyzes system-specific attributes such as OS type. Those using less common operating systems face heightened risks, as their systems stand out in server logs and tracking data. For a tool designed to safeguard anonymity, this change represents a significant concern, particularly for users who rely on Tor to protect their privacy in high-risk environments. Confusion and Contradictions: The Tor Project's Response The controversy intensified when the Tor Project addressed the issue in a newsletter, claiming that OS spoofing had not been removed and was 'here to stay.' This statement directly contradicted developer documentation and discussions on GitLab, where the removal of OS spoofing was explicitly outlined. Critics argue that the organization misrepresented the change, framing it as a 'harmonization' rather than acknowledging the elimination of a critical privacy feature. Adding to the confusion, the removal was not widely communicated to users. Instead, it was buried in technical release notes and developer discussions, leaving many unaware of the change. This lack of transparency has led to accusations that the Tor Project deliberately avoided open dialogue, undermining user trust and informed consent. For an organization that champions privacy and user empowerment, this approach has been widely criticized as inconsistent with its stated values. Tor Project Just Gaslit Their Entire User Base Watch this video on YouTube. Advance your skills in privacy by reading more of our detailed content. Privacy Risks and Erosion of Trust The removal of OS spoofing has broader implications for both user privacy and trust in the Tor Project. By exposing users' operating systems, the change undermines a core principle of anonymity: uniformity. Without this feature, users are more vulnerable to tracking and identification, particularly those using less common systems that stand out in data logs. The incident has also drawn attention to the role of Privacy Guides, a nonprofit organization that advises on privacy tools. Privacy Guides defended the Tor Project's decision, claiming the change had minimal impact on user privacy. However, critics argue that this stance downplays the significance of the issue and contributes to misinformation. The situation highlights the need for independent scrutiny and accountability for organizations that position themselves as privacy advocates. Concerns About Organizational Priorities The OS spoofing controversy is part of a broader pattern of behavior that raises questions about the Tor Project's organizational priorities. Critics have accused the organization of focusing more on fundraising efforts than addressing user concerns transparently. Additionally, the Tor Project has expressed a desire to discourage users from modifying browser settings, further limiting user choice and control. These actions suggest a shift away from empowering users to make informed decisions about their privacy. Instead, the organization appears to be centralizing control, a move that some argue contradicts the open source and privacy-first ethos upon which the Tor Project was founded. This perceived shift in priorities has led to growing skepticism among users and privacy advocates alike. What This Means for Users For those who rely on the Tor Browser to protect their anonymity, the removal of OS spoofing and the subsequent miscommunication represent a significant breach of trust. This incident underscores the importance of critically evaluating the tools and organizations that claim to prioritize privacy. Users concerned about their anonymity should consider the following steps: Stay informed about updates to privacy tools and assess how changes may impact your security and anonymity. Explore alternative tools and projects that emphasize transparency and user choice. Advocate for greater accountability and open communication from privacy-focused organizations. By taking these steps, users can better protect their privacy and hold organizations accountable for their actions. The Path Forward The Tor Project faces a critical juncture in its relationship with its user base. To rebuild trust, the organization must prioritize transparency, clear communication, and a renewed focus on empowering users. Acknowledging past missteps and committing to open dialogue will be essential in restoring confidence among its community. As the debate over OS spoofing and organizational priorities continues, users are encouraged to remain vigilant and proactive in safeguarding their privacy. The incident serves as a reminder that even trusted tools and organizations must be held to high standards of accountability. Media Credit: Sam Bent Filed Under: Technology News, Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.


Geeky Gadgets
03-06-2025
- Business
- Geeky Gadgets
Why Cloud Password Managers Keep Failing and Safer Alternatives in 2025
What if the very tools you trust to protect your digital life are the ones putting it at risk? Over the past decade, cloud-based password managers have become the go-to solution for millions, promising seamless access and convenience. Yet, time and again, these centralized platforms have fallen victim to devastating breaches, exposing sensitive user data to cybercriminals. From high-profile hacks of services like LastPass to the unsettling reality of data mining and third-party tracking, the cracks in their armor are impossible to ignore. In a world where privacy feels increasingly out of reach, the question looms: is the convenience of the cloud worth the cost to your security? In this guide Sam Bent, explores why centralized password managers keep failing—and why local, open source solutions like KeePass and KeePassXC are emerging as the smarter, safer alternative. You'll discover how these tools bypass the vulnerabilities of cloud storage, offering unparalleled control over your sensitive information. With robust encryption, transparency through open source auditing, and the ability to keep your data offline, KeePass doesn't just protect your passwords—it enables you to reclaim your digital privacy. As we delve into the risks of cloud-based services and the advantages of local management, you might find yourself questioning the status quo and rethinking how you safeguard your most critical information. Local Password Managers: Superior Security Cloud-Based Password Managers: Persistent Security and Privacy Risks Cloud-based password managers rely on centralized servers to store sensitive user data, making them attractive targets for cybercriminals. Over the years, high-profile breaches involving services like LastPass, Norton LifeLock, and OneLogin have exposed the inherent risks of this model. These breaches often stem from compromised employee credentials, supply chain vulnerabilities, or inadequate network defenses, leaving user data vulnerable to exploitation. Beyond the immediate threat of breaches, privacy concerns loom large. Many cloud-based services engage in practices such as data mining, user tracking, or sharing information with third parties, including government entities. These activities not only erode user trust but also increase the likelihood of sensitive data being misused or exposed to unauthorized parties. Why Local Open source Password Managers Are Superior Local password managers like KeePass and KeePassXC eliminate the risks associated with cloud storage by keeping your data offline. This approach ensures that your sensitive information remains under your control, free from the vulnerabilities of centralized servers. Additionally, their open source nature allows independent experts to audit the software, making sure that any potential vulnerabilities are quickly identified and resolved. This transparency fosters trust and enhances the overall security of the platform. These tools employ robust encryption algorithms, such as AES-256, Argon2, and ChaCha20, to protect your data from unauthorized access. Unlike cloud-based solutions, local password managers do not rely on corporate assurances or third-party servers, giving you complete autonomy over your digital security. Why Centralized Password Managers Keep Failing! Watch this video on YouTube. Explore further guides and articles from our vast library that you may find relevant to your interests in password managers. Key Features and Benefits of KeePass and KeePassXC KeePass and KeePassXC are designed with security as their primary focus, offering a range of features that cater to both novice and advanced users. These features include: Comprehensive database encryption: Both tools use authenticated encryption to prevent tampering and ensure the integrity of your data. Both tools use authenticated encryption to prevent tampering and ensure the integrity of your data. Advanced key derivation functions: Argon2 and similar methods protect against brute-force attacks, enhancing the resilience of your master password. Argon2 and similar methods protect against brute-force attacks, enhancing the resilience of your master password. Memory encryption: This feature safeguards your data from keyloggers and cold boot attacks, adding an extra layer of protection. This feature safeguards your data from keyloggers and cold boot attacks, adding an extra layer of protection. Hardware security key integration: Support for hardware keys provides enhanced security for accessing your password database. Support for hardware keys provides enhanced security for accessing your password database. Two-factor authentication (2FA): An additional layer of security ensures that even if your master password is compromised, your data remains protected. An additional layer of security ensures that even if your master password is compromised, your data remains protected. Cross-platform compatibility: KeePass and KeePassXC work seamlessly across various operating systems, making sure secure access to your passwords on different devices. KeePass and KeePassXC work seamlessly across various operating systems, making sure secure access to your passwords on different devices. User-friendly interfaces: Both tools offer intuitive designs that cater to users of all experience levels, making them accessible without compromising functionality. Privacy and Control: The Core Advantage One of the most significant advantages of KeePass and KeePassXC is their commitment to privacy. Unlike many cloud-based alternatives, these tools do not include telemetry, data mining, or forced registration. This ensures that your data remains entirely under your control, free from external interference or surveillance. Additionally, local password managers provide protection against legal demands and regulatory overreach. Since your data is stored offline, it is far less susceptible to external access or compliance with third-party requests. This autonomy allows you to maintain full control over your digital security, making sure that your sensitive information remains private and secure. Balancing Security with Practical Convenience Modern local password managers have evolved to offer convenience without compromising security. For example, you can synchronize your password database across devices using self-hosted solutions, encrypted file transfers, or secure USB drives. Features such as browser extensions, mobile apps, and biometric authentication further enhance usability, making these tools practical for everyday use. For those who need flexibility, portable versions of KeePass and KeePassXC allow you to access your passwords securely on public or work computers. This ensures that you are never locked out of your accounts, even in situations where you cannot use your primary device. Best Practices for Strengthening Password Management To maximize the security of your digital life, consider implementing the following best practices: Create a strong master password: Use a unique password with at least 15 characters, combining letters, numbers, and symbols for added complexity. Use a unique password with at least 15 characters, combining letters, numbers, and symbols for added complexity. Choose a local, open source password manager: Opt for tools like KeePass, KeePassXC, or Pass to ensure greater security and control over your data. Opt for tools like KeePass, KeePassXC, or Pass to ensure greater security and control over your data. Maintain local backups: Store encrypted backups of your password database in multiple secure locations to prevent data loss. Store encrypted backups of your password database in multiple secure locations to prevent data loss. Enable two-factor authentication: Use 2FA wherever possible, and consider hardware security keys for an additional layer of protection. Empowering Your Digital Security While cloud-based password managers may offer convenience, their vulnerabilities and privacy concerns make them a less reliable option for safeguarding sensitive information. Local open source solutions like KeePass and KeePassXC provide unparalleled security, transparency, and control, making them the ideal choice for individuals serious about protecting their digital assets. By adopting these tools and following best practices, you can take charge of your password management, making sure your data remains secure and private in an increasingly connected world. Media Credit: Sam Bent Filed Under: Guides Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.


Geeky Gadgets
16-05-2025
- Geeky Gadgets
Privacy Please Browser Extension : Stop Surveillance and Protects Your Online Privacy
What if every click you made online was being watched, recorded, and sold? This isn't the plot of a dystopian novel—it's the reality of modern internet use. From social media platforms to shopping websites, nearly every corner of the web is designed to track your behavior, often without your knowledge or consent. The result? Detailed digital profiles that fuel targeted ads, manipulate your choices, and erode your sense of privacy. But here's the good news: you don't have to accept this as the cost of being online. With tools like the 'Privacy Please' browser extension, you can take back control, block invasive trackers, and enjoy a cleaner, more secure browsing experience. In a world where surveillance feels inevitable, this tool offers a way to fight back. When you navigate to sites like YouTube, Reddit, Twitter/X, or Google, the extension intercepts the request and redirects you to an open-source frontend. Same content, zero tracking. In the video Sam Bent introduces you to the fantastic power of privacy-focused browsing. You'll discover how Privacy Please created by Sam automates the process of redirecting you to privacy-respecting front ends, like Nitter for Twitter and Libreddit for Reddit, making it effortless to shield your activity from prying eyes. Beyond convenience, the extension also blocks trackers, eliminates ads, and simplifies web pages, creating a faster and less cluttered experience. But there's more to this story than just features—this tool is open source, meaning its code is transparent and verifiable, fostering trust in an era of hidden agendas. By the end, you'll see how small steps, like installing a browser extension, can have a profound impact on your digital autonomy. After all, protecting your privacy isn't just about safeguarding data—it's about reclaiming your freedom online. Protect Your Online Privacy Privacy Front Ends: A Smarter Way to Browse Privacy-respecting front ends, such as Invidious for YouTube, Nitter for Twitter, and Libreddit for Reddit, offer a more secure way to interact with popular platforms. These tools strip away intrusive ads, trackers, and forced logins, allowing you to access content without exposing your identity or browsing habits. By prioritizing user privacy, these front ends deliver a cleaner and distraction-free browsing experience. Despite their benefits, using these front ends manually can be cumbersome. Each time you encounter a link, you must locate and switch to the corresponding private front end, which can be time-consuming and inconvenient. This additional effort often discourages consistent use, leaving users vulnerable to the very tracking systems they aim to avoid. A more seamless solution is needed to make privacy protection both effective and effortless. How 'Privacy Please' Streamlines Privacy Protection The Privacy Please browser extension addresses the challenges of manual switching by automating the process. Once installed, it automatically redirects links from mainstream platforms to their privacy-respecting alternatives. For instance: – Clicking a YouTube link seamlessly redirects you to Invidious. – A Twitter link takes you to Nitter. – Reddit links open directly in Libreddit. This automation eliminates the need for manual intervention, allowing you to maintain your privacy without disrupting your browsing habits. By handling the redirection process in the background, Privacy Please ensures that you can enjoy a secure and private online experience with minimal effort. This convenience makes it easier to consistently use privacy-focused tools, reducing your exposure to invasive tracking systems. Browser Extension to stop Surveillance Watch this video on YouTube. Unlock more knowledge about online privacy by reading previous articles we have written. Key Features of 'Privacy Please' Beyond link redirection, Privacy Please offers a suite of features designed to enhance your browsing experience while protecting your data. These include: Tracker Blocking: Prevents intrusive trackers from monitoring your online behavior, making sure that your activity remains private. Prevents intrusive trackers from monitoring your online behavior, making sure that your activity remains private. Ad Removal: Eliminates ads, creating a cleaner and faster browsing experience free from distractions. Eliminates ads, creating a cleaner and faster browsing experience free from distractions. Content Simplification: Strips away unnecessary scripts and clutter, improving page load times and usability. These features not only safeguard your privacy but also make your online interactions smoother and more efficient. By combining privacy protection with usability enhancements, Privacy Please offers a comprehensive solution for modern internet users. Why Open source Matters Transparency is a cornerstone of trust in privacy-focused tools, and Privacy Please exemplifies this principle by being open source. Open source software allows anyone to inspect its code, making sure that the tool operates as promised. This transparency offers several key benefits: Verification: Users and developers can confirm that the extension functions as intended without hidden agendas. Users and developers can confirm that the extension functions as intended without hidden agendas. Security: Potential vulnerabilities can be identified and addressed by the community, enhancing the tool's reliability. Potential vulnerabilities can be identified and addressed by the community, enhancing the tool's reliability. Collaboration: Open source projects encourage contributions from developers worldwide, fostering innovation and continuous improvement. By embracing open source principles, Privacy Please not only builds trust but also ensures long-term accountability and adaptability. This collaborative approach enables users to take an active role in shaping the tools they rely on. How to Get Started Getting started with Privacy Please is straightforward. The extension is available on major platforms, including Firefox Add-ons and the Chrome Web Store. For those who prefer greater control or wish to verify the code's integrity, the source code is hosted on GitHub. This accessibility ensures that anyone can install and use the tool while maintaining full transparency. By following a few simple steps, you can integrate 'Privacy Please' into your browser and begin protecting your online activity immediately. Empowering Yourself Against Online Surveillance Adopting tools like Privacy Please is a proactive step toward reclaiming your digital privacy. By incorporating privacy-focused solutions into your daily routine, you can: Minimize your digital footprint: Reduce the amount of data collected about you online. Reduce the amount of data collected about you online. Challenge exploitative systems: Limit your reliance on platforms that profit from invasive tracking. Limit your reliance on platforms that profit from invasive tracking. Support a more equitable internet: Contribute to a broader movement advocating for user privacy and autonomy. While no single tool can guarantee complete anonymity, Privacy Please simplifies the process of protecting your online activity. Its combination of automatic redirection, tracker blocking, and open source transparency makes it an effective and accessible choice for anyone concerned about privacy. By taking action today, you can regain control over your digital life and set an example for a more privacy-conscious future. Media Credit: Sam Bent Filed Under: Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.