General Gaming Article

General Gaming Article


Microsoft Not Forcing Windows 10 Upgrades

Posted: 16 Oct 2015 12:01 PM PDT

Windows 10

A report released on Thursday caused quite a stink, stating that many Windows 7 and Windows 8.1 customers were forced into upgrading to Windows 10 whether they wanted to or not. Up until now, we've only seen the new operating system served up as an optional upgrade, so the report was shocking to many. However, what's going on is an error on Microsoft's part that the company says will be rectified immediately.

"As part of our effort to bring Windows 10 to existing genuine Windows 7 and Windows 8.1 customers, the Windows 10 upgrade may appear as an optional update in the Windows Update (WU) control panel. This is an intuitive and trusted place people go to find Recommended and Optional updates to Windows," Microsoft told Ars Technica. "In the recent Windows update, this option was checked as default; this was a mistake and we are removing the check."

In the meantime, consumers who are faced with a forced setup of Windows 10 can manually back out during the installation process. Consumers are also urged to take a look at the update option to make sure the automatic installation isn't turned on by default.

News of the forced install follow reports surfacing last month that Microsoft was downloading the Windows 10 installer to PCs despite what the consumer wants and despite the amount of available hard drive space. Windows 10 was found downloaded in the ~BT folder eating up between 3.5GB to 6GB of space.

"For individuals who have chosen to receive automatic updates through Windows Update, we help upgradable devices get ready for Windows 10 by downloading the files they'll need if they decide to upgrade," Microsoft told The Inquirer. "When the upgrade is ready, the customer will be prompted to install Windows 10 on the device."

Microsoft is pushing hard to get Windows 10 installed on every computer… perhaps a little too hard, it seems. According to the latest numbers from Netmarketshare, Windows 7 is still in the lead with a 56.53 percent market share followed by Windows XP with 12.21 percent, Windows 8.1 with 10.72 percent and Windows 10 with 6.63 percent. Microsoft's latest OS still has a way to go before it can claim the market.

To help boost Windows 10 numbers, Microsoft has teamed up with Dell, HP, Intel and Lenovo on a new advertising campaign that showcases PCs with the new operating system. Called "PC Does What," the six-week campaign will also highlight Intel's sixth-generation Core processors and thin form factors provided by the two OEMs. The campaign will begin on October 19 in the United States and China.

VIA: Ars Technica

Newegg Daily Deals: Dell 34-Inch Curved Monitor, Gigabyte Gaming Laptop, and More!

Posted: 16 Oct 2015 11:57 AM PDT

Dell Curved Monitor

Top Deal:

What red-blooded American doesn't like a beauty with curves? Of course, we're talking about high resolution monitors, and if you've been lusting one, check out today's top deal for a Dell U3415W 34-Inch Curved Display for $700 with free shipping (normally $800 - use coupon code: [EMCKAKS26]; additional $50 mail-in-rebate). This curvaceous 4K beast sports an IPS panel with a 3440x1440 resolution (21:9 aspect ratio), 5ms GTG response time, 3,000,000:1 dynamic contrast ratio, and two upstream and four downstream USB 3.0 ports, three DisplayPorts (one of which is a mini DP), and an HDMI port.

Other Deals:

Gigabyte Gaming Laptop Intel i7 5700HQ (2.70 GHz) 8 GB Memory 1 TB HDD NVIDIA GeForce GTX 970M 3 GB 15.6-inch Windows 8.1 for $1149 with free shipping (normally $1250)

Corsair 850W 80 Plus Gold Certified Power Supply for $110 with free shipping (normally $120 - use coupon code: [EMCKAKS25]; additional $20 Mail-in rebate)

G.Skill Ripjaws X Series 16GB (2 x 8GB) Desktop Memory for $70 with free shipping (normally $90)

AMD A10-7850K Kaveri Quad-Core 3.7 GHz Socket FM2+ 95W Desktop Processor for $120 with free shipping (normally $130 - use coupon code: [EMCKAKS27])

Valve: Please Mod the Steam Controller

Posted: 16 Oct 2015 11:49 AM PDT

Steam Controller 002

We've waited quite a while for Valve Software to release its official Steam Controller. The whole Steam Machine initiative centers around this device, which is slated to finally arrive in gamers' hands next month. Will it be worth the wait? Has Valve perfected the way we will play PC games in the living room? Is Valve's design the final one to rule all game controllers connected to the PC? For the latter, perhaps not.

The reason we say this is because recent interviews with Valve indicate that the Steam Controller design still isn't set in stone. The company actually wants gamers to mod the device, and is even considering releasing the CAD files that show how the controller is put together.

"It's in our DNA to think of how our customers can create value for other customers," says designer Erik Johnson. "[Valve is] resigned to the fact that every time we do something, especially when it's new, it's not the last one."

What makes the Steam Controller unique is that it includes two trackpads that replace the D-pad and the right thumbstick. An analog stick is included on the left along with the typical four-button ABXY layout, trigger buttons, and shoulder buttons. The controller also includes gyroscope and accelerometer sensors, configurable controls, and more.

Does this mean the touch screen may find its way back into the design? Possibly. Valve got rid of it for a reason back in early 2014, but that doesn't mean a modder won't throw it back in and refine the design. Where the Steam and media buttons go is another question, but that's where the CAD files come in… when they're released.

November will be a big month for Valve, as not only the Steam Machine gadgets will finally be up for grabs, but the Steam Machines themselves will begin rolling out. Surprisingly, GameStop will expand its one or two shelves dedicated to PC gaming to a large section that will play host to the Steam Machines and Valve's devices. We'll see how long that lasts, considering that GameStop focuses heavily on console gaming.

As for the hardware refresh timetable for the Steam Controller, Johnson told Polygon that a new one will be released "at the point where there's a product or some technology or something else that passes the test of us needing to [release a new controller] so that our customers can experience something."

Are you excited about the Steam Controller and the whole Steam Machine initiative?

Asus ROG Maximus VIII Extreme for Skylake Now Available for $500

Posted: 16 Oct 2015 11:39 AM PDT

Flagship arrives

Asus ROG Maximus VIII Extreme

It was around this time last month when Asus announced its new flagship Z170 motherboard for enthusiasts, the ROG Maximus VIII Extreme. We were allowed to drool over the spec sheet and some press photos, but weren't able to buy it or even anticipate when it would be available. Well, that's changed.

The ROG Maximus VIII Extreme is now available to purchase for $499 MSRP. Street pricing is a tiny bit higher -- $499.99 at Newegg, plus $3.99 shipping. Let's just call it a $500 motherboard, because that's what it is, plus or minus a few bucks.

That's a lot of coin, though you got a lot in return. The ROG Maximus VIII Extreme is a top shelf motherboard for builders with big aspirations, and big cases -- it's an Extended ATX (E-ATX) board, so it won't fit in standard ATX cases.

Asus uses all that real estate to cram an abundance of features, such as eight SATA 6Gbps ports, two SATA Express ports, an M.2 Socket 3 for those gum stick-sized SSDs that tunnel data through PCI Express, a U.2 connector, eight USB 3.0 ports, four USB 3.1 ports, six USB 2.0 ports, a Thunderbolt 3 (Type-C) port, four PCI-E 3.0/2.0 x16 slots (three that operate at x16, x8/x8, or x8/x4/x4 modes, and one that maxes out at x4), two PCI-E 3.0 x1 slots, GbE LAN, four DDR4 DIMM slots, and the list goes on.

This is a board that's built for overclocking and it starts at the hardware layer, Asus says.

"The Maximus VIII Extreme is engineered from the ground up to provide exceptional performance in every area. Starting with voltage regulation, processor power is provided by the Extreme Engine DIGI+ voltage-regulator module (VRM) which provides clean, stable power that reacts quickly to transients, ensuring there are no bottlenecks for high current power delivery when it's needed," Asus explains.

To help with overclocking the memory and stability, Asus talks up its second-generation T-Topology trace layout.

"Painstaking work has gone into isolating and matching electrical characteristics of signal lines, allowing users to take DDR4 memory overclocking on the Maximus VIII Extreme to new heights - over DDR4-3866MHz is possible with all memory slots populated," Asus added.

Good stuff. If you have the loot and have been waiting for this board to become available, go here and build that killer system you've been plotting.

Follow Paul on Google+, Twitter, and Facebook

City That Defeated Comcast in Court Now Offers 10Gbps Internet Service

Posted: 16 Oct 2015 10:45 AM PDT

Blazing fast broadband

Ethernet

Municipal utility EPB Fiber Optics announced that it's now offering 10Gbps broadband Internet service to any Chattanooga, Tennessee resident who wants it, provided they pay the asking price.

The new speed option runs $299 per month and includes free installation. There's no contract to sign and no cancellation fee if residents ultimately decide that 10Gbps is too rich for their blood.

"Five years ago, Chattanooga and Hamilton County became the first in the United States to offer up to 1Gbps Internet speeds," said Harold DePriest, president and CEO of EPB. "Today, we become the first community in the world capable of delivering up to 10Gbps to all 170,000 households and businesses in our service area."

Comcast sued EPB in 2008 in an attempt to block it from building out its fiber network. The court sided with EPB and Comcast went on to upgrade its own infrastructure in order to remain competitive. According to Ars Technica, Comcast announced earlier this year that it would offer 2Gbps to Chattanooga residents, which costs $300 per month, plus up to $500 for installation and up to another $500 for activation. More recently, it announced a $159/month promotional price in Chattanooga and other cities that's good for three years.

EPB's service covers a 600 square mile area. It's using Alcatel-Lucent's TWDM-PON broadband technology to make 10Gbps possible on a widespread basis.

The municipal utility also launched 5Gbps and 10Gbps tiers for small businesses, along with 3Gbps, 5Gbps, and 10Gbps for larger enterprises.

"Chattanooga's 10Gbps fiber optic network is a world-class platform for innovation," DePriest added. "In recent years, the need for faster Internet speeds has increased rapidly. Chattanooga is the perfect place for companies to enhance their productivity today and test the applications everyone in the country will want tomorrow."

All of this high-speed goodness has earned Chattanooga the nickname "Gig City."

Follow Paul on Google+, Twitter, and Facebook

Lenovo Turned Down Microsoft's Request to Sell Surface PCs

Posted: 16 Oct 2015 09:28 AM PDT

Surface tension

Lenovo

Both Dell and HP recently inked deals with Microsoft to sell Surface Pro tablets to enterprise customers. What about Lenovo, the world's top supplier of PCs in terms of market share? Don't count on it.

Gianfrano Lanci, president and COO of Lenovo, stated at the recent Canalys Channels Forum that Microsoft approached the PC maker over a year ago about selling Surface Pro hardware, The Register reports.

"I said no, I don't see any reason why I should sell a product from within bracketes, competition," Lanci said

That's not a viewpoint Lenovo takes on all matters with Microsoft. Lanci said it views the Redmond outfit as a "partner on certain things" and a "competitor" on others, the Surface Pro falling into the latter category.

For those looking for a Surface-like system from Lenovo, the company will push its Miix 700 this holiday season. It's a 12-inch tablet with a keyboard folio that's been "designed to stand out from the party crowd." Lenovo will begin selling the Miix 700 next month starting at $699.

As for Dell and HP, they both have their reasons for backing Microsoft's hardware effort even though they too offer Surface-like alternatives. Dell says it made the decision to sell Surface tablets because it didn't want to lose longstanding relationships it's had with certain customers who have been asking for this.

"We could tell those customers, 'Sorry, we are not interested because it's a competing product' or we could say 'Mr. and Mrs. customers we'll take care of you', and that's what we did," Dell said.

HP's decision seems to have come a bit more begrudgingly. The OEM explained that its sales people don't see a dime from selling Surface, but will nevertheless "sell, service, and support Surface if the customer absolutely insists upon it," adding that it's not the company's first preference to do so.

Follow Paul on Google+, Twitter, and Facebook

Your Privacy: Going Under the Radar

Posted: 16 Oct 2015 12:00 AM PDT

This article was published in the October 2015 issue of Maximum PC. For more trusted reviews and feature stories, subscribe here.

We reveal who's watching you online and the best ways to shut them out

Picture the scene. You're minding your own business, happily downloading torrents, when the FBI storm your room and drag you to jail faster than you can say "fresh meat." This actually happened… in South Park. In reality, your pert posterior probably won't be in danger of hosting uninvited appendages quite so quickly, but the wrong kind of Internet activity can still land you in hot water.

PCF308.feat2.main

Assuming you're not pirating, there's nothing inherently wrong with guarding your personal details and browsing habits. If photos of Miley Cyrus's underarm gardens fl oat your boat, why should anyone be able to eavesdrop on your antics? In fact, it's far more likely that your privacy is compromised by advertising agencies than anyone else. From a simple Google search, to pretty much any ad-funded website, your browsing behavior can be tracked to establish which ads you're most likely to click on.

Fortunately, there are plenty of ways to prevent this monitoring. We'll show you some of the best options, from simple tricks to more hardcore solutions that can shield you from almost any surveillance. But before the juicy stuff, a shameless disclaimer. Any tips, guides, or methods in this feature are not guaranteed to protect your anonymity. If you use them to hide illegal activity, don't come crying to us if you're identified, extradited to Guantanamo, and have electrodes stuck where the sun don't shine.

Hit the Road to Anonymity

From blocking cookies to hiding your IP address, here's how to get off the grid

Internet privacy tends to make headlines with stories of autocratic governments spying on their citizens, creating the impression that we're all careering straight into an Orwellian dystopia. But while state surveillance is undeniable, the first invasion of your privacy is far more likely to come via a humble Google search. Although apparently anonymous, Google has a habit of tracking your searches in order to bombard you with ever-more personalized advertising. By contrast, a search engine such as www.duckduckgo.com generates unbiased search results without the added user profiling or tracking.

PCF308.feat2.duckduckgo

Unlike Google, DuckDuckGo doesn't keep tabs on your web searches.

Switching to a less profit-driven search engine will certainly help you on the road to anonymity, but visit a few websites and inevitably you'll receive cookies. These tiny text files are usually perfectly legitimate ways for websites to record things, such as frequently viewed items, so they'll appear on your next visit. But, just as dear Toothless, How To Train Your Dragon's wouldn't-hurta-fly dragon, was turned to the dark side, so too can be the humble cookie.

Tracking cookies are much more invasive and compile records of your browsing habits and personal details in order to target you with specific adverts. Since 2011, US law has increased cookie awareness by requiring websites to display those homepage banners that you can't miss, but it's really just a token nod.

A more promising attempt at keeping your browsing less trackable is the Do Not Track HTTP header, now integrated into all common web browsers. When activated, websites are requested not to use tracking cookies. However, the key word there is "requested," as while Do Not Track may be great in theory, the feature can't actually prevent websites and advertisers from tracking you. There's no law to say they can't completely ignore a DNT request.

Clear the Slate

So, it's entirely up to you to stay anonymous. Clearing your browser cache and cookies through your browser's settings is a start. You can also use clean-up software such as CCleaner (www.piriform.com/ccleaner) to delete cookies, temporary Internet files, and various other web leftovers from multiple browsers in one go.

Once you've got a clean slate, start utilizing private browsing modes for more than just keeping your foot fetish under wraps. Whether it be Microsoft's InPrivate feature, Firefox's Private Browsing mode, or Incognito in Chrome, all do a pretty good job of preventing nosey tracking cookies from setting up camp on your PC. But even without going into full-on porn mode, the big browsers also allow you to block third-party cookies. While this doesn't create an impenetrable wall, it's a lot more effective than the pathetic Do Not Track request.

Another easy way to regain control of your Internet anonymity is by exploiting browser extensions to close privacy loopholes. Active web content such as Java, Flash, and Silverlight can be used to obtain system information without your knowledge and piece together various browsing habits. Automated scripts can also be potential security risks, so controlling exactly what web content can and can't run is a good thing. Browser extensions like NoScript for Firefox and ScriptSafe for Chrome allow you to do exactly that, blocking all active web content and asking for your approval before letting it run. At first, these extensions can be almost as annoying as User Account Control, but the more you use them, the smarter and less intrusive they get.

Spot the Spies

The problem is, even when web tracking is largely legitimate, the fact that it happens mostly without your knowledge inevitably provokes distrust. Wouldn't it be great if you could see exactly who's trying to sneak information about you and stop them in their tracks? Well, that's exactly what extensions such as Ghostery and Disconnect do. Both are available for IE, Firefox, and Chrome.

PCF308.feat2.disconnect screenshot

With a simple browser extension like Disconnect, you can see who's tracking you.

With a simple browser button, you can see a list of all the active advertising, analytics, and social media tracking organizations on a current webpage. You're even able to control which ones can collect information about your browsing session. Both extensions are dead easy to use and far less troublesome than script-blockers. Plus, unlike private browsing modes, which simply stop tracking organizations from leaving cookies, these extensions can actually prevent them from monitoring you. Far more effective.

However, just because your browser is locked down doesn't necessarily mean your system is secure. Any malware already present on your PC may still be snooping on you, and carelessly downloading the wrong zip, executable, or even PDF file can also transmit your personal details to unintended recipients.

In an ideal world, any suspect file should be opened on a computer that's permanently offline, but since that's easier said than done, you can get similar protection by installing a virtual machine. Two powerful yet free options are VMware Player (www.vmware.com) and VirtualBox (www.virtualbox.org). With one installed, all you then need to do is set up a free Linux distribution within it. Before opening a suspicious file, ensure the virtual machine has no Internet access and take a snapshot (similar to creating a System Restore point) to revert back to once you've dealt with the suspicious file.

Even better, why not do away with the virtual machine altogether and create a live Linux environment that's run entirely from a USB flash drive? Using a regular Linux ISO image, tools such as LinuxLive USB Creator (www.linuxliveusb.com) will produce a portable, bootable, and self-contained Linux OS that can be run from any host computer with no reboot required. As no files are modified on the host system, a live Linux environment can be used away from home, at an Internet café, for example.

Encrypting Email

Email attachments aren't the only way that your privacy can be compromised. Your actual written email correspondence is also far from anonymous. Way back when Google launched Gmail with its immense (for the time) 1GB storage limit, it was, unsurprisingly, less keen to market how this capacity was funded. Google did, and does, scan email content in order to target you with personalized ads, and Yahoo is up to the same tricks. So when you next see ads for both Miley Cyrus's latest album and Veet appear by your emails, you'll know why.

PCF308.feat2.encrypted email

Here's what an encrypted email looks like. Stare at it long enough and you'll see a silhouette of Jesus.

Thankfully, there's no shortage of ways to keep your emails tight. If you're serious about email anonymity, providers such as Hushmail (www.hushmail.com) offer built-in PGP email encryption and no advertising. Email another Hushmail user and your message is automatically encrypted when sent and decrypted when read. Email a non-Hushmail recipient and you can still use encryption, but require them to answer a secret question before the message can be read. Clever stuff, but you'll need to part with $35/year for it, or there's a free version if you can stick to a 25MB storage limit.

Alternatively, you can also encrypt mail sent via webmail accounts like Gmail, Outlook, and Yahoo, by using a desktop email client such as Mozilla Thunderbird, plus a few other tools. With Thunderbird installed and configured as your email client, download and install the free GNU Privacy Guard encryption software (www.gnupg.org), and then the Enigmail Thunderbird extension (www.enigmail.net), and follow the configuration wizard. If that all sounds like overkill for sending a couple of anonymous messages, then consider a disposable email address instead. Guerilla Mail (www.guerrillamail.com) and Mailinator (https://mailinator.com) both fit the bill, letting you quickly send and receive anonymous mail with no incriminating signup processes or content scanning.

The wonders of encryption can also keep instant messaging secure. Apps such as Cryptocat (https://crypto.cat) will integrate with Chrome, Firefox, or Opera, giving you an encrypted chatroom to converse with other Cryptocat users. To minimize traceability, there are no static user accounts, so you create a dynamic username each time you connect. Once in, you can start your own conversation or type the title of one that's already active to join in. No group conversations are private though, so anyone who requests your conversation name is free to participate. However, you can select an individual participant for a private chat, as well as sending encrypted files and photos.

MPC116.feat 2.cryptocat

It looks worse than the original MSN Messenger, but Cryptocat is great for anonymous IM.

The Big Bad World

Exposing and blocking advertisers or encrypting email can certainly help you take back some control of your privacy, but it's not enough to keep you and your location hidden. Whenever your computer is connected directly to the Internet, you're still flying well above the radar unless you've taken some measures to conceal your IP address.

There are numerous ways to hide your IP address, but do you need to? The gatekeeper of your identifiable details is your Internet service provider. But, in the United States at least, they're unlikely to phone the 5-0 if you've torrented your favorite Justin Bieber song, though they probably should on the grounds of crimes against taste.

The US Copyright Alert System is more lenient than you might imagine. If you're found illegally downloading a copyrighted file by the rights holder, they can record and submit your IP address to ISPs participating in the alert program. If one ISP happens to be your provider, then you'll be sent a copyright infringement notification letter informing you of ways to avoid future breaches. You get up to six warnings. By the fifth or sixth warning, ISPs may start throttling bandwidth or using various other measures to make naughty subscribers play ball. Even then, however, ISPs aren't automatically required to disconnect subscribers or disclose personal details to the copyright holders.

MPC116.feat 2.ashley

The recent hack of Ashley Madison highlights that our privacy is often left in the hands of others. For better or worse.

This all sounds refreshingly forgiving, but relying on your ISP to protect your identity isn't advisable. Even when most providers are reluctant to divulge your details (snitching on you to the cops isn't a great way to ensure customer loyalty), sooner or later they'll bend over and give in to the long greasy arm of the law.

Just take the ongoing case of Voltage Pictures. The production company behind The Hurt Locker and Dallas Buyers Club has developed a reputation for being a copyright troll, by sending threatening letters, demanding financial compensation, to alleged pirates. Voltage claims to identify the pirates by collecting IP addresses from BitTorrent swarms, though serious questions remain over the reliability of the evidence. After resistance from ISPs, the firm has gained court orders in several countries, including the United States, that force ISPs to hand over details of the customers linked to those IP addresses.

Those customers then receive letters that threaten legal action if a financial settlement is not agreed upon. No matter how dubious the evidence, however, defending your corner will be expensive. In one series of cases in Chicago, defense costs were estimated at up to $50,000, making it unsurprising that many chose to settle with Voltage for around $5,000.

Now, to make it clear, we absolutely don't condone copyright infringement. The degree of financial damage that piracy has on the entertainment industry may be questionable, as might be attempts to fine illegal file-sharers a zillion times the cost of an equivalent legit download. But unless it would be ethically and financially viable for everyone to cheat the system, then exceptions can't be made for a few. However, not all torrents infringe copyright, so here are a couple of ways to keep legal torrenting anonymous.

Torrenting

Firstly, use a seedbox. This is effectively a remote server that you can log into via a webpage and use to download and upload torrents on your behalf. Completed torrents can then be transferred from the seedbox to your computer via FTP, therefore preventing any torrent traffic being directly associated with your home IP address. Some seedboxes won't allow connections to public torrent trackers though, therefore restricting you to private trackers and possible ratio requirements. It's likely you'll have to part with at least $5/month to use one, but then freedom isn't free. It costs folks like you and me.

Another option is to try a proxy server, such as BTGuard (https://btguard.com). These have the effect of hiding your IP address from other members of a torrent swarm by funneling torrent traffic via a proxy (intermediary) server computer. If prying eyes are monitoring IP addresses connected to a certain torrent, they'll see your proxy's IP, not your own. And from the other end, your ISP will only see you connecting to a proxy service, rather than a torrent tracker. It's not an impenetrable system though, as the proxy server itself may be a weak link. Should the provider keep records of its users and traffic, the paper trail could lead back to you. It's therefore vital to do your homework before picking a proxy, especially as you'll be shelling out a monthly fee that's similar to a seedbox subscription. Free proxy servers are also around, but it's likely their bandwidth will be low and downtime high. And don't expect them to put up much of a fight if asked for your details.

Proxy servers by nature aren't just useful for anonymizing torrent traffic though. Your web browser can also be easily configured to connect to webpages via a proxy server, thereby hiding your IP address and also circumventing website blocks implemented by your ISP. It can even be possible to view country-specific video streaming services from abroad, though smart JavaScript or Flash implementation may help content providers sniff out your true IP and deny you access. This also highlights a general concern with proxy servers, as while they insert a hurdle to make tracking more difficult, they don't conceal the entirety of your Internet traffic from source to screen.

Tor of Duty

One way to get closer to this level of security on the cheap is to use Tor, aka The Onion Router. If there's an element of the Internet that divides opinion—even more than the contents of Sickipedia—it's Tor. On the one hand, if you live in downtown Shanghai and want to access pretty much any western website, it's a godsend. But if you're a disciple of Chairman Mao, or even a western politician with a fear of what the proletariat might get up to, out of sight of your security agencies, then Tor is about as welcome as Bill Cosby is, well, anywhere.

In essence, Tor has the same effect as a proxy server, fooling monitoring systems by faking your computer's location. But it considerably boosts your anonymity by passing your Internet data packets through multiple encryption servers (nodes) before they emerge on the open Internet (clearnet) and scoot off to your requested website.

As your IP address is concealed by so many encryption servers, you get multiple layers of protection rather than just a single proxy server barrier, and the result is analogous to the layers of an onion. However, Tor can also be eye-wateringly annoying. The numerous encryption servers that relay your data within the Tor network inevitably create speed bottlenecks, and, being volunteer-run, demand usually outstrips available bandwidth. You can't just access the Tor network via any old web browser, either, as Tor requires its own modified, standalone browser, though this is a derivative of Firefox.

MPC116.feat 2.TOR

Browsing the web with Tor can be a frustratingly slow experience.

What's more, while Tor does make it very difficult for agencies to perform traffic analysis, it's not completely safe. The final Tor node that a packet is relayed through before exiting onto the clearnet is known as the exit node. There are more than 1,000 of these active at any one time, and though unlikely, it is still possible to eavesdrop on an exit node, as the data emerging there is unencrypted.

Freenet

An alternative anonymous network without this weakness is Freenet. This is different to Tor in that it's not a means of accessing the clearnet anonymously, but rather a secure network in which to communicate and share files within trusted circles of contacts. Freenet uses a peer-to-peer model and allocates a portion of your hard drive to store Freenet data and serve it to the network. This is encrypted, as is all the data passed around Freenet, and thanks to such comprehensive end-to-end encryption, Freenet is almost impossible to penetrate and is ideal for anonymous communication and file sharing.

PCF308.feat2.freenet screenshot

Freenet is a private peer-to-peer network that's completely under the radar.

Users are also able to create and host Freesites, which are static websites hosted within, and only accessible from, the Freenet. There are also plugins for anonymous email, social network-style communication, and forum contact. However, as with other peer-to-peer filesharing systems, transfer speeds are seed-dependent—don't expect the overall speed of the network to be lightning-fast.

Going Virtual

Though networks like Tor and Freenet are useful for protecting privacy, their slow and limited functionality hardly makes them ideal. To go totally incognito with the fewest possible restrictions, you need a Virtual Private Network (VPN).

Where services like BTGuard will hide torrent traffic, and Tor can keep web browsing anonymous, A VPN will hide the entirety of your Internet traffic inside an encrypted tunnel. Traditionally, VPNs have been used by companies with employees working off-site, but now they're increasingly popular for the average Joe wanting to preserve their privacy. To exploit a VPN, firstly you'll have to hand over at least $5/month to subscribe to one of the huge number of personal VPN providers out there, and you'll also need to install that provider's client software so you can access your VPN tunnel. Inside the tunnel, data is encrypted to various degrees, depending on the quality of VPN you choose.

Similar to the potential Tor exit node vulnerability, the weakest links of a VPN tunnel are its entry and exit points. The VPN server is able to see all data that goes into and out of the tunnel, so if you want to sleep at night, leave no stone unturned in ensuring your VPN provider doesn't log any user details or monitor traffi c. It's also a wise move to select a company that accepts payments by Bitcoin, to avoid any potential privacy breach that could occur if paying by credit card or PayPal. For more information on VPN providers, as well as comprehensive reviews, check out www.bestvpn.com.

PCF308.feat2.bestvpn

Before signing up to a Virtual Private Network, read the reviews at www.bestvpn.com.

With this amount of privacy protection in place, you'll now be well and truly under the radar. Still paranoid? It could be time to hone those Bear Grylls skills and get completely off the grid.

Paranoid or Prudent?

Several years ago, you'd have had a tough time finding a dartboard in the Pentagon without Julian Assange's face on it. But that all changed in 2013, when his position as arch-intelligence enemy was taken by a US National Security Agency contractor by the name of Edward Snowden. Snowden leaked up to 1.7 million classified documents, revealing the extent of mass surveillance around the globe.

Key revelations included the existence of PRISM: a partnership between the NSA and numerous major Internet companies, including Google, Apple, Microsoft, Yahoo, and Facebook. PRISM enables the NSA to access the emails, documents, photos, and personal details of any non-US citizen, outside of the US, from its participating companies, without having to specify an individual target or communications method.

That, however, doesn't mean US citizens can rest easy. Indeed, a leaked NSA inspector general's report stated the "NSA maintains relationships with over 100 US companies" and that the US has the "home-field advantage as the primary hub for worldwide communications." One leaked court order, for example, revealed Verizon has been told to hand the NSA details of all calls in its systems, in bulk, on an "ongoing, daily basis."

Snowden's leaks also revealed that the UK's Government Communications Headquarters (GCHQ) taps around 200 fiber-optic cables carrying global Internet and telephone data, amounting to up to 600 million daily communications. Data, stored for up to 30 days, is shared with the NSA.

Snowden's leaks also detailed how the NSA had collected over 200 million global text messages per day. The really scary bit? This surveillance was able to gain information on individuals who were not under any criminal suspicion.

Hacking the Hackers?

MPC116.feat 2.fbi darkode

Of all the people on the Internet, you'd think hackers would be more paranoid than most when it comes to privacy. But that didn't help those using infamous hacking forum Darkode, which was recently taken down by the authorities in 20 countries, as part of the FBI-led Operation Shrouded Horizon. A site frequented by cybercriminals, Darkode was essentially a marketplace for botnet services (think DDoS attacks), stolen credit card and banking details, zero-day exploits, and various other nasties.

The takedown is notable for the fact that Darkode was one of the major English-language hacking forums in the world (there are believed to be over 800 hacking sites worldwide, but the vast majority are not in English). It was also significant for being visited by members of Lizard Squad, a group of hackers who claim responsibility for carrying out high-profile attacks on the likes of Sony and Microsoft.

The clampdown is an obvious boon for the security services, but it also highlights the importance of privacy, particularly as Darkode members were known to boast about how the site was impenetrable and used so-called "bulletproof" hosting providers. Potential users could also only gain access to the site if their name was put forward by an existing member. It sounds good in theory, but as ever with any kind of security, the weak spot was the human element. The site was ultimately taken down due to the fact that the FBI managed to infiltrate the Darkode membership itself.

As part of the operation, 28 people were immediately arrested for cybercrime offences. That quickly climbed to 70 people around the world, a number expected to rise higher and higher, now that the Feds have full access to the site and the transactions that have taken place.

The Darknet

PCF308.feat2.boxout3 darknet

Ahh, the darknet. It's a shame this gets such bad press, as its name sounds cooler than Clooney dipped in LN2. The darknet is part of, though not the same as, the deep web. This broader term encompasses any part of the Internet that cannot be indexed by search engines, such as webpages beyond a personal login. The darknet's difference is that it's anonymous and inaccessible via a standard browser. Tor has become the most notorious darknet network, partly for its ability to circumvent governmental censorship, but mostly because of its hidden services. These are usually websites set up to only be accessible from connections routed through Tor encryption nodes from the Tor browser.

Unsurprisingly, hidden services tend to be organizations with a vested interest in anonymity, so you'll find The Pirate Bay has a hidden service on Tor, and the area of Wikileaks for uploading sensitive documents is also concealed here. More surprising is that Facebook also has a Tor service, though it's more for allowing oppressed Syrians to communicate with the outside world than to stop your bunnyboiler ex from tracking you down.

But the hidden service that really put Tor on the map is the now-defunct Silk Road. With its layered encryption, Tor is the perfect place for accessing the less wholesome things in life, and Silk Road was a global marketplace specializing in the drug trade. It may as well have been run by Walter White, but its actual creator, one Ross William Ulbricht, was caught and Silk Road got shut down. However, this wasn't down to weaknesses in the Tor network, but rather Ulbricht's sloppy promotion of Silk Road in open Internet forums being matched to an email address of rossulbricht@gmail.com. #Facepalm.

Total Pageviews

statcounter

View My Stats