A virtual private network (VPN) like Perfect Privacy is used to encrypt all Internet traffic and protect the privacy of the user. But be careful: If the VPN connection has a leak, your privacy is in danger. But how can you detect and prevent VPN leaks? What is a VPN leak? When using a VPN you appear on the Internet […]

[read]
 

Soon it will be Christmas! This year there will be great prices again: One Vilfo VPN router, two Linksys WRT3200ACM AC3200 DD-WRT router and two eBlocker Pro with a one-year license. All prices also include a one Perfect Privacy account valid for one year. The devices are kindly provided by our partners Vilfo *, FlashRouters * and eBlocker. But that’s […]

[read]
 

Cyber-stalking is a threat just like stalking in real life. Stalking is a method of harassing, threatening or even blackmailing people. This type is a typical cyber crime and therefore it is often difficult to defend against. Once a perpetrator has access to his victim’s user accounts – such as email, messenger, or social media accounts – he has an […]

[read]
 

If you want to send and receive GPG-encrypted emails in Thunderbird, there is no way around the Enigmail encryption plugin. We have recently become aware of a potential problem in Enigmail, whereby the user’s IP address is revealed to the recipient of an email. It affects Enigmail 2.0 and later. As soon as you compose a new email and enter […]

[read]