TOTAL DIGITAL SECURITY

Guns, Gold, and VPNs.

August 06, 2017 | by Brad Deflin
Brad Deflin

"Government big enough to give you everything you want is big enough to take everything you have."  

The quote comes to mind when reading last week about Apple caving to China's demands that it stop selling VPNs on its App Store.  Like guns and gold, personal information and privacy are among today's tools of power and wealth.  Now, like traditional targets of individual freedoms, they too are under assault and the stakes are just as high.  

 guns gold vpns image.png

"When big government starts taking, it's time to start getting." 

This isn't a political forum, and Total Digital Security isn't engaged in the practice of politics.  But we believe in the right to privacy, and that privacy is fundamental to democracy.  And, we're driven by the notion that digital autonomy is increasingly vital to self-preservation for individuals and families.  But mostly, we're pragmatists that work in the field of personal cybersecurity.  

Individuals, families, professionals; people that want to protect their mainstream lives use our services to protect from cyber risk and control their digital footprint as much as they can.  So, when big government and big business align to take away personal rights, reduce digital autonomy for individuals,  and increase the level of cyber risk in our daily, mainstream lives, it gets our attention.

"Apple and China's action threatens not only individual rights fundamental to democracy, but existential risk and personal security too. "

 

NYTimes Wired Privacy VPN Apple China.png 

Our (pragmatic) response:

What's a VPN?  

Using the internet makes you naked for all to see.  

F-Securer_Freedome_iPhone_VPN.png

Using a VPN when on the internet makes you invisible, like a ghost floating about the vast World Wide Web.  

The magic is in the VPN's application of encryption.  When a VPN encrypts the user's online connection it protects her identity, location, activities, and intentions.  All are private and under the user's control.  Online banking, shopping, browsing, passwords, email - with a VPN it's encrypted and invisible, except to your final digital recipient.  

Not many years ago VPNs were still prohibitively expensive. They required lots of hardware and were exceedingly difficult to use, especially with a mobile device.  Now, VPNs comes in the form of an app.  They're affordable to most, made of software, and simple enough for personal, everyday use.  The only requirement from the VPN user is to keep the app "On" and perhaps change the server location when traveling abroad.

Through the application of encryption when online, VPNs deter cybercrime, reduce the user's digital footprint, and increase information privacy and control.  

Why does China feel threatened by VPNs?

See above.  

VPN technology is democratizing encryption, and encryption is a powerful tool for personal autonomy and freedom in the digital age.   

What's encryption?

The disappearing magic of a VPN is in its use of encryption, and it's encryption that is the actual target of Apple and China's censorship. 

Encryption jumbles and scrambles information making it unreadable without the keys to decrypt.  Digital encryption today uses big math and significant computational power to create codes that are infinitely complex and secure.  A VPN is the software vessel for which your online communications are encrypted from the point of leaving your internet-connected device to its intended digital recipient.

In the digital age, encryption empowers individual freedom and autonomy.  Like guns and gold, individual ownership and control of personal information is viewed as a primary threat to those bent on political control and economic manipulation.

Your survival and success in the digital age depend on encryption.  One day not far from now, a personal encryption code will be the master key to all of your kingdom.   We recommend taking every opportunity to learn about encryption, how to apply it with control to all aspects of your cyber-life, and to start getting comfortable demanding the keys to your digital self. 

A VPN is an ideal method of introducing encryption to your everyday life.  Using one on your smartphone deters most cybercrime like ID theft, online fraud, financial scams and the other digital crimes that are increasingly the target for all professional criminals around the world. 

Cyber_Risk_Education_human_evolution-273521-edited.jpg

Encryption - the Tool of the Digital Age

But most importantly - using a VPN prepares and positions you to benefit from the great innovation in encryption technology that is currently underhand.  

Not using a VPN and encryption gives all the advantage of evolvement to those that would do you most harm.  

How to chose the right VPN.

Maybe you've heard - choosing a VPN is tricky.  

Some actually look for "free" VPNs.  Not wise, just search "VPN fraud" to see why.  

Many factors come to play when choosing the right VPN for you:

  • The integrity of the operator.
  • The security protocols and standards employed.
  • Impact on connection speed and device operation.
  • Ease and reliability of use.
  • Location and access to servers.
  • Geography of the provider.

Geography?

Why geography matters.

Yes, geography.  The law of the land rules all and the location of a VPN provider can mean everything to the integrity of the operation.  The country's constitution and its protection of individual rights, the government's history of warrantless activity, cultural attitudes toward privacy; all should be evaluated when choosing the right VPN provider for you.  The best technology and protection is no match for a government set against individual freedoms and the liberty to choose.  

In the end, it's important to consider geography when evaluating anything relating to digital security.

How we can help.

Total Digital Security finds the best IT security technology available to anyone, anywhere, and makes it accessible, affordable, and easy to use for the rest of us.   We have years of experience evaluating products, services, operators, and sovereign jurisdictions as they apply to cybersecurity and digital autonomy for individuals and small groups.   

For more on the VPN we recommend, and how to get it:

VPN

Total Digital Security

It's what we do.

Topics: VPNs and Encryption

Search this site

Subscribe to Blog via Email