Tech News Center
CBU TECH MINUTE Samsung announced a plethora of new products at its Unpacked event in San Francisco this week, so you can imagine what’s being discussed on today’s Vergecast. The much-anticipated Fortnite World Cup is finally happening this summer — and there’s going to be a lot of money up for grabs. Developer Epic detailed the upcoming e-sports event, which will culminate in a final tournament at an undisclosed location in New York from July 26th to the 28th. Photoshopping a meme is easy. But hunting through thrift stores, finding the perfect action figure to Frankenstein with another toy, designing and packaging it into a slightly off but believable product, and sneaking it onto a store shelf takes a little bit more work. Since 2015, Jeff Wysaski has been making fake signs and toys and leaving them out in the real world for people to find. Two-factor authentication is a good way to add an extra layer of security to online accounts. It requires the use of your smartphone, however, which is not only inconvenient, but it can be a problem if your phone is lost or breached. Hardware security keys can offer an extra layer of security to password-protected online accounts and, in turn, your identity. Security keys connect to your system using USB-A, USB-C, or Bluetooth, and they are small enough to be carried on a keychain (with the exception of Yubico’s USB-C nano key, which is so small that it’s safest when kept in your computer’s USB port).

How-to stay anonymous online(Not just for browsers)
February 22, 2019

Every app produced by every company today wants data on the consumers using their products. Most apps today track everything from your ISP and your location, to what kind of device and browser you are using at the time. There are many apps that either ask for your location or other data, or simply collect it via the IP address you are connecting with at the time, whether you allow it or not.

So how can you remain as anonymous as possible, and keep your location among other information a secret, without losing any functionality? The answer is TOR!

Tor or The Onion Router, is a network that enables a user to stay anonymous on the internet, and get rid of any possible surveillance, location tracking, and etc. Tor is perhaps the most popular and secure option available for anonymous internet connectivity. Tor works on the concept of ‘onion routing’ method in which the user data is first encrypted and then transferred through different relays present in the Tor network, thus creating a multi-layered encryption (layers like an onion), thereby keeping the identity of the user safe.

You can then access the Tor network with the help of a modified Mozilla Firefox ESR web browser, the most commonly used being simply TorBrowser itself. The Tor browser is available for various desktop operating systems including Windows, Android, Linux, and MacOS.

Android users, don\'t worry... there are apps for your devices as well. OrBot is an app that puts your entire Android device onto the TOR network. OrFox is a popular browser that uses the TOR networks, and can be set to do so exclusively by requiring you to have OrBot running already. Of course, you can also use the previously discussed Tor Browser for Android as well.

Get Tor Browser

The Tor Project Inc. has released Tor Browser, a modification of Mozilla Firefox. Tor Browser removes browsing history & cookies after every use, reducing the risk of tracking.

Other than providing anonymity to standalone users, Tor can also provide anonymity to websites and servers in the form of Tor Hidden Services. Also, P2P applications like BitTorrent can be configured to use the Tor network and download torrent files.