Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:52 PM
Dark Reading
Dark Reading
Products and Releases

Anonymous Browsing, Email Service Launched

ConnectInPrivate.com offers a five-step suite for guaranteeing privacy online

(TORONTO, ON) " Privacy means a lot to American consumers, but the dawn of online communication and web surfing has made it difficult to keep your personal information out of sight from prying eyes. ConnectInPrivate.com is leveling the playing field for online privacy by offering a comprehensive, multilayered suite of tools to keep PC and mobile browsing anonymous, email secure and PCs clean of personal data.

ConnectInPrivate.com leverages data centers in Toronto and Panama City where subscribers can connect to the internet using a secure VPN "tunnel." Since the user's connection is channeled through the ConnectInPrivate.com network, any person or company tracking your online activities is cut off from your IP address, providing completely anonymous surfing. The servers are secured by some of the industry's most top-notch hardware and network engineers.

Large engines like Google and Bing keep profiles of web surfers to target online marketing with more relevant ads. These profiles extend beyond browsing to email, which is an equally traceable medium in the online space. It's all based on tracking IP addresses, collecting data based on users' online habits and using that information without the user's consent. Regardless, ConnectInPrivate.com Network Architect James MacDonald believes that every consumer has a right to block his/her information.

"Back in the day, you'd have to get a warrant or a court order to access the private information of an individual, but now companies like Google are doing it all the time," said MacDonald. "What ConnectInPrivate.com is doing is attempting to give individuals they're inherent right to privacy back."

ConnectInPrivate.com offers a five-step suite for guaranteeing ultimate privacy online.

  • Anonymous Browsing " For online browsing activities, regardless of their nature, ConnectInPrivate.com's secure VPN (located in Canada) blocks outside entities from logging your IP address. Peer-to-peer (P2P) file sharing transfers more quickly because internet service providers can't "throttle" your IP address, and connecting from wireless hot-spots becomes less vulnerable to hacker attacks.

  • Secure Email " ConnectInPrivate.com's secure email servers are located in Panama City, Panama, allowing users to connect to email via an SSL connection or through a VPN. The platform is seamless, web-based and accessible from anywhere—giving it a huge advantage over application-based email that leaves information on your hard drive, where it can easily be accessed by hackers.

  • Mobile VPN for Smartphone Privacy " Leveraging much the same strategy as ConnectInPrivate.com's PC browsing VPN, this tool allows you to safely and securely access internet and email from your iPhone or Windows Mobile device.

  • PC Cleaner Software " Don't ever leave a crumb trail behind for hackers to follow towards your personal data. Files left on your computer that you may not be able to see or find can be used to uncover your private data. Think of PC Cleaner as shaking a virtual etch-a-sketch at the end of your browsing session " everything disappears. Wipes clean Windows operating system, Windows Applications (including the Microsoft Office suite) and browsers like Internet Explorer and Firefox, Opera, Safari, and Chrome.

    The full suite of Connect In Private solutions costs $8.33/month. For more information, visit www.connectinprivate.com.

    About Connect In Private Corp.

    Connect In Private is a network services provider and international software development company working to bring privacy back to the online activities of consumers. Offering secure VPN services for anonymous surfing, offshore email and SMS, smart phone privacy, web-based secure meeting platforms and more, Connect In Private's full suite of solutions leverages industry-best network hardware, engineers, administrators and providers for total online anonymity. For more information, visit: www.connectinprivate.com.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    FluBot Malware's Rapid Spread May Soon Hit US Phones
    Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
    7 Modern-Day Cybersecurity Realities
    Steve Zurier, Contributing Writer,  4/30/2021
    How to Secure Employees' Home Wi-Fi Networks
    Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-05-06
    Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the...
    PUBLISHED: 2021-05-06
    A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gai...
    PUBLISHED: 2021-05-06
    emlog v5.3.1 and emlog v6.0.0 have a Remote Code Execution vulnerability due to upload of database backup file in admin/data.php.
    PUBLISHED: 2021-05-06
    ** UNSUPPORTED WHEN ASSIGNED ** The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode wh...
    PUBLISHED: 2021-05-06
    Stormshield SNS with versions before 3.7.18, 3.11.6 and 4.1.6 has a memory-management defect in the SNMP plugin that can lead to excessive consumption of memory and CPU resources, and possibly a denial of service.