Hot! Looking for easy-to-see information on privacy browsers? Enter the Privacy Browser Comparison Tool (ver 1.6)! Try it out!

avoidthehack! promotes online privacy and security awareness.

We believe you have the right to control and protect your data.

Security 101

Basic cybersecurity principles intersect with online privacy; improving your security has an effect on privacy.

GO

Privacy Tools

There are a number of different methods, services, and tools you can use to improve your privacy.

GO

Services

Avoidthehack provides hosted instances/services to help you maintain and improve your privacy online.

GO

  • The Best PiHole Blocklists (2022)

    These are the sources to find some of the best and most maintained Pi-Hole blocklists available.

    Read More
  • Browsers

    Search

    DNS

    OS

    Adblock

Search avoidthehack!Type something like "privacy browsers"

Latest Posts

RSS

Avast's "Secure browser" has been around for a while now.

Once a bundled feature with the premium version of its famous antivirus, Avast's Secure Browser is now a (free) standalone product.

Of course, the question of just how "secure" and "private" this browser truly is remains to be seen.

Let...

Read More...

As you may or may not know, Facebook is notorious for buying out competition.

This is especially true when that competition is something they can't beat outright or poses a serious threat to "their market." Instead of competing, they whip out their wallet and fork over cash.

Not to mention, y...

Read More...

Out of the "big" and "mainstream" browsers, which include the likes of Google Chrome and Microsoft Edge, Safari is slightly more secure.

This how-to guide will show you how to increase your data privacy and security while using Safari.

I'll also be sure to keep in mind the delicate balance of se...

Read More...

Credential stuffing and brute force attacks are two common cyberattacks used to crack passwords and gain access to user accounts/information.

We're going to explore what credential stuffing and brute force attacks are and how they work.

Additionally we'll go over some tips for the best ways to...

Read More...

I'M FEELING LUCKY

(Will take you to a random post)