New! Hot off the press - view the July 2021 content updates Read more!

avoidthehack! promotes online privacy and security awareness.

We believe you have the right to control and protect your data.

Privacy Browsers

Privacy browsers both respect your privacy and help prevent websites, web services, and web apps from tracking your browsing activity across the internet.

GO

Password Management

Your passwords hold the keys to your digital kingdom. Learn about password best practices and read up on password managers.

GO

Private Search Engines

Private search engines respect your privacy. They don't track you, create shadow profiles of you, or try to connect who you are to what you're searching.

GO

Tracker Blocking

Trackers follow you around the internet, gathering all kinds of data about your activities. Learn about different tracking techniques and the best way to defend against them.

GO

DNS Providers

Trusted DNS Providers provide DNS-over-HTTPS and other DNS security features while respecting user privacy. Learn about DNS resolvers and how selecting a privacy-centric resolver benefits your privacy.

GO

Operating Systems

The operating system is the command center of your entire device. Learn how popular operating systems are known to be not-so-privacy friendly and what you can do about this.

GO

Latest Posts

RSS

SnowHaze is a mobile privacy browser available on iOS. It boasts considerable features, including a built-in VPN.

It's independent from big tech companies, independently funded, and open source.

We'll examine what SnowHaze brings to the table in terms of privacy, security, and notable features.

...

Read More...

Passwords, passwords, passwords.

We have so many passwords to create and remember, don't we?

According to recent research conducted by NordPass, the average internet user has approximately 70 - 80 passwords to remember.

No matter how you try to slice it, that's a ton of passwords to memorize...

Read More...

Credential stuffing and brute force attacks are two common cyberattacks used to crack passwords and gain access to user accounts/information.

We're going to explore what credential stuffing and brute force attacks are and how they work.

Additionally we'll go over some tips for the best ways to...

Read More...

DuckDuckGo is a company that has been strongly associated with privacy since it's been around.

Their search engine doesn't track you. They have browser extensions (for the likes of Firefox and Google Chrome) for increased privacy.

One of DuckDuckGo's most recent privacy offerings is its mobile b...

Read More...

With the increasing popularity of NFC and RFID technology being used in smartphones as a method for delivering "wallet" payments and more credit cards use RFID technology, security issues arise.

How secure are they? Can't they be skimmed? What's th...

Read More...

CTRL C and then CTRL V.

(For the Mac users: COMMAND+C and then COMMAND+V.)

Familiar? That's how you copy and paste on a keyboard.

For your touchscreen device it's as simple as highlighting the text with your finger and tapping "Copy."

The copy and paste function across desktops and ot...

Read More...

I'M FEELING LUCKY

(Will take you to a random post)