• Macs are still missing these three software features from the iPad
    9to5mac.com
    In recent years, iOS and macOS have been closer than ever to having feature parity. Nowadays, macOS releases mostly bring features first introduced on the iPhone and iPad, occasionally adding a new twist. However, despite this feature parity, there are some gaps, mostly to do with customization. Here are a couple of recent customization additions that have been made on the iPhone and iPad that havent quite made their way to the Mac yet.Lock Screen customizationWith iOS 16 (and subsequently, iPadOS 17), Apple introduced lock screen customization on the iPhone and iPad, allowing users to add custom widgets to the lock screen, customize their font, and more. It was beautiful, but this level of customization never came to the Mac.With macOS Sonoma, Apple did redesign the Lock Screen on macOS a little bit, but not to the same degree as the iPhone and iPad. There were no widgets, nor font customization. It lacked the pizazz of the aforementioned lock screen redesigns.So, if Apples looking for ideas for next years macOS itd be really nice to see true lock screen customization, just like the rest of the ecosystem.App Icon customizationWith iOS and iPadOS 18, Apple introduced dark mode and tinting options for app icons, allowing users to sort of theme their iPhone home screens. While some users dont necessarily love the tinted icons, I do and its just an option.However, that isnt the whole story. Even before iOS 18, app developers always had the ability to allow users to change the default app icon on iOS, completely natively no shortcuts hack required. macOS does have the ability to allow typical app icon customization, but it isnt as common as it is on iOS and iPadOS.Its unlikely that app icon customization on macOS would become nearly as prominent as it is on iOS, but itd be pretty cool to see features like this come to the Mac.Control Center customizationIn Apples latest releases, iOS 18 and iPadOS 18, we received a Control Center overhaul, allowing third party apps to add toggles to Control Center, and also allowing users to mostly rearrange Control Center as they please. Before getting to nice to have ascetics,How about missed usability features like auto sizing to the largest file name in file view. I have about a dozen other enhancements to add to this list that would make using MacOS better. View all commentsAnd, as is the case for everything else on this list, macOS is missing this same level customization. In macOS Big Sur, Apple did introduce Control Center on macOS, but its been left mostly untouched since its release over four years ago. I wouldnt anticipate the same level of rearrangement as you can achieve on iOS, but some third party integration would be sweet.My favorite Mac accessories on Amazon:Follow Michael:X/Twitter,Bluesky,InstagramAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comentários ·0 Compartilhamentos ·17 Visualizações
  • World's Largest Lithium Ion Plant Catches Fire in California
    futurism.com
    This is so much worse than an e-bike fire. Scorched IonHundreds of miles north of a scorched Los Angeles, a massive lithium-ion battery facility has caught fire and it wasn't the first time the plant has had issues.As Monterey's KSBW reports, the Moss Landing plant which is owned by a Texas company called Vistra Energy and billed as the largest lithium-ion storage facility in the world caught fire earlier in the week, leading to both the plant itself and the surrounding area being evacuated.Lithium-ion battery firesare, as anyone who lives in an e-bike-riddled city knows by now, notoriously difficult to put out.The dense energy storage units, which power everything from cell phones to electric vehicles, can go up in flames in a phenomenon known as "thermal runaway," which is a chain reaction in which one battery cell overheating can trigger others near it to do the same. As such, the fires essentially re-ignite themselves, and firefighters have learned to let these fires partially die down on their own rather than using copious amounts of water that often won't put a dent in these blazes.Because of the outrageous amount of water it would have taken to douse the blaze at Moss Landing, firefighters initially stood down from the inferno, which died down before reigniting in the aftermath of the first blaze an epic local disaster, and the latest sign that the transition to green energy isn't always free of grave industrial catastrophes.Where There's SmokeVistra told KSBW that the cause of the fire is not yet known, and won't be until it can conduct an investigation post-blaze. As the local broadcaster noted in subsequent reporting, however, the plant has been plagued by malfunctions for years.Just a year after it opened in 2020, local firefighters were called to the plant after a battery overheating incident caused the facility to fill up with smoke. Ultimately, Vistra announced in January 2022 that an issue with its liquid cooling hoses led to some smoke inside the facility. Less than a month after that investigation was completed, another meltdown at Moss Landing led to firefighters being again called out to the plant, KSBW reports.While the plant has been able to come back online relatively shortly after those incidents, it's unlikely Vistra will be back in business anytime soon given that roughly 75 percent of the facility has been burned.Described by local officials as both a "worst-case scenario" and a "wake-up call," there have thankfully been no injuries or deaths attributed to the Moss Landing plant fire but long-term damage from the toxic fumes emitted by the flames could be waiting for locals down the line.Share This Article
    0 Comentários ·0 Compartilhamentos ·17 Visualizações
  • What Happens if AI No Longer Has Access to Good Data to Train On?
    www.informationweek.com
    TechTarget and Informa Techs Digital Business Combine.TechTarget and InformaTechTarget and Informa Techs Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.What Happens if AI No Longer Has Access to Good Data to Train On?What Happens if AI No Longer Has Access to Good Data to Train On?As new policies on privacy take hold, it might change the availability of data AI can train on.Joao-Pierre S. Ruth, Senior EditorJanuary 17, 2025In a world dominated increasingly by AI, access to relevant data becomes paramount -- but what if such streams of information dry up?Regulators at state, national, and international levels continue to watch how businesses capture and use data that could be used to train AI. If restrictions emerge that cut off access to data that AI needs, would the technology stall out despite its promises of innovation?Alternatives such as synthetic data exist, but are they sufficient to properly train AI and deliver results that actually matter to operations?This episode features Shobha Phansalkar, vice president of client solutions and innovation for Wolters Kluwer; Olga Megorskaya, founder and CEO of Toloka; Pete DeJoy, co-founder and senior vice president of product for Astronomer; Melissa Bischoping, senior director of security and product design research at Tanium; and Omar Khawaja, Field CISO, Databricks.They discussed types of data that is necessary and relevant for training AI, how organizations might determine if data is useful or simply junk, what happens if policy stonewalls data access, and whether or not AI simply dies without data.Listen to the full podcast here.About the AuthorJoao-Pierre S. RuthSenior EditorJoao-Pierre S. Ruth covers tech policy, including ethics, privacy, legislation, and risk; fintech; code strategy; and cloud & edge computing for InformationWeek. He has been a journalist for more than 25 years, reporting on business and technology first in New Jersey, then covering the New York tech startup community, and later as a freelancer for such outlets as TheStreet, Investopedia, and Street Fight.See more from Joao-Pierre S. RuthNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports
    0 Comentários ·0 Compartilhamentos ·15 Visualizações
  • OnTheGoSystems: Senior PHP / AWS Developer for System Optimization
    weworkremotely.com
    OntheGoSystems is hiring a senior developer to optimize our WordPress sites for availability and cost on Amazon ECS. Our sites serve 250,000+ clients who expect 24/7 availability. Downtime or slow performance affects our revenue, reputation, and hosting costs.Your MissionMigrate our WordPress sites to AWS ECS and continuously optimize performance and costs. Youll handle issues, investigate root causes, and implement solutions to prevent recurrence.Most of your time will focus on improving system efficiency, enhancing client experience, and reducing expenses. Youll collaborate with our IT and code teams, combining DevOps and development work to resolve bottlenecks and ensure smooth operations.Must-Have SkillsStrong PHP expertiseMySQL query optimizationWordPress experienceProven AWS experience, including ECSPerformance profiling and debugging skillsUptime monitoring and alert setupGit proficiencyNice-to-Have SkillsConfiguring high-performance web servers (NGINX)Load and stress testing (e.g., k6)Writing End-to-End testsCI configuration and managementWhat We Offer100% remote workSupport for hobbies and physical activities (BAMM program)Computer budget for a better workspaceKindle and access to our Amazon accountRest on your national holidaysWork with a global team of smart, driven individualsOpportunities for growth and developmentReady to join? Apply today we look forward to meeting you! Related Jobs See more Back-End Programming jobs
    0 Comentários ·0 Compartilhamentos ·17 Visualizações
  • 10 of the Best Peacock Shows to Stream Right Now
    www.cnet.com
    Peacock's supply of original series continues to grow, offering more choices when TV time rolls around. You can catch up on season 3 of the cutthroat reality competitionThe Traitorsor binge the buzzy Eddie Redmayne assassin series The Day of the Jackal. There are lots of highly rated options to consider.Here are 10 standout TV series to help you make the most of your streaming subscription. Each of them scores around 70 or higher on Metacritic. Peacock costs $8 per month or $80 per year for the ad-supported version, but eligibleComcast and Instacart subscriberscan stream for free.Read more:Don't Quit These Streaming Services Just Yet in January James Dittiger/Peacock Laid (2024- ) Fans of Everything Everywhere All at Once star Stephanie Hsu can watch the actress tackle a mystery in this eight-episode dark comedy. Hsu plays a 30-something woman who learns that her exes are dying, and she has to inform her past lovers and attempt to figure out the cause. Girls actress Zosia Mamet stars as her helpful, true crime-loving best friend. Euan Cherry/Peacock The Traitors (2023- ) Threeseasons of deception in, The Traitors' mix of reality TV personalities, creative challenges and secret identities is still extremely enjoyable. Based on the Dutch reality series De Verraders, the show rounds up cunning game-players who try to win a cash prize by succeeding in challenges and identifying the "traitors" among them. Any backstabbers in the group that aren't outed in time take all the moolah. See at Peacock Marcell Piti/Carnival Film & Television Limited The Day of the Jackal (2024- ) If a 10-episode show with Oscar-winning actor Eddie Redmayne, elaborate assassinations and a cat-and-mouse game sounds like a binge you want to go on, this thriller awaits on Peacock. Redmayne plays an assassin who can hide his identity like a chameleon and execute targets from more than two miles away. Lashana Lynch also stars as a British intelligence officer attempting to stop him. You can look forward to a second season of the show, which reimagines the 1971 novel and 1973 film of the same name. See at Peacock Peacock Poker Face (2023- ) What if you could always tell when someone is lying? That's the talent possessed by Natasha Lyonne's Charlie in Poker Face, a 10-episode detective series created by Knives Out writer and director Rian Johnson. Each episode introduces a crime and wraps things up before the next entry starts. With the charisma of Russian Doll star Lyonne and an eye-popping list of guest stars such as Adrien Brody, Chlo Sevigny and Rhea Perlman, Poker Face is thrilling, addictiveTV. See at Peacock Rutherford Falls (2021-22) Ed Helms of The Office, The Hangover and other beloved comedies stars in this sitcom focused on the small town of Rutherford Falls. Helms plays Nathan, a descendant of the town's founder, and an advocate for his family history. The show is charming and funny (even as it tackles weighty subjects) and it's also been lauded for its Indigenous representation on-screen andin the writer's room. See at Peacock Peacock We Are Lady Parts (2021- ) This British comedy spotlighting an all-female Muslim punk band is extremely fun and boasts a cast of talented young people. The series kicks off introduces 26-year-old Amina, a secretly skilled yet shy musician. Enter Lady Parts, an uber cool group in need of a new guitarist. Time spent with these ladies flies by, making We Are Lady Parts a Peacock pick worth your streaming hours. See at Peacock Peacock/Screenshot by CNET The Resort (2022- ) If you're a sucker for resort-set TV shows that will get you speculating (White Lotus season 3 can't come soon enough), you should check out this Peacock series. Cristin Milioti and William Jackson Harper star as a married couple who begin to explore the disappearances of two young people more than a decade earlier. Pack a trunk for paradise and get ready for the twisty story to take hold. See at Peacock Peacock Mrs. Davis (2023- ) Artificial Intelligence is inescapable these days, so no wonder it's a major part of a Peacock series. The show follows a nun (not named Mrs. Davis) who tries to take down an all-powerful AI (named Mrs. Davis). For a wild show with lots of ideas, don't miss this risk-taking, globe-trotting Peacock series. See at Peacock Peacock Dr. Death (2021- ) Wondery's popular 2018 true crime podcast Dr. Death led me to think in disbelief, "How didnobodyput a stop to this guy?" Watching Peacock's TV adaptation of the podcast is a similarly maddening affair. Christopher Duntsch, a Dallas neurosurgeon, killed two patients he operated on andinjured 31 others. Watch for a captivating, spine-chilling tale about a surgeon's horrific crime spree that lasted far longer than it should have. See at Peacock NBC Parks and Recreation (2009-2015) No, it's not an original Peacock series. But I'd be doing anyone reading this a huge disservice if I didn't mention that the seven-season sitcom focused on the zany occupants of Pawnee, Indiana, has a home on Peacock. This goofy, big-hearted show has drawn genuine belly laughs out of me countless times. It's buoyant, witty and just as good on rewatch. The point is, you'll want to keep this one handy for a mood refresh when you can't get creepy Dr. Death and his spooky scalpel out of your head. See at Peacock More TV recommendations
    0 Comentários ·0 Compartilhamentos ·16 Visualizações
  • Nintendo reveals what it thinks is "the best direction" for Switch 2
    www.eurogamer.net
    Nintendo reveals what it thinks is "the best direction" for Switch 2Go best.Image credit: Nintendo News by Vikki Blake Contributor Published on Jan. 18, 2025 Nintendo believes that "the best direction" for Switch 2 is to ensure players are "able to play their already purchased Nintendo Switch software on the successor".In the absence of any other studio coming forward to confirm they were developing games for Switch 2, Game File asked Nintendo to expand on what third-party developers it was working with. The reply didn't really address the question at hand, but did provide a little insight into Nintendo's view of backwards compatibility.To see this content please enable targeting cookies. Nintendo Switch 2 and Mario Kart 9 have been revealed - but questions remain.Watch on YouTube"Nintendo Switch is played by many consumers, and we decided that the best direction to take would be for consumers to be able to play their already purchased Nintendo Switch software on the successor to Nintendo Switch," the company said."As a result of that thinking, Nintendo Switch 2 plays Nintendo Switch 2 exclusive games, as well as both physical and digital Nintendo Switch games."Certain Nintendo Switch games may not be supported on or fully compatible with Nintendo Switch 2. Details will be shared on the Nintendo website at a later date."It's still not yet clear what "may not be fully compatible" means or what games won't make the cut. But the statement does, at least, intimate that Nintendo is acutely cognisant of the importance of backwards compatibility for players moving between Switch and Switch 2. Whilst Switch was not backwards compatible with Wii or Wii U, Wii U was backwards compatible with Wii games, just as the Nintendo 3DS was also able to run DS cartridges.Here's everything we know so far about Nintendo Switch 2. It was finally revealed this week after months of rumours, leaks and speculation, with the first-look trailer showcasing the console's design - which is larger than its predecessor - its revised dock, and the first game revealed for the system - a brand new Mario Kart.
    0 Comentários ·0 Compartilhamentos ·16 Visualizações
  • Blender 4.3 for Beginners Workshop [$]
    www.blendernation.com
    Blender 4.3 for Beginners Workshop By Allan Brito on January 18, 2025 Training Videos Learn how to use Blender 4.3 to start workin with 3D Modeling, Animation, Texturing, and Rendering for Beginners with this new course by Allan Brito.If you're looking for an updated resource to learn Blender from scratch, I'm proud to announce a new training resource from Blender 3D Architect. The Blender 4.3 for Complete Beginners workshop provides a comprehensive overview of Blender, specifically designed for people who have never used the software before. The workshop explains and demonstrates various aspects of Blender: UI Management Add-On Implementation 3D Modeling (Covering Meshes, Curves, and Geometry Nodes) Materials and Textures Lights and Cameras Rendering (Cycles and EEVEE) Animation Video Editing. This introductory workshop features nearly 14 hours of video content packed with examples and downloadable project files. Available through Udemy, it offers lifetime access to all materials. You can visit the workshop page to watch a brief trailer that showcases some of the projects and lessons covered in the course.For more details, visit the Blender 4.3 for Beginners page.
    0 Comentários ·0 Compartilhamentos ·15 Visualizações
  • Once high-flying proptech startups Divvy Homes and EasyKnock are the latest to struggle
    techcrunch.com
    Many proptech startups, born and funded during the low-interest-rate heydays, are in the throes of struggle. With investments into U.S.-based real estate startups falling from $11.1 billion in 2021 to $3.7 billion last year, according to PitchBook data, some are selling themselves off, while others are closing shop.The two most recent examples are the latest casualties of a challenging interest rate environment and the years-long slowdown in real estate fintech funding.Rent-to-own proptech startup Divvy Homes is being acquired in a fire sale by Charleston, South Carolina-based Maymont Homes, Fast Company reported last week. Maymont is a division of Brookfield Properties.EasyKnock abruptly shut down, NPR reported last month. This closure followed several lawsuits filed against the proptech company and an FTC consumer alert about its controversial sale-leaseback models, which involved buying homes from the owners and simultaneously leasing the homes back to them.While 9-year-old Divvy declined comment, a source familiar with the matter confirmed to TechCrunch that Divvy is having conversations with Brookfield and is close to signing a purchase agreement. This person disputed that the acquisition was a fire sale. However, neither the company nor the source shared how much Brookfield could pay for Divvy, so its not yet clear if the price is a bargain or a boon.Its sale, fire or not, isnt entirely a shock. Signs of trouble began appearing at Divvy in 2022, when the company began laying off staff. By November 2023, Divvy had conducted its third layoff in a years time.The once-buzzy startup had raised more than $700 million in debt and equity from well-known investors such as Tiger Global Management, GGV Capital, and Andreessen Horowitz (a16z), among others. Divvys last known funding occurred in August 2021 a $200 million Series D funding led by Tiger Global Management and Caffeinated Capital at a $2 billion valuation. The Series D round was announced just six months after a $110 million Series C. Divvy Homes last known valuation was $2.3 billion in 2021, according to PitchBook.EasyKnock, a startup that billed itself as the first tech-enabled residential sale-leaseback provider, was founded in 2016 and had raised $455 million in funding from backers, including Blumberg Capital, QED Investors, and Northwestern Mutuals corporate venture arm, according to PitchBook data. Approximately $200 million of that capital was in a form of debt that allowed the company to buy the homes, according to a person familiar with the startup.So what went wrong?In its heyday, Divvy Homes claimed to be different from other real estate tech companies because it worked with renters who wanted to become homeowners by buying the home they wanted and renting it back to them for three years while they built the savings needed to own it themselves, it said.But the Federal Reserve began raising interest rates in 2022 on a mission to curb inflation. For companies like Divvy Homes, which purchased homes as part of its business model, high rates were devastating, limiting its ability to purchase homes and make money off those buys.EasyKnocks business model also involved buying homes and renting them. But its arrangement attracted homeowners with poor credit scores because it gave them access to quick cash, along with the option to repurchase the home at a future date.High interest rates also hurt it, as it took on debt to finance its operations, sources familiar with the company told TechCrunch. But EasyKnock had additional problems. More than two dozen lawsuits were filed against EasyKnocks, and Michigan attorney general alleged that the company used deceptive practices by purchasing homes from those in financial stress at low prices and then charging them high rents.According to our sources, EasyKnock was insolvent when it shut down, overburdened by debt.And with interest rates still relatively high, and funding still difficult to come by, we can likely expect more of this type of news from the real estate fintech space in the coming months and perhaps for all of 2025.Are you aware of a proptech startup in trouble? Contact Mary Ann at maryann@techcrunch.com or via Signal at 408.204.3036 or Marina.temkin at techcrunch.com.
    0 Comentários ·0 Compartilhamentos ·17 Visualizações
  • Fake job interview emails installing hidden cryptocurrency mining malware
    www.foxnews.com
    Published January 18, 2025 10:00am EST close 'CyberGuy': The FBI's new warning about AI-driven scams that are after your cash Kurt Knutsson discusses some tips to keep you safe. The job market hasnt been great in the last few years, especially in tech, leaving a lot of people actively looking for jobs.Scammers are taking advantage of this. They have come up with a new trick where they pretend to be recruiters to spread crypto miners on peoples devices.It starts with an email inviting the person to schedule an interview for a job. But when they click the link, it installs a malicious app that secretly mines cryptocurrency.This app hijacks your PCs resources, like the CPU and GPU, which slows down its performance significantly. A person typing on their laptop. (Kurt "CyberGuy" Knutsson)What you need to knowThis malicious campaign begins with an email that tricks victims into thinking it is part of a recruitment process, as reported byDark Reading. In most cases, these emails are pretending to be from recruiters at the cybersecurity company CrowdStrike.The fraudulent email contains a link claiming to take the recipient to a site where they can schedule an interview. However, in reality, it redirects the victim to a malicious website that offers a download for a supposed "CRM application."WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The site provides download options for both Windows and macOS. Regardless of which option the victim selects, the download will be a Windows executable written in Rust. This executable then downloads the XMRig cryptominer.The executable performs several environmental checks to analyze the device and avoid detection. It scans running processes, checks the CPU and more. If the device passes these checks, the executable will display a fake error message while secretly downloading additional payloads needed to run the XMRig miner. Fake CrowdStrike job application download. (CrowdStrike)How does a cryptominer affect your PC?A cryptomining app can significantly impact your PCs performance. Once installed, it hijacks your computer's resources, including the CPU and GPU, to secretly mine cryptocurrency. This process requires a lot of computational power, which can cause your system to slow down drastically. You might notice your computer becoming unresponsive, running hotter than usual, or consuming more power.In some cases, prolonged use of cryptominers can also lead to hardware damage due to the increased strain on your components. Additionally, these miners often run in the background without your knowledge, making it harder to detect the issue until the damage is already done.CrowdStrike is aware of the scam and advises individuals to stay vigilant."This campaign highlights the importance of vigilance against phishing scams, particularly those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files," thecompany said in a blog post."Organizations can reduce the risk of such attacks by educating employees on phishing tactics, monitoring for suspicious network traffic and employing endpoint protection solutions to detect and block malicious activity."GET FOX BUSINESS ON THE GO BY CLICKING HERE People working on their laptops. (Kurt "CyberGuy" Knutsson)5 ways to stay safe from job interview scams1. Check if you applied for the job: If you receive an unsolicited interview invitation, think back to whether you actually applied for that job or company. Scammers often target jobseekers randomly, hoping someone takes the bait. If you didn't apply, it's likely a scam. Always confirm directly with the company before proceeding.2. Verify recruiter credentials:Always double-check the recruiters details before responding to an email or clicking any links. Verify their email address, LinkedIn profile and company association. Legitimate companies will use official email domains, not free services like Gmail or Yahoo.3. Avoid downloading unsolicited files:Be cautious of emails asking you to download any files or applications. Legitimate recruitment processes rarely require you to install software. If unsure, contact the company directly to confirm the request.4. Inspect links before clicking:Hover over any links in the email to see their actual URL. Scammers often use URLs that mimic legitimate sites but have subtle differences. If a link looks suspicious, avoid clicking on it.5. Use strong antivirus software:Use strong antivirus or endpoint protection software to detect and block malicious downloads. Regularly update your security tools to ensure they can handle new threats effectively.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurts key takeawayCybercriminals always manage to come up with new ways to exploit people. While this particular scam is more focused on using your computers resources than stealing data, it is still very dangerous. It shows that if a hacker can easily install software on your PC, they can also go ahead and steal your financial information and other personal data. Always verify the emails you receive, and try not to download anything you dont trust.Have you ever received a suspicious email that looked like a job offer? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comentários ·0 Compartilhamentos ·16 Visualizações
  • You need a router-based VPN in 2025. How why and how to set one up
    www.zdnet.com
    BlackJack3D/Getty ImagesVirtual private networks are no longer just for tech enthusiasts and privacy buffs -- they've become an essential tool for navigating a more restricted internet. VPNs offer a lifeline to digital freedom and security, from bypassing censorship to securing data from prying eyes. In the US, legislation in several states has blocked adult websites orplacedthem behind strict age gates. Regional policies limit access to various types of content, including streaming services and political materials. As more sites and services become geographically restricted, more individuals are using VPNs to bypass these blocks, protect their digital freedoms, and safeguard their data. Beyond unblocking adult websites or region-locked media, many users worry about government surveillance, data retention laws, and the sale of personal browsing data by ISPs. A VPN addresses these privacy risks by encrypting your traffic and masking your IP address. However, a VPN alone may not provide a comprehensive solution for network security or privacy concerns. To truly safeguard your data and enhance network privacy, combining a VPN with robust protocols like WireGuard and integrating them into advanced hardware setups (such as Firewalla and others mentioned below) can make a significant difference. Also: How AI will transform cybersecurity in 2025 - and supercharge cybercrimeThis guide outlines how to pair the open-source WireGuard protocol with Proton VPN, a Swiss-based provider celebrated for its strong privacy policies, and to integrate them into router-based setups for entire-network coverage. I'll also explore advanced techniques like policy-based routing, IP passthrough, zero-trust segmentation, and even building your firewall router on Linux or FreeBSD. Understanding VPN protocols and WireGuard Many commercial VPNs (ExpressVPN, NordVPN, etc.) rely on proprietary protocols that often lock users into specific apps. For example, NordVPN'sNordLynx protocol is based on WireGuard but deviates from the standard implementation. It does not use standard WireGuard .conf files for direct use on routers. Instead, NordVPN (and ExpressVPN) employs the older OpenVPN protocol for router configurations, which is less performant and more complex to set up. In contrast, WireGuard provides a refreshing alternative with an open-source design, a tight codebase (4,000 lines total), and notably high performance. Its modern cryptographic methods and lean architecture result in lower latency and faster speeds than legacy protocols like OpenVPN or IPSec, making it an excellent fit for bypassing region locks, streaming content, or engaging in latency-sensitive tasks like gaming. Example of a simple WireGuard configuration (.conf) file created by Proton VPN's download portal. Screenshot by Jason Perlow/ZDNETWireGuard's key management is also straightforward and highly efficient. Each peer -- whether a router, laptop, or smartphone -- is assigned a public/private key pair, eliminating the need to manage complex certificates. This simplified design reduces the overall attack surface and eases auditing, as fewer lines of code typically mean fewer potential vulnerabilities. Notably, you can install WireGuard on a router (rather than on each device in your network), allowing all network traffic to pass through the secure tunnel without managing separate VPN clients or profiles on individual computers or mobile devices. This router-based approach is especially valuable for environments where multiple devices -- from personal laptops to IoT gadgets -- must be secured, as it centralizes the VPN configuration and simplifies network-wide encryption. Legal and ethical disclaimer Using VPNs to bypass regional blocks or consume restricted content may be unlawful in certain jurisdictions. VPNs bolster privacy but do not guarantee total anonymity. If you evade local laws concerning adult content, abortion information, or other regulated material, understand there may be legal consequences. Always research your VPN provider's logging policies -- some free solutions log user data or inject malware, compromising rather than enhancing user privacy. WireGuard VPN providers Although this article primarily showcases Proton VPN for its transparent WireGuard .conf files (no proprietary lock-in), strong no-log policy, and free vs. paid plan structure, many other reputable VPN providers offer WireGuard configuration files for router-based setups. These include: Mullvad An independent, Swedish-based VPN service run by Mullvad VPN AB. Mullvad is praised for its no-email registration, strict no-logs policy, and the option to pay anonymously in cash or cryptocurrency.CyberGhost Part of Kape Technologies, which owns ExpressVPN, Private Internet Access (PIA), and ZenMate. CyberGhost is known for specialized servers (streaming, torrenting) and user-friendly apps.Private Internet Access (PIA) Another Kape Technologies brand, recognized for its large server network, advanced configurations like split tunneling, and its built-in ad/malware blocker ("PIA MACE").Surfshark Now under the Nord Security umbrella (following a 2022 merger), Surfshark is popular for unlimited device connections, ad/malware blocking ("CleanWeb"), and relatively budget-friendly pricing.Many of these services let you select a server in their portal or app and generate a .conf file for WireGuard, which you can then import into your router. The basic steps -- choosing a region, downloading the configuration, and applying it -- are similar to those we'll follow with Proton VPN below. Why Proton VPN? Proton VPN was founded in 2017 by the team behind Proton Mail, the world's largest secure email service. Operated under the Swiss-based, non-profitProton Foundation, Proton VPN prioritizes user privacy over profit-driven motives, similar to theSignalmessaging service. Its structure ensures that no shareholders or external investors influence its mission, maintaining a focus on privacy and security.Proton generates revenue through paid subscription plans to sustain its services, but it remains a not-for-profit organization governed by the Proton Foundation. This unique approach allows Proton to regularly publish transparency reports, invest in independent security research, and avoid corporate ownership by large VPN conglomerates. Proton VPN is a compelling choice for users seeking privacy-first, router-friendly configurations. Even on the free tier, Proton VPN delivers reliable and fast connections. Its focus on privacy extends to its router-friendly WireGuard configurations, which are transparent and free of proprietary lock-in. Proton VPN's tiered Free and Paid plans cater to a broad range of needs.PlanFreePaidServer Locations 35 countries (limited) 110 countries (city-level selection) Speed Decent, not guaranteed Often near max ISP speeds, priority servers Advanced Features Basic NetShield (ad block) Full NetShield, multi-hop, Secure Core Devices 1 device 10+ devices (tier-dependent) Performance ~5070% of ISP bandwidth Potentially close to full ISP bandwidth Step-by-Step: Using WireGuard on Proton VPN Step 1: Create a Proton VPN account Visit ProtonVPN.com and click Get Proton VPN Free.Choose a Free or Paid plan, depending on your needs.Verify your account via email.Log in to your Proton VPN dashboard once your account is confirmed. Proton VPN's download portal. Jason Perlow/ZDNET Step 2: Generate your WireGuard configuration Go to Downloads (or the WireGuard Configuration section) in your Proton VPN dashboard.Enter a descriptive name for your configuration in the "Device/certificate name" field, such as "ZDNET Test Router."Choose Router (or whichever platform you're setting up).Configure NetShield (ad/malware blocker) by selecting the desired filter level, or leave it off if you prefer.(Optional) Enable NAT/PMP (for port forwarding) or Moderate NAT based on your networking needs.(Optional) Check "VPN Accelerator" to improve speeds, if supported.Pick a standard server or region. Proton VPN may also auto-select the best server based on load.Click Create (or "Download") to generate and save the .conf file. Many WireGuard-compatible routers, such as the Firewalla Purple and Gold series, allow direct import of WireGuard .conf files generated by services such as Proton VPN. Screenshot by Jason Perlow/ZDNET Step 3: Configure your router Log in to your router's admin interface (commonly accessed via 192.168.x.x).Navigate to the VPN / WireGuard settings section.Import or Paste the Proton VPN .conf file you downloaded. Some routers let you upload the file directly; others might require copying the keys, peer settings, and endpoint details manually.Save your changes and enable the WireGuard interface or tunnel. Step 4: Enable IP Passthrough or Bridge Mode (if needed) If your ISP modem also acts as a router (e.g., AT&T BGW-320, Arris, etc.), you risk double NAT (Network Address Translation) unless you enable "Bridge Mode" or "IP Passthrough." This configuration ensures your custom router (Firewalla, OpenWRT, or another) receives a public IP directly, managing NAT independently. Access the ISP gateway's admin interface (often 192.168.1.254 or 192.168.0.1).Locate Bridge Mode or IP Passthrough in the advanced settings.Assign the MAC address of your router as the passthrough device.Save and reboot both devices. Step 5: Verify your connection Check your public IP at ipinfo.io. It should show Proton VPN's server location. Speedtest.net will also display your IP configuration.(Optional) Run a ping or traceroute to confirm stable routing.All traffic on your network should now traverse the WireGuard tunnel. Which routers support WireGuard? Many router manufacturers are adding native WireGuard support to their devices. Asus, Netgear, and Linksys regularly include WireGuard in their firmware updates, especially for mid-to-high-end models. Open-source firmware platforms like OpenWRT also offer extensive support, making them an excellent choice for advanced users. Other router options GL.iNet OpenWRT-based routers come pre-loaded with WireGuard, making them ideal travel VPN routers. OpenWRT One, developed by the Software Freedom Conservancy and Banana Pi, is a $89 dual-band Wi-Fi 6 router (available from Amazon fully assembled for US and EU power supplies) with full OpenWRT firmware. It features a 2.5GbE PoE WAN port, an M.2 slot for hardware add-ons, and a hardware switch to prevent bricking by toggling between NOR and NAND memory. Because it's standard OpenWRT, you can access thousands of packages (including WireGuard) and frequent security updates. Firewalla Purple and Gold series devices are widely praised for their simple configuration, high performance, and mobile app. Its newAP7 Wi-Fi 7 access pointallows zero-trust segmentation, meaning you can isolate IoT gadgets on separate networks to minimize the impact if one device is compromised. Firewalla routers also offer multiple VPN profiles, letting you fine-tune which devices or users tunnel through WireGuard. If you have enterprise-level or advanced requirements, consider a Firewalla Gold Pro, Ubiquiti Dream Machine, Mikrotik, OPNSense, or Netgate device for robust VLAN configurations, advanced QoS, and large-scale LAN deployments. Troubleshooting and FAQ Even with WireGuard's simplicity, a few issues may arise: Handshake failure: Check that your public/private keys match Proton VPN's settings. Ensure the router's clock is accurate, as major time differences break WireGuard's cryptographic handshake.DNS leaks: Your real location is exposed if DNS requests still go to your ISP. Update your router's DNS to Proton VPN's resolvers and validate at dnsleaktest.com.Policy-based routing: If you want to use the VPN only for specific devices or domains (e.g. streaming boxes that need local region access), explore split tunneling or "policy-based routing" in your router firmware (Firewalla, OpenWRT, OPNsense, etc.).Wi-Fi performance: Upgrading to Wi-Fi 7 or adding multiple access points can alleviate coverage gaps. However, your overall VPN speed also depends on your router's CPU speed for WireGuard encryption.General security tips: Stick to reputable VPNs like Proton VPN, avoid free apps, and keep firmware updated. Router-based VPN setups typically offer better consistency than phone-based VPN apps. Show more Advanced tips and security best practices Key rotation: Change your WireGuard keys periodically to reduce the chance of compromised credentials over time. Proton issues profiles that are valid for one year until a new profile import is required.Hardware constraints: Lower-power routers (~700 MHz single-core) might cap out at ~100 Mbps for WireGuard, while dual-core ARM or x86 at 1.4+ GHz CPUs on these devices can handle hundreds of Mbps or more. (Firewalla Gold Pro can handle 2Gbps WireGuard connections.)Kill switch/fail-closed: In advanced firewall OSes (pfSense, OPNsense), you can configure firewall rules that drop all traffic if the VPN goes down, preventing accidental leaks.Zero-trust segmentation: Isolate IoT or guest devices on separate SSIDs/VLANs. If a device is breached, attackers can't easily pivot across the rest of your network. Building your WireGuard-compatible firewall router on Linux or FreeBSD For advanced users, building a WireGuard-compatible firewall router using open-source platforms like Linux or FreeBSD offers near-limitless customization. Solutions such as OPNsense and pfSense (FreeBSD-based) or OpenWRT and IPFire (Linux-based) provide robust options for integrating WireGuard at the OS level. These platforms allow for refined firewall rules, VLAN management, bandwidth shaping, and multi-WAN failover. While setup requires more technical expertise and hardware compatibility considerations, the payoff is unmatched control over advanced routing and security features. Next steps After you've set up WireGuard on a router via Proton VPN: Explore multi-hop/secure core: Proton VPN's paid plans offer layered routing for heightened privacy.Check WAN failover: If your router supports dual WAN or cellular backup, set up automatic failover so your VPN reconnects if one link drops.Refine policy-based routing: Split tunneling allows selective encryption, perfect for devices that need local content or minimal latency (e.g. gaming consoles).Self-host WireGuard: Platforms like AWS Lightsail, Linode, or DigitalOcean let you build your own VPN server, cutting out third-party operators entirely.Intrusion detection: Tools like Suricata or Snort on OPNsense or pfSense can monitor and block suspicious traffic in real time. The increasing need for router-based VPNs Growing geoblocks, censorship laws, and privacy concerns have made VPNs indispensable for many users. WireGuard stands out with its speed, simplicity, and open-source ethos. Proton VPN offers a robust, privacy-centric VPN that's straightforward to deploy on a wide range of routers, including Firewalla's Gold Series/AP7 for zero-trust segmentation or OpenWRT One for budget-friendly Wi-Fi 6 performance. Also:How we test VPNs in 2025With proper planning, you can maintain the freedom to access geo-blocked content and the security to navigate the modern web safely. Security
    0 Comentários ·0 Compartilhamentos ·16 Visualizações