Google is getting ready to spend $40 billion to increase its data center footprint in Texas. In an announcement posted on its website, Google said it's planning to build more infrastructure for its cloud and artificial intelligence operations in the state. The plans call for three new data centers, one in Armstrong County and two in Haskell County, according to Google.
According to a press release from Texas Governor Greg Abbott, this is Google's largest investment in any US state. The tech giant's investment in the Lone Star State dates back to 2019, when it built a data center in Midlothian, Texas. Google later expanded its presence in the state with the development of another data center in Red Oak, bringing the company's total investment into Texas to $2.7 billion. According to Google, the latest $40 billion investment will be made through 2027.
Google isn't the only major tech company developing more AI infrastructure in the US. Earlier this year, NVIDIA announced plans to build manufacturing space for AI supercomputers in Houston and Dallas. More recently, Meta said it would invest $600 billion to build AI data centers across the US without specifying which states.
This article originally appeared on Engadget at https://www.engadget.com/big-tech/google-plans-to-invest-40-billion-towards-building-data-centers-in-texas-183056066.html?src=rss
Amazon is making its satellite communication network a bit more official with a rebrand. The company has announced that Project Kuiper will now be called "Amazon Leo," a nod to the fact that its network is composed of satellites in low Earth orbit.
Project Kuiper's journey to becoming a proper Amazon brand has been a long one. The company introduced the project in 2019 with the goal of offering internet in regions without a reliable connection, through a proposed constellation of over 3,000 satellites that could blanket 95 percent of the global population in high-speed internet. That constellation has yet to fully take shape, however. In the years following the Project Kuiper reveal, Amazon launched prototype satellites, detailed plans for a space laser mesh network and showed off the antennas customers will use to connect to its network, but it didn't actually launch the first 27 satellites in its constellation until April 2025.
In comparison, its competitor Starlink has had a much faster expansion. SpaceX launched the Starlink satellite internet service in beta in 2020, and has rapidly expanded it since then. Now SpaceX has a deal with T-Mobile for satellite-enabled texting, and has struck up partnerships with airlines to test or offer internet connection on flights. Rebranding Project Kuiper to Leo suggests Amazon is finally ready to think about its satellite network as a product in its own right, but the company still has some catching up to do.
Amazon hasn't shared a date for when its satellite internet service will be widely available for personal and commercial use, but you can sign-up on the Amazon Leo website to receive updates as the company works towards launch.
This article originally appeared on Engadget at https://www.engadget.com/science/space/amazon-rebrands-its-starlink-competitor-to-amazon-leo-214453569.html?src=rss
WhatsApp is following in the footsteps of fellow Meta-owned companies, Instagram and Facebook. The European Commission will give WhatsApp's open channels the designation of Very Large Online Platform (VLOP) under the Digital Services Act (DSA), Bloomberg reports. The Commission has yet to make a public announcement on the matter, but has reportedly told Meta.
This label gives the EU greater regulatory power over WhatsApp in areas such as content moderation and data sharing. WhatsApp will also need to conduct an annual independent audit and have transparent advertising practices, among other mandates.
The new label isn't exactly a surprise. In February, WhatsApp announced that it had averaged about 46.8 million EU users in the second half of 2024. The DSA states that the VLOP designation should be given when a platform exceeds 45 million monthly EU users.
This designation will strictly be for WhatsApp's open channels feature. Individual messaging should not be impacted in any way and should remain private between the parties involved. Alongside Facebook and Instagram, WhatsApp joins companies such as Amazon, Google and ByteDance in the VLOP designation.
This article originally appeared on Engadget at https://www.engadget.com/big-tech/whatsapp-will-reportedly-face-further-eu-regulation-150037042.html?src=rss
There's a fundamental question you can ask of both the internet and real life: "How do I enjoy my time here without taking unnecessary risks?" In grass-touching meatspace, you can cut out processed foods, carry pepper spray and avoid skydiving without a partner.
But the best methods for staying safe online aren't as intuitive. The internet is a massive town square where people are constantly bellowing deeply personal facts about themselves. It's no surprise that it's become a breeding ground for scams, theft and other criminal activity.
Given the breadth of dangers, it may feel easier to throw up your hands and say that whatever happens will happen. I'm here to tell you, though, that cybersecurity doesn't have to be complex, difficult or time-consuming. You don't need to be a hacker to foil a hacker — you only have to take advantage of simple tips and free apps designed to make you safer online. Whether you commit to all 12 detailed here or only focus on one, you'll be much more secure for it.
1. Install security updates immediately
One of the most important things you can do to ensure your digital security is to install all software updates as soon as they become available on your devices. When you see the notification, don't wait — train yourself to download the update immediately.
Not all software updates are about security, but the ones that are form your best line of defense against technical hacks. When developers discover a flaw that can be exploited, they ship an update to fix it. By the time the flaw gets patched, chances are very high that hackers also know about it, so any time lost means you could be the next to get exploited.
As you go down this list, you'll learn that cybersecurity threats are less technical than you think. To counter the ones that are, however, there's nothing more important you can do than install security updates.
2. Use strong passwords
Weak, easily guessed passwords are one of the most frequent causes of data breaches and malware attacks. If a password is one of the ten or so most common, an attacker may be able to guess it with no other information. If it's connected to you — your birthday, say, or mother's maiden name — it may be guessable from information anyone can look up online.
Even if your password is a random string of characters, it might still be guessable if it's too short. Hackers can use programs to guess all possible combinations and try each one on a target account. The longer a password is, the more exponentially difficult it is to guess.
SEAN GLADWELL via Getty Images
That means you need passwords that are both long and meaningless to you. You might rightly complain that these are bastards to remember, but you're in luck: password managers can do that for you. A password manager app or browser extension can create passwords when you need them, store them securely and fill them in automatically. All you have to remember is the one master password that unlocks all the others.
3. Set up two-factor authentication
Even the strongest password might get revealed through no fault of your own, like if it's stored without encryption and leaked in a data breach. That's why it helps to have two-factor authentication (2FA), also known as multi-factor authentication (MFA), as a second secure layer on every account.
You probably already know 2FA as the irritating extra step that makes you go get your phone — but that's not the only way to do it. Many apps, including Google and Apple, now let you log in through passkeys. These not only don't require you to enter a code or password, but use asymmetric encryption, sharing credentials between your device and the service that runs the passkeys. It's a lot quicker for you, and leaves nothing to steal.
4. Back everything up
Ransomware and its cousins are a growth industry within the cybercrime economy. These attacks corrupt your files or lock you out of them until you pay a fee to get them back. The easiest way to foil a ransomware attack, or to clear any other kind of malware off a device, is to restore the entire system from the most recent backup.
To make sure you actually have a backup, experts recommend the 3-2-1 rule: three different backups, on two different types of storage, with at least one physically distant from the main system. For example, you could have one backup on another device in your house, one in the cloud and one on a portable hard drive. Automatic backup services can save disk images for you at set intervals so you don't have to remember to do it yourself.
5. Learn to spot social engineering
Despite all the technobabble flying around the cybersecurity world, a great many scams and hacks are accomplished through methods a 19th-century con artist would recognize. Scammers pose as experts or authority figures to gain your trust, and use frightening language to bypass your critical thinking. Ticking clocks, emotional manipulation and fake identities are all in the toolbox.
Alex Cristi via Getty Images
Take phishing, in which hackers trick you into giving up your information willingly. A typical phishing email might pose as a bank, credit bureau or other authoritative service. In red letters, it may demand your bank password or social security number to immediately fix an irregularity with your account. Other common approaches include warning you about speeding tickets you never incurred or sending receipts for subscriptions you never bought.
Social engineering attacks are constantly evolving, but they often fall back on the same strategies. The best way to foil them is to take a deep breath every time you receive a frightening email or text message, then research it in detail: look up the email address, check the visual design to make sure the sender is who they claim to be, and ask yourself if there's any way the message could be true. I highly recommend working through this phishing quiz — it's tough, but fair, and extremely educational.
6. Always check links before clicking
This is a companion to the previous tip. Social engineering scams don't always try to get you to give up information yourself. They also get you to click on links that put secret malware on your device — like keyloggers that watch you type your passwords or ransomware programs that corrupt your files.
If you're ever not sure about an email attachment or a link you're being asked to click, copy the link (without opening it) and paste it into a URL checker like this one from NordVPN. These free tools can tell you if a link is associated with any known malware domains.
Sam Chapman for Engadget
You can also mouse over any link, then look at the bottom-left of your browser to see what URL it will take you to. If an email is from your bank, any links within it should go to your bank's website. If it's going anywhere else, especially to an unidentifiable string of characters, be suspicious.
7. Don't overshare
Over the last two decades, lots of us have gotten into the habit of dumping all sorts of personal information on social media. This trend has supercharged the scam economy. It may seem harmless to broadcast the names of your kids or the dates you'll be on vacation, but every piece of data you put into the world makes it easier for a stranger to get hooks into you.
For example, "grandparent scams" are on the rise right now. Grifters contact a target, usually a senior, pretending to be their grandchild. They'll claim to be in a crisis and need money fast. The more information they have on their target, the more convincing their tale of woe will be. Social media is a prime place to study a potential victim.
Oversharing can also be a compounding problem. If you use weak passwords, your public information can be used to guess your credentials or answer your security questions. So, if you don't have a password manager yet, think twice before you engage with that quiz post on Facebook that asks for the name of your childhood pet.
8. Use a VPN
I'm a big booster of virtual private networks (VPNs), but it's important to be realistic about what they can and can't do. Even the best VPNs aren't total cybersecurity solutions — you can't just set one and assume you're safe forever. A VPN can't protect you if you use easily guessed passwords, for example, or click on a malware link. It's about hiding your identity, not making you invulnerable.
So what can a VPN do? In short, it replaces your IP address (a fingerprint that identifies you online) with another IP address, belonging to a server owned by the VPN. The VPN server does business with the internet on your behalf, while its conversations with your device are encrypted so it can't be traced back to you.
Sam Chapman for Engadget
This means no third party can connect your online actions with your real-world identity. Nobody will be harvesting data on the websites you visit to sell to advertisers, nor building a file on you that an unscrupulous government might misuse. VPNs also protect you from fake public Wi-Fi networks set up by cybercriminals — even if a hacker tricks you with a man-in-the-middle attack, they can't do much without your real IP address.
Many top VPNs, including my top pick Proton VPN, include ad blockers that can also keep cookies and tracking pixels from latching onto you. So, even if a VPN can't do everything, you'll be far safer and more private with one than without one. If you don’t want to pay for a new subscription right now, I've also compiled a list of the best free VPNs that are actually safe to use.
9. Run regular virus scans
The most important time to look for malware is when you're downloading a file from the internet. Not only can unwanted apps hitch rides on seemingly safe files, but links can start downloads in secret, even if you don't think they're meant to be downloading anything. A solid antivirus program can catch malware as it arrives on your system, and if it's uncertain, can lock suspicious files in quarantine until it knows whether they're safe or not.
Dedicated antivirus apps are sometimes even capable of catching malware that hasn't been seen or used yet. AV software uses machine learning to identify the common patterns of malware, filtering out new viruses that behave like old ones.
But what about malware that's already gotten through the perimeter? An antivirus app can also check your computer at set intervals in search of unwanted apps, including those that might be masquerading as system files. Windows computers now come pre-installed with Windows Defender, which is enough to handle most of these tasks, but I recommend at least one anti-malware program on any device.
10. Use email maskers and private search engines
If you're concerned about your information being misused or mishandled, remember that the less you put out into the world, the less danger you're in. Keeping your private data off social media is one important step, but there are other ways your data gets disseminated — and other options for responding.
For example, you often need an email address to sign up for an online account. If you use your real email, your contact information is now floating around online, increasing the chance of someone using it to scam you (or at least adding you to mailing lists you never signed up for). To stay safe, use an email masker. These services give you a fake email address you can use to create accounts, which automatically forwards messages to your real address.
Sam Chapman for Engadget
Search engines, especially Google, are also notorious for building profiles on users by watching the terms they search for. You can dodge that by switching to a private search engine like DuckDuckGo, which doesn't track anything you do — it's funded by non-targeted ad sales on its search results pages, not by selling your data to brokers.
11. Use a data removal service
Speaking of data brokers: unfortunately, if you've been on the internet at any point in the last 10 years without taking intense precautions, your data is probably in the hands of at least one business that makes money by hoarding and selling it. These data brokers range from public-facing, people-search sites to private backend dealers.
Data brokers are poorly regulated and lax about safety. The longer one has your personal information, the more likely it is to leak. The good news is that most brokers (though not all of them) are legally required to delete your data if you ask them to.
However, there are a lot of data brokers out there, and they really want to keep your data. Each one makes opting out harder than uninstalling a Norton product — and hundreds of them may have files on you. To make the process easier, you can use a data removal service like DeleteMe or Surfshark VPN's partner service Incogni.
12. Practice physical security
Let's close out the list by getting a little old school. I've already discussed how many online scams depend on classic con artistry to work. By the same token, physical infiltration and smash-and-grab tactics still pose a threat to cybersecurity.
It doesn't take too much imagination to see how this could work. If you leave your laptop or phone unattended in public, for example, someone might insert a flash drive that loads malware onto the system. In one illustrative case, a thief in the Minneapolis area would loiter in bars, watch people unlock their phones, then steal those phones and unlock them himself.
I'm not saying you need to be paranoid every second you're in public. Just use the same level of caution you'd use to protect your car. Lock your phone with a biometric key so only you can open it, and make sure not to leave any device lying around if it can access your online accounts. And at work, be careful not to let anyone into a secure area if they don't have the proper credentials.
This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/12-steps-you-can-take-right-now-to-be-safer-online-130008335.html?src=rss
Meta said on Friday that it's investing $600 billion in US infrastructure and jobs by 2028. Although the announcement is light on specifics (and heavy on standard Big Tech self-congratulation), it sounds like much of it will go toward AI data centers.
"At Meta, we're focused on creating the next generation of AI products and building personal superintelligence for everyone," the company wrote. "Data centers are crucial to reaching these goals and helping America maintain its technological edge."
If you feel like this isn't the first you've heard of Meta and $600 billion in US spending, you're right. That's the figure Mark Zuckerberg gave during a September White House dinner with Big Tech CEOs. But more memorable was the hot-mic moment later captured between Zuckerberg and President Trump. "Sorry, I wasn't ready," the Meta CEO said to the president, referring to his $600 billion pledge. "I wasn't sure what number you wanted to go with."
Meta's announcement today includes figures intended to bolster its claim to be a champion of US infrastructure. The company says that, since 2010, its data centers have "supported over 30,000 skilled trade jobs and 5,000 operational jobs." Meta adds that it's currently bringing over $20 billion to US subcontractors.
As for the "superintelligence" mention, it also surfaced when Zuckerberg announced data center investments in July. That term typically refers to a hypothetical point at which AI surpasses human cognitive abilities. (Steve Wozniak, Geoffrey Hinton and others want it banned until it’s proven safe and controllable.) The company views its AI glasses as a central part of that future. Zuckerberg said in July that anyone without them may eventually suffer from a "pretty significant cognitive disadvantage."
This article originally appeared on Engadget at https://www.engadget.com/ai/meta-says-it-will-invest-600-billion-in-the-us-with-ai-data-centers-front-and-center-195000377.html?src=rss
Google released Gemini’s Deep Research feature in March, a few months after unveiling the tool, giving you the capability to ask the AI chatbot to create comprehensive reports on complex topics. Deep Research uses sources from the web to write reports for you, but now a new update also allows it to pull information from your Gmail, Docs, Drive and Chat. Google says it’s one of the tool’s most requested features, and you’ll be able to take advantage of it in Gemini, even if you’re not paying for a subscription.
With Google’s latest update, Deep Research is now able to use your emails, all the Slides, Docs, Sheets and PDFs in your Drive, as well your chat history as references. That translates to a more personalized report, since Gemini wouldn’t just be using sources from the web. If you ask it to write a marketing analysis for you, for instance, it will take into account your notes, any document your team has written or any back-and-forth between you and your colleagues on email. It can cross-reference information from your account with public data to make, say, comparison spreadsheets for competitor analysis.
Take note that you will be able to control which Google service to link to, if you’re uneasy about giving Gemini access to all your information. When you click on the Deep Research tool in Gemini, you’ll see a drop-down menu where you can tick on Search, Gmail, Drive and Chat individually. At the moment, the feature is only available on desktop, but it will make its way to mobile devices “in the coming days.”
This article originally appeared on Engadget at https://www.engadget.com/google-gemini-can-now-do-deep-research-on-your-gmail-and-drive-data-143000300.html?src=rss
Amazon has sent a cease-and-desist letter to Perplexity that demands that the AI startup prevents its Comet browser from making purchases on Amazon, Bloomberg reports. In a blog post responding to Amazon's letter, Perplexity claims Amazon is "bullying" the company and that its demands pose "a threat to all internet users."
In Amazon's eyes, Comet's agent violates its terms of service, degrades the Amazon shopping experience and introduces privacy vulnerabilities, Bloomberg writes. Amazon's "Conditions of Use" for Amazon.com specifically prohibit "any downloading, copying, or other use of account information for the benefit of any third party" and "any use of data mining, robots, or similar data gathering and extraction tools." Depending on your definition, the agentic capabilities Perplexity offers through Comet could violate both clauses. The browser securely stores log-in credentials for websites locally, and uses them to make purchases for customers on Amazon with a simple command.
Perplexity and Amazon agreed to pause agentic shopping on Amazon in November 2024, according to the report, but when Comet was released, Perplexity allowed it again. By representing the Comet agent as a Chrome browser user rather than a bot, the company allegedly tried to get around the agreement, until Amazon found out and sent its cease-and-desist letter.
Amazon posted the statement below on its blog, openly acknowledging the issues it has with Perplexity:
We think it’s fairly straightforward that third-party applications that offer to make purchases on behalf of customers from other businesses should operate openly and respect service provider decisions whether or not to participate. This helps ensure a positive customer experience and it is how others operate, including food delivery apps and the restaurants they take orders for, delivery service apps and the stores they shop from, and online travel agencies and the airlines they book tickets with for customers. Agentic third-party applications such as Perplexity’s Comet have the same obligations, and we’ve repeatedly requested that Perplexity remove Amazon from the Comet experience, particularly in light of the significantly degraded shopping and customer service experience it provides.
Complicating Amazon’s claims, Perplexity might be a future shopping rival. Amazon demoed its own AI shopping agent called “Buy for Me” in April 2025. But Perplexity also disagrees with the fundamentals of Amazon's argument. "User agents are exactly that: agents of the user," Perplexity says. "They're distinct from crawlers, scrapers, or bots." Perplexity believes the Comet agent shouldn't run afoul of Amazon's terms and conditions then because it acts on the users' behalf, with the users' permission.
This isn't the first time Perplexity has been accused of misrepresenting its AI tools to access content. In August, Cloudflare claimed that the company's bots were accessing blocked websites by pretending to be a normal Chrome browser user on macOS. Reddit also sued Perplexity and three other companies earlier this month for accessing Reddit posts without paying for a license.
This article originally appeared on Engadget at https://www.engadget.com/ai/amazon-and-perplexity-are-fighting-over-the-future-of-ai-shopping-215445479.html?src=rss
Stability AI has partially succeeded in defending itself against accusations of copyright infringement. As reported by The Guardian, Stability AI prevailed in a high-profile UK High Court case, following Getty first suing the company in 2023 for allegedly using its copyright images to train its Stable Diffusion AI art tool without permission.
Getty’s original claim was that Stability AI had unlawfully copied and processed millions of protected images for training purposes, therefore abusing the rights of the original creators. However, the Seattle-based company eventually withdrew its claims of primary copyright infringement as it reportedly could offer no evidence that unauthorized copying for the training of Stable Diffusion had taken place in the UK.
Today’s ruling concerns claims of secondary infringement, to which the High Court judge, Justice Joanna Smith, ruled that "an AI model such as Stable Diffusion which does not store or reproduce any copyright works (and has never done so) is not an 'infringing copy'" under UK law. This was despite the ruling finding some evidence of Getty’s images being used by Stability, as evidenced by the presence of the former’s watermark. While the judge sided with Getty on some of its claims, she said that the evidence was "both historic and extremely limited in scope."
The High Court ruling likely won’t fill companies and creators concerned about AI-related copyright infringement with a huge amount of optimism, but unsurprisingly, both Getty and Stability AI have been quick to celebrate their respective victories. Getty's statement reads, in part:
Today’s ruling confirms that Stable Diffusion’s inclusion of Getty Images’ trademarks in AI‑generated outputs infringed those trademarks. Crucially, the Court rejected Stability AI’s attempt to hold the user responsible for that infringement, confirming that responsibility for the presence of such trademarks lies with the model provider, who has control over the images used to train the model. This is a significant win for intellectual property owners. The ruling delivered another key finding; that, wherever the training and development did take place, Getty Images' copyright‑protected works were used to train Stable Diffusion. The ruling also established a powerful precedent that intangible articles, such as AI models, are subject to copyright infringement claims in the same way as tangible articles. We will be taking forward findings of fact from the UK ruling in our US case.
The company added that it was "deeply concerned" that even "well-resourced companies" remain at risk of infringement due to a "lack of transparent requirements." It also urged the UK government to build on the current laws around this issue. Christian Dowell, general counsel to Stability AI, said the final ruling from the court "ultimately resolves the copyright concerns that were the core issue."
The ruling comes just days after Getty announced a new agreement with Perplexity AI that permits the latter to access Getty’s huge media library as part of its search and discovery tools. In a press release, Getty said a condition of the licensing deal was Perplexity committing to "making improvements on how it displays imagery, including image credit with link to source, to better educate users on how to use licensed imagery legally."
This article originally appeared on Engadget at https://www.engadget.com/ai/uk-high-court-sides-with-stability-ai-over-getty-in-copyright-case-180029461.html?src=rss
A VPN subscription can make for a good holiday gift. Everyone could do with having a VPN to help protect their online activity from prying eyes (and, perhaps, access more things to watch from their favorite streaming services). It's something useful that a gift recipient may have never realized they needed. Of course, you may be looking for a great deal on a VPN yourself, and the Black Friday discount for Proton VPN is nothing to sniff at. You can get two years of access to the VPN Plus tier of the service for $59.76, which works out to $2.49 per month.
That's a discount of 75 percent compared with the regular price of $10 per month. Overall, you'd save $180.
Proton VPN is our pick for the best VPN overall because it checks all of the boxes it needs to. There is a free plan with unlimited data, but with that you can only connect to servers in a few countries and the connection might not be fast enough for you to watch anything from your preferred streaming service's library in that locale. The VPN Plus tier unlocks a lot more options, such as the ability to connect to 15,000 servers across more than 120 countries and simultaneous protection for up to 15 devices.
The apps are well-designed — Proton has clients for Windows, Mac, iOS and Android — and it's easy to find a feature or setting you're looking for. In our testing, Proton VPN Plus had a relatively small impact on browsing speeds. Our download speeds dropped by 12 percent and uploads by 4 percent, while the global average ping remained below 300 ms (which is especially impressive if you're connecting to a server on the other side of the planet).
Perhaps, most importantly, though, it's Proton's commitment to privacy that helps make its VPN an easy recommendation. There's a no-logs policy, meaning it does not log user activity or any identifiable characteristics of devices that connect to the VPN. Proton's servers use full-disk encryption to bolster privacy as well.
Proton VPN is not the only service to offer a Black Friday VPN deal this year, of course. There are plenty of others available on services we like. Here are the best of the bunch if you're looking for an alternative to Proton VPN.
Surfshark One (24 months + 3 free months) for $59.13 (88 percent off): A VPN is great, but it's not enough to protect your data all on its own. Surfshark One adds several apps that boost your security beyond just VPN service, including Surfshark Antivirus (scans devices and downloads for malware) and Surfshark Alert (alerts you whenever your sensitive information shows up in a data breach), plus Surfshark Search and Alternative ID from the tier below. This extra-low deal gives you 88 percent off all those features.
NordVPN Plus (24 months + 3 free months) for $105.03 (74 percent off): NordVPN has taken 74 percent off its Plus subscription for Black Friday. For only a little more, you get a powerful ad and tracker blocker that can also catch malware downloads, plus access to the NordPass password manager. A Plus plan also adds a data breach scanner that checks the dark web for your sensitive information.
CyberGhost (24 months + 4 free months) for $56.94 (84 percent off): CyberGhost has some of the best automation you'll see on any VPN. With its Smart Rules system, you can determine how its apps respond to different types of Wi-Fi networks, with exceptions for specific networks you know by name. Typically, you can set it to auto-connect, disconnect or send you a message asking what to do. CyberGhost's other best feature is its streaming servers — I've found both better video quality and more consistent unblocking when I use them on streaming sites.
Private Internet Access (36 months + 4 free months) for $79.20 (83 percent off): Private Internet Access (PIA) is giving out the best available price right now on a VPN I'd recommend using. With this deal, you can get 40 months of PIA for just under $2 per month — an 83 percent discount on its monthly price. Despite being so cheap, PIA has plenty of features, coming with its own DNS servers, a built-in ad blocker and automation powers to rival CyberGhost. However, internet speeds can fluctuate while you're connected.
This article originally appeared on Engadget at https://www.engadget.com/deals/black-friday-vpn-deals-proton-vpn-two-year-plans-are-up-to-75-percent-off-153737122.html?src=rss
Later this month, Italian citizens will have one extra step to go through before getting on porn sites. On Friday, Italy's regulatory agency for communications, known as AGCOM, announced an age verification system that's meant to prevent minors from accessing websites with pornographic content. The initial list of sites covers around 50 sites, including Pornhub, XHamster and OnlyFans.
The new rule will require users to get verified through "certified third parties," which could be another company, bank or mobile operator that already has the relevant info. Once the third party verifies the user's age, it will issue a code that grants access to the porn site. While the legislation's stated goal is to prevent harm to minors, the age verification process uses a "double anonymity" system to quell privacy concerns. In order to protect user privacy, porn sites can only see if a user is of age and not their identity, while the third-party verifier can only see the user's identity and not the website they're trying to get on.
According to the legislation, users have to do this each time they try to get on affected porn sites. AGCOM said the new rule goes into effect on November 12, and any porn sites that are found non-compliant could be hit with penalties of up to 250,000 euros.
Italy is the latest in the European Union to implement age verification rules, after France put a similar system into place in the summer. Just outside the EU, the UK also recently introduced its own age verification process that requires either a selfie or government ID. Since then, Pornhub said that UK visitors to its site have plummeted 77 percent.
This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/italy-will-be-the-latest-country-to-require-age-verification-for-porn-sites-170913842.html?src=rss