usenet reviews UsenetReviewz.com English de.usenetreviewz.com Deutch usenetreviewz.com Espanol nl.usenetreviewz.com Dutch Fr.UsenetReviewz.com Francais revistausenet.com Portuguese RSS Feeds Twitter UsenetReviewz Facebook UsenetReviewz Google+ UsenetReviewz YouTube UsenetReviewz Contact Us

Usenet Reviews
Best Newsgroup Providers Reviewed
Special Savings / Discounts
Free Trial Offers

Usenet News


Usenet and usenet industry news collected here. Articles are listed in reverse chronological order.

Simple Email Encryption with Mailvelope


If you’re like many people who have legitimate concerns about your email being read by government agencies and other entities, encryption is one of the options you have to protect yourself. There is an add-on for Google Chrome and Firefox called Mailvelope that makes this a fairly easy endeavor, even if you’re not that familiar […]

Maidsafe: A New Decentralized Internet


Maidsafe is an open source platform that is designed to increase information security using decentralization and encryption. Maidsafe is currently encouraging developers to build applications for this platform and actively soliciting them to do so on its site, so you may want to look if you are interested in developing apps. How Decentralization Is Applied […]

Warner Brothers Is Using Robots to Make Takedown Requests


Warner Bros., one of the largest entertainment companies in the world, has been revealed to have been using robots to issue automated takedown requests for content that they claim infringe their copyrights. The company was required to reveal this information publicly, even though they would’ve greatly preferred that it remained secret. Because of their lawsuit […]

Will USENET Resurface as a Venue for Free Speech as the Web Becomes More Restricted?


Courage.org is one of several sites that make an effort to provide a venue for people who would be described as whistleblowers to post information that may raise the ire of governments and corporations implicated in wrongdoing. The site is affiliated with EdwardSnowden.com, the man who is likely the most famous whistleblower in the world […]

Are You a Pirate?


According to BBC Worldwide, ISPs should monitor their user’s activity and, if a user happens to be downloading a lot of data over an encrypted connection, those ISPs should assume that it must be because of piracy. This was in a filing made to the Australian government regarding online privacy and, despite the somewhat sinister […]

NZBKing Review


NZBKing uses a sophisticated pattern-matching algorithm to make it easier to find NZB post that you are interested in. Like other NZB sites, this one doesn’t post any content, but does provide you with the NZB files that can point you to the content that you are looking for. The site currently has nearly 50,000,000 […]

GoGo Usenet Review


GoGo Usenet is a US-based provider. The company offers unlimited subscriptions to their service at rates that are in line with other providers. They offer a large selection of groups, which can be explored on their website. This USENET provider offers an affiliate program, as well, which allows users to get paid for bringing more […]

Tor Is Important and You Can Help


Tor, a tool that enables users to browse the Internet anonymously, relies on an international network of relays to function. Those relays are provided largely by volunteers, who use software to set up routers for the system, allowing people all over the world to browse the Internet without fear of reprisal by governments or other […]

NZBVortex Goes Cloud


NZBVortex announced that it is harnessing the power of the cloud – as marketing types might put it – to improve user experience using their service. This is unique to NZBVortex at the moment and the NZBVortex Cloud is designed to deal with some of the most common problems that people have using the USENET […]

NewsDemon Disk Failure or Scam?


There are two bits of bad news about NewsDemon. First, the company had a disk failure in early September that ended up costing them some customer data. None of the data was accessed by any hacker nor was any of it compromised in any other way. It was simply overwritten by accident and that data […]