How to secure yourself at the Olympics

Olympic Rings

Dear friends at Sochi,

We are so sorry to see the issues surrounding the Olympics this year. The alleged reports of athletes being without fresh water and reporters being crammed into 1 room when 11 are needed concern us. We wish we could do something about the on-ground problems you are facing. Since we can't, we've taken some time to add a little relief to your online troubles. We've wanted to build something like this for a long time, but worries at Sochi were finally the impetus we needed.

We've created a super simple way to install and run a Virtual Private Network (also called a VPN). VPNs are a technique to allow you to securely access the Internet even if you don't trust the connection you're using, whether you're using wireless at a coffee shop, or reading your email from a country which monitors them. VPNs are widely used by security-conscious corporations and government, but they're too painful to set up for everyone else.

We wanted to make it easy, so we created a way to get up and running with a leading open source VPN. It's the ease of use expected by the iPhone generation combined with security which would pass muster at your bank.

We hope this can make your communication while away from home a little bit friendlier and less scary. Click here to get to our step-by-step guide.

Good luck!
Tinfoil Security

P.S. If you're reading this and you're not in Sochi, you're more than welcome to use this VPN setup anyway - everyone's information should be secure.


Ainsley Braun

Ainsley Braun is the co-founder and CEO of Tinfoil Security. She's consistently looking for interesting, innovative ways to improve the way security is currently implemented. She spends a lot of her time thinking about the usability and painpoints of security, and loves talking with Tinfoil's users. She also loves rowing and flying kites.

Tinfoil Security Blog

Tinfoil Security provides the simplest security solution. With Tinfoil Security, your site is routinely monitored and checked for vulnerabilities using a scanner that's constantly updated. Using the same techniques as malicious hackers, we systematically test all the access points, instantly notifying you when there's a threat and giving you step-by-step instructions, tailored to your software stack, to eliminate it. You have a lot to manage; let us manage your website's security.