November 23, 2019 by freemexy
Are you uncertain what a VPN should do – apart from help your privacy? – Well, join the club. There isn’t a unitary recipe or single protocol for creating a VPN – or even an industry standard for what the minimum security level should be. Even worse, app stores are riddled with apps calling themselves VPNs which do some rather suspicious activities.
Five semi-technical questions and answers about VPN use
That sounds all good and well but in the end it does not help you if you do not know exactly why you’d ever use a VPN and what some of its features are. To help you out please find below 5 things you should know before buying a VPN.
1. When should I use a VPN?
A VPN should be used whenever you are on an insecure network such as a public or hotel WiFi, when you need to have a certain geo-IP address to unlock certain content or web features, or when you want to prevent your ISP and other online trackers from recording your online activities. These three points probably cover the vast majority of your online time and also cover your mobile devices and your stay-at-home computer.
2. Why are exit nodes so important?
An exit node is the technical term to describe a VPN server. When connected to a VPN, your data packets go out from the server through this exit node. This provides two important benefits. First, it encrypts the visited site addresses and the contents exchanged. Second, it gives these packets the IP address of this location, creating a new virtual location for you. When selecting a VPN, you not only want one with exit nodes near you for more easy connections, you also want one with exit nodes in the specific geographies where you want a virtual location. Generally speaking, the more exit nodes a VPN has, the more difficult it is for content providers and nation-states to block it.
3. What VPN protocol is best?
There are a number of acceptable VPN protocols in use. Creating a VPN is like a cooking recipe which can vary according to the device operating system, infrastructure, and type of use – and all put together with the goal of easier connections, faster speeds, and more secure encryption.
OpenVPN is one of the most popular. In addition to using AES-256 bit key encryption, it is open source. This means that users anywhere can and do look closely at the code to uncover any vulnerabilities. L2TP/IPSec L2TP is a combination of L2TP and the IPsec security protocol. It uses the secure AES-256 bit encryption but relies on a single port which makes it easier to block. Two additional acceptable protocols include SSTP and IKEv2. Protocols and encryption techniques evolve over time so this list will change. WireGuard, a new and fast-developing VPN protocol, is the most notable newcomer to this list. It is being expanded to work with more operating systems and has gotten rave reviews for its code simplicity and speed.
4. What is a VPN proxy?
A VPN proxy is essentially a forwarding note pasted on your data packets that gives them different IP address but does nothing to encrypt the contents or the DNS addresses. Because of the lack of encryption, they are simpler, faster, and cheaper to operate than most full-flavored VPNs. They can enable you to circumvent some geo-IP restrictions but do not protect privacy. They are especially common among free “VPNs” for android devices.
5. What are some really useful VPN features?
The most useful VPN functions reinforce the weakest part of the VPN security chain – you the user. If a VPN is working correctly, with full packet encryption and no DNS leakage, the biggest privacy risk for the user is that they will simply not turn it on to use it or not realize when the connection has been broken.
Auto connect will start up the VPN when you connect to an insecure network. This can help prevent you from sending private information over, for example, a public WiFi network. It’s like a seatbelt notification in your car.
The Kill switch drops the network connection when the VPN connection is disrupted. This is especially useful when the network connection is spotty or when the device is connected to the VPN service for a long time and you as the user might not be sitting in front of the device at all times. In both scenarios, the kill switch can keep you from unknowingly using the insecure network after the VPN connection has been broken.
November 23, 2019 by freemexy
The secret to accessing sports, music streaming sites, and TV shows unavailable in your region? You guessed it – VPN can help. Qwer432
Have you ever tried to watch your favorite show and received a message saying: “This content is not available in your country”? streaming
services and broadcasters to restrict access to their content. This restriction is based on your IP address, which shows your location and can be easily tracked. Based on your location, you can only access movies and programming available in that region.
How can a VPN help to access worldwide content?
If you want to keep up to date with your favorite show on holiday or want to watch a foreign movie not available in your country, a VPN can help you view the content you enjoy. With just a few clicks you can change your location to one of 38 servers around the world and access movies, programs, live sports and music via on-demand, streaming and catch-up services such as:
HBO Now, Hulu Plus, Amazon instant video, Starz, CBS All Access
ITV Player, All 4, 5 On Demand, STV Player
NBC Sports, ESPN, PGA Live Tour, FOX Sports, Eurosport
Spotify, Pandora, Apple Music, Google Play Music
If you want to travel light and still enjoy worldwide content, don’t forget VPN service can be installed on your iOS or Android tablet or smartphone – no need to take your laptop on holiday.
Enjoy uncensored access to the content you want
With a VPN connection, you will be able to bypass firewalls and content policies at work, university, and on public WiFi. Enjoy censorship-free browsing for the content, news, live sports and websites important to you.
Will a VPN slow down streaming?
Many VPNs do slow down an internet connection but VPN are confident you will notice no loss of speed, thanks to our cutting-edge VPN technology. In fact, if you are suffering from slow internet due to your ISP’s data throttling or fair use policy, VPN might even boost your speed.
November 22, 2019 by freemexy
A widespread web browser exploit is leaking IP addresses, even those protected by VPN.
Both VPN and proxy users could face serious security issues if they don’t take proper steps to protect themselves. The massive flaw comes in by way of WebRTC (short for Web Real-Time Communication) and the browsers that support it: Google Chrome, Firefox, and Opera.
The threat allows websites to see your unique IP addresses, even with a VPN.
What is WebRTC?
If you’re not familiar with WebRTC, it’s a technology that simplifies real-time communications in a web browser. WebRTC is an open-sourced protocol that supports browser-to-browser apps for voice calling, video chat, and file sharing. It’s a widely-supported plugin used by the most popular desktop web browsers, save for Internet Explorer, Edge, and Safari.
How are IP addresses leaking?
So, in this WebRTC security hole, a website can use a simple script to access IP address information from STUN servers.
Wireless routers at home replicate a similar function in translating private IP addresses to public and back. A researcher from San Francisco, Daniel Roesler, posted a demonstration to illustrate how the WebRTC vulnerability works. The STUN server sends a ping back that contains the IP address and port of the client. While Roesler’s demo claimed that the browser vulnerability was unfixable, there are several solutions.
Who is affected and how can the security hole be fixed?
This is a web browser problem, so both Microsoft and Apple loyalists are equally at risk. Default browsers Internet Explorer and Safari are not affected by the WebRTC flaw because they do not support the protocol. But Firefox and Chrome users have a problem to fix.
Firefox users can either download NoScript from Firefox Add-Ons, or type about:config in the address bar and set ‘media.peerconnection.enabled‘ to ‘False’.
Running Opera? Your WebRTC protection is a complete solution. Use the extension of WebRTC Leak Prevent to protect your browser.
Users of Chrome are unfortunately affected to a point where there is no complete protection. While an extension called the WebRTC Network Limiter was released over the summer of 2015 as a fix to this issue, there are some reports that there are still leaks in specific instances.
Alternatively, those that use the affected browsers can set up a wireless home router to connect to their VPN service
directly. This removes the likelihood of a software-based (or in this case, a browser-based) flaw from exposing any information about the user.
November 22, 2019 by freemexy
You may feel like data breaches are a daily occurrence, and you’d be right. But this latest one, named Collection #1, is a monster — exposing more than 773 million email addresses and 21 million passwords.
In all likelihood, you were a victim of this breach. Now, your accounts are vulnerable.
The breach was reported by Troy Hunt, who runs the site Have I Been Pwned. On his site, you can check to see if your email address has been compromised. Hunt noticed the breach when a giant file containing 12,000 separate files and 87GB of data was uploaded to a cloud service called MEGA. That data was then posted to hacking forums. In total, the breach seems to be a blend of over 2,000 databases.
If you find that your email address has been exposed in Collection #1 (or any other breach, for that matter), the information could be used to hack your accounts. If your password was also included in the breach, this becomes a major problem—especially for those who use the same password for multiple accounts.
Hunt’s site allows you to see if your password was involved in the breach. If it was, change it immediately. Make sure you set up a unique password for each account you have.
4 tips to protect your accounts
Here are some quick and easy things you can do to create a healthy online security routine:
Start using 2FA
Use Two Factor or Two Step Authentication (2FA) on every account where it’s offered. With 2FA, you log in to your account and enter your password. You’ll then be sent another code, usually to your phone via text. You can only enter your account with both your password and the code. This adds an extra layer of security; even if a hacker has your password, they’d still need access to your phone.
Set up a VPN
A VPN , is an app that encrypts your WiFi connection to make you anonymous online. This means that hackers on the same WiFi network as you, like when you’re at a coffee shop or airport, can’t breach your data. A VPN can be downloaded for free on your laptop and mobile device.
You don’t want to use the same password from one site to another, and you want to make sure that the password is completely random. The best passwords are those that are long and include random combinations of letters, numbers, and symbols. However, those are tough to remember; a password manager will securely remember it for you.
Buy security tokens
You also might want to consider buying a Yubikey. These keys are actually like your own private encryption method. When you enable it, no one—not even you—can access your accounts without this key. For a hacker to get into an account, they would need your password, your mobile phone, AND your security key. Effectively, your accounts will be like Fort Knox and a hacker will likely give up in search of a less secure person to victimize.
These tips are not difficult to implement, but as with everything, the key is getting started. Once you’re in the routine, your personal data will be that much more secure from giant data breaches like Collection #1.
November 22, 2019 by freemexy
What makes the internet so special is its ability to connect people to information from all corners of the globe. Regardless of education, wealth, or location, if you have an internet connection, you should have access to the same content as someone situated 8,000 miles away. Qwer432
At least, that’s the way Tim Berners-Lee envisioned the world wide web back in 1989.
The reality, however, is that our internet has become plagued by censorship, oppression, and greed. But how do we quantify “internet freedom”? What tangible evidence do we have that our rights as internet users are not being met?
Freedom House is an organization dedicated to the expansion of freedom and democracy around the world. Each year, they produce their Freedom on the Net report, measuring internet freedom in 65 developed nations — from the US to China, the United Kingdom to Spain, from Russia to Egypt. The report seeks to inform the wider community in order to advocate for an internet characterized by freedom, openness, and security for all.
At AnchorFree, a free, open, and secure internet is core to everything we do. Our application enables more than 650 million people, from all corners of the world, secure and private access to information. We believe in Tim Berners-Lee’s original vision, that the internet should be a place where every person on the planet can freely connect, share, and learn — without fear of surveillance, censorship, or discrimination.
The Freedom on the Net report highlights troubling trends that threaten these digital rights. Governments are increasingly tightening their leash on what citizens can and cannot see, using “fake news” to influence opinion (especially during political elections). This is causing the erosion of trust in the internet as a source of education.
The tools citizens use to combat global censorship are also under attack; China banned its citizens from using a VPN, for example: “Democracies are struggling in the digital age,” said Michael J. Abramowitz, president of Freedom House. “China is exporting its model of censorship and surveillance to control information both inside and outside its borders.”
The United States, too, is on the decline, led by the surge in fake news and the deregulation of Net Neutrality, a law that protected citizens against discrimination from Internet Service Providers. The way things stand globally, our online freedoms are only set to diminish further.
As an organization that outwardly advocates for the freedom of secure and private information, this remains a troubling trend for all of us at AnchorFree. Freedom House’s“Freedom on the Net report” is imperative in spreading awareness and enabling tangible visualization of the issue at hand.
We are a proud partner of Freedom House and wholeheartedly support its efforts to bring light to the global issues that surround our digital freedoms.
November 22, 2019 by freemexy
Imagine getting a letter in the mail from a bank, congratulating you on your new car loan. You also get a $2,000 bill for your first month’s payment. You look out of the window at your driveway. There’s no fancy Range Rover. You’d never spend over $100,000 on a car. At yet, here you are, bill in hand, wondering why this bank says you did. Qwer432
This is exactly what happened to Mola Johnson a few months back. Johnson said she received the letter from Scotiabank that included signed paperwork on her new loan. Johnson had never even been to the Canadian province where the luxury Range Rover was purchased.
It was at this point that she realized her identity had been stolen.
“When I received the report from Equifax, I noted that there is an unusual transaction – $106,000 – which I was not aware of,” she told Global News.
She went to the local police station to file a police report. The police are yet to determine how her personal information was stolen, used to take out a loan, and then to purchase a luxury SUV at the dealership.
Although Johnson will not be held at fault for the purchase, the bank has yet to clear her name from the fraudulent purchase. Only after Johnson went public with her story, she says, did a bank representative make contact and assure her that nothing will happen to her credit. She was also offered additional account protection for the next five years.
“I don’t know exactly where I stand. I just know that I can’t get anything right now, even in an emergency situation, because [this situation] is giving me a bad credit since I’m not paying the money that needs to be paid,” she said.
“Every time I see a different piece of mail coming to say that you owe this much money… it’s actually giving me anxiety.”
It could happen to you…
Johnson’s case is not rare. In fact, there are close to 17 million victims of identity theft in the U.S. each year, making it the number one consumer crime in the country. In total, nearly 60 million Americans have been affected by identity theft, according to a 2018 online survey by The Harris Poll, and a study by Javelin Strategy & Research firm suggests that identity theft crimes are on the rise.
identity theft protection
So how did Johnson get her identity stolen? We don’t know for sure, but it’s likely a combination of things.
Firstly, phishing emails. 200 million phishing emails, designed to look like a real company you trust so you hand over your personal information, are sent out every day. All it takes is one click on a spammy link and you could unknowingly be handing details like your Social Security Number, date of birth, email, password, and other information to criminals.
Identity thieves also scour your social media profiles looking for any personal information — how many kids you have, their names, birthdates, where you went to college, your maiden name, and so on. Many people have publicly viewable social accounts and don’t think twice about posting this kind of information.
As you can see, it doesn’t take much for a criminal to build a pretty in-depth profile that can be used to steal your identity — and, in Johnson’s case, buy a $100,000 Ranger Rover.
How to protect yourself from identity theft
Place a flag or fraud alert at financial institutions so you are alerted when someone tries to use your credit
Shred personal documents before you throw them in the trash
Be aware of phishing emails and never click on random links
Get a copy of your credit history and check it regularly
Turn on two-factor authentication on your devices
Invest in identity theft prevention and detection
As cliche as it sounds, nowadays, you need to take extra measures to secure your identity online. After hearing Johnson’s story, it’s worth taking a few minutes to secure your accounts rather than going through the pain of becoming the next victim of an identity theft crime.
Identity theft is now the #1 consumer crime in the U.S. To protect yourself, check out RitaVPN, a new bundle that delivers 360-degree protection: the privacy and security of VPN protection when you’re online, and comprehensive monitoring when you’re not.
November 22, 2019 by freemexy
Why your IP address matters
If you’re like most people, you probably don’t think about your VPN too much. Heck, you may not even know what an IP address is. Qwer432
Here’s why it matters.
What is an IP address and what does it do?
Your IP address, or Internet Protocol address, is a number that identifies your network and network hardware. In other words, this number is your device’s identity when on a WiFi network and indicates where that device is physically located. Think of it, then, as your physical address. When you change WiFi networks, your IP address changes too—again, highlighting where your device is as if you’re being tracked on “Find my Friends.”
Now, not everyone would want their physical address plastered around the internet for all to see. The same can be said for your IP address. But it’s not just for privacy reasons, there are many situations in which you may want to conceal your IP. Here are some reasons why:
Hide your identity
One reason to hide your IP address is to conceal your identity. You can do this via encryption. For example, if you are being stalked, or want privacy and security from large corporations, Internet Service Providers, government agencies, or even hackers, hiding your IP address is a vital form of protection. We’ll show you how to hide your IP address later in the article.
Stream and access foreign sites
Another reason to hide your IP address is to stream content anywhere you want. This is great if you travel to other countries, which often block access to certain sites, including your favorite games or streaming services like Netflix or YouTube. By using a VPN to ‘spoof’ your IP and therefore location, you can access content from abroad—like sports, games, social media apps, and more.
what is ip address
Public WiFi protection
Hiding your IP address also helps to keep you and your data safe on public WiFi connections. When you connect to a shared public WiFi network, like you’d find at a coffee shop or airport, your device is visible to anyone connected to that same network—and by device, that means your mobile phone or tablet, not just your laptop. It’s imperative to protect all of your devices by hiding their IP address, that way you can be sure a hacker can’t intercept your traffic. Again, more on how to do this soon…
When you hide your IP address, it also keeps you safe from any snoopers looking for information about you. You’d be shocked at how many trackers are out there seeking information on your browsing history, your location, what you like and what you don’t, along with sensitive information like your health and financial data. This info is often collected and sold to data brokers and advertisers, and there can be upwards of 30 different trackers placed on every app and website you visit.
How many sites do you visit in a day, week, or month? You do the math. That’s a lot of trackers following you.
Now, hiding your IP address alone won’t prevent all of these trackers from snooping on you. For that, you’ll need to block web trackers in parallel. But masking your IP will certainly help.
If you have restrictions on your school or work network, you can access any game, site, or app you want by hiding your IP address. You can also avoid censorship so you’ll always stay connected.
Throttling is where your Internet Service Provider (or ISP) slows down your connection to certain sites — like Netflix, for example. Since the FCC scrapped Net Neutrality regulation that prevented ISPs from deprioritizing traffic to certain websites and services, research has shown that ISPs are indeed now throttling content to numerous sites. By hiding your IP address, your ISP won’t know what site or service you’re trying to visit. And if it doesn’t know, it can’t throttle your content.
Finally, you will have more freedom to do what you want on the internet. After all, the internet was created for everyone to use, regardless of where you are in the world. The internet should remain free from censorship, free from prioritization, and free from data harvesting. By hiding your IP address, you’re not only protecting your privacy and security but you’re enabling your basic human rights to a free and open internet.
Unblocked games at school
How to hide your IP address
There are a few ways to hide your IP, and none of them are difficult. The easiest way is to use a VPN service
Like your home address, your device’s IP is something you should be aware of—and consider concealing. Given it’s free to do so and takes nothing more than a click of a button, taking control of your and enabling access to content around the world, might just be the smartest thing you do today.
November 22, 2019 by freemexy
Cara merawat wajah secara alami memang gampang-gampang susah.
Terkadang sedikit saja membuat kesalahan bisa muncul masalah lain dan berakhir membuat stress sendiri menghadapinya.cara membuat kulit putih bersih
Seperti permasalahan wajah yang terlihat tampak kusam dan membuat kepercayaan diri menurun, mengganggu sekali bukan?
1. Tidak Malas Membersihkan WajahUntuk menjaga kulit wajah tetap sehat dan tidak kusam bisa dimulai dengan tidak malas membersihkan wajah.
Dengan membersihkan wajah, kotoran-kotoran yang menempel pada wajah setelah seharian beraktivitas akan lenyap.
Untuk hasil maksimal coba gunakan pencuci muka yang mempunyai label brightening ataupun whitening.
Hal ini ntuk membuat wajah semakin bersih.
Pembersih wajah dengan label brightening ataupun whiteningpun mengandung bahan-bahan yang dapat mencerahkan wajah.
2. Mengeksfoliasi Wajah dengan Rutin
Eksfoliasi atau proses pengangkatan sulit mati pun penting untuk mengembalikan wajah kembali cerah.
Menumpuknya sel kulit mati pada wajah membuat wajah terlihat kusam, walaupun terkadang sudah membersihkan wajah tapi terkadang sel kulit mati banyak yang masih tertinggal dan justru membuat wajah terlihat kusam.
Untuk mengeksfoliasi wajah, Ladies bisa menggunakan scrub yang dapat mengekspoliasi sel kulit mati.
3. Membersihkan Makeup secara Benar
Membersihkan make up dengan asalpun dapat membuat wajah kusam muncul.
Saat menggunakan make up banyak sekali produk makeup dengan berbagai brand yang kosmetik menempel pada wajah kita.
Apalagi jika menggunakan produk makeup yang tinggi coverage dan tidak membersihkannya secara benar dengan makeup remover terbaik, itu dapat membuat kulit kusam kembali menghampiri Ladies.
November 22, 2019 by freemexy
Cara mencerahkan wajah secara alami adalah dengan menggunakan bahan-bahan yang alami juga tentunya. Maka dengan begitu Anda akan mengurangi risiko untuk mendapatkan efek samping pada wajah. Banyak orang memiliki impian kulit wajah putih bersih dan cerah.cara membuat kulit jadi putih
Dengan memiliki kulit yang cerah maka akan menambah rasa percaya diri seseorang dalam menjalani kegiatan di setiap harinya. Tak heran banyak sekali orang yang melakukan berbagai cara untuk membuat kulitnya menjadi cerah dengan cara instan.
Kini, kecepatan memang sangat dituntut, sehingga orang-orang semakin banyak tergantung kepada suatu hal yang instan, termasuk dalam cara mencerahkan kulit dengan menggunakan skin care, atau krim dokter yang mengandung banyak bahan kimia di dalamnya.
Namun, sebenarnya sangat tidak disarankan menggunakan krim wajah dengan bahan kimia. Selain harganya yang mahal dan berbahaya, seseorang akan hanya merasa cantik ketika menggunakan krim wajah tersebut, akan tetapi setelah dia berhenti menggunakannya, justru kulit wajah makin tampak kusam, dan tidak secerah saat memakai krim.
Sudah waktunya Anda untuk beralih dari krim yang tidak sehat tersebut ke cara yang alami, tentunya akan sangat aman digunakan dan tidak memiliki efek samping selagi digunakan dengan tepat dan tidak berlebihan.
Putih telur merupakan salah satu pilihan yang dapat Anda gunakan. Selain memiliki banyak manfaat untuk kesehatan tubuh, putih telur juga dapat mencerahkan wajah Anda secara alami. Ini disebabkan karena putih telur mengandung protein, nah protein inilah yang dapat bermanfaat untuk kulit wajah kita.
Protein dalam putih telur akan bertugas memacu pertumbuhan sel-sel baru. Tidak berhenti di situ, protein juga akan membuat sel baru tersebut menjadi pengganti kulit kusam pada wajah Anda. Sel kusam akan digantikan dengan kulit yang baru. Anda bisa mengaplikasikannya langsung pada kulit wajah dalam bentuk masker.
Cara mencerahkan wajah selanjutnya adalah dengan menggunakan lidah buaya. Tidak hanya bermanfaat untuk kesehatan rambut, ternyata lidah buaya juga bisa mencerahkan kulit wajah. Senyawa polifenol yang terkandung pada lidah buaya membuatnya berfungsi sebagai zat antioksidan untuk mencegah kulit menjadi kusam.
Cara pengaplikasiannya juga cukup mudah, dengan parut dan ambil gel lidah buaya, kemudian langsung dioleskan saja ke seluruh wajah secara merata. Kemudian diamkan selama 10-20 menit. Kemudian bilas dan lihat hasilnya.
Jeruk nipis telah dipercayai ampuh sebagai buah yang dapat mencerahkan wajah, dan sudah banyak orang menggunakan jeruk nipis sebagai masker untuk wajah. Untuk membuat masker wajah dari jeruk nipis biasanya dengan ditambahkan sedikit putih telur.
Kandungan antioksidan dalam jeruk nipis dapat menjadikan kulit wajah lebih sehat dan natural. Jeruk nipis yang dijadikan masker wajah akan berkhasiat mengecilkan pori-pori hingga membantu dalam menghilangkan bekas jerawat dengan cepat.
Cara membuat masker dari jeruk nipis juga mudah, langkah pertama peras jeruk nipis, kemudian tempatkan di mangkuk kecil, tambahkan putih telur, dan aduknya hingga berbentuk masker. Cara mengaplikasikan pada wajah cukup dengan oleskan masker hingga merata dan diamkan selama 20 menit, setelah itu bilaslah dengan air bersih.
Buah alpukat selain enak dikonsumsi ternyata dapat diaplikasikan dalam bentuk masker wajah. Alpukat dipercaya dapat membantu kulit wajah terlihat lebih cerah. Buah dengan warna hijau segar kekuningan ini juga dipercaya dapat mencegah terjadinya penuaan dini karena memiliki antioksidan dan vitamin E yang dia miliki.
Cara menggunakannya adalah kerok bagian daging alpukat (1 buah), kemudian haluskan, dan oleskan secara merata pada wajah. Diamkan masker hingga kering, kemudian bilas dengan air hangat.
November 22, 2019 by freemexy
On November 26, one of North America’s largest and longest-running brewing equipment manufacturers formally ceased operations, following an order issued by the Supreme Court of Prince Edward Island in Canada.beer brewing equipment
The collapse of Diversified Metal Engineering (DME) spells millions of dollars lost for craft brewers, who paid the company for equipment that has not been, and perhaps will never be, received.
DME was formed in 2016 following the merger of Canadian equipment manufacturers Newlands Systems (NSI) of Abbotsford, BC, and DME Brewing Solutions of Charlottetown, PEI. The joint venture came after the earlier acquisition of DME Brewing Solutions by private equity firm Clearspring Capital Partners one year prior.
The company was placed into receivership on November 26 at the request of the Royal Bank of Canada. The bank is currently owed around $13.5 million plus interest and costs.
As for the breweries, Brewbound lists 10 Barrel Brewing, Anchorage Brewing, Diageo, Foam Brewers, Labatt, Lord Hobo, Maine Beer Co., Monday Night Brewing, Moosehead Breweries, New Belgium Brewing, Night Shift Brewing, Notch Brewing, Tired Hands Brewing, and Wicked Weed, among DMEs numerous creditors.
Speaking to Brewbound, Mahala Guevara, vice president of Texas’ Big Bend Brewing said she believes DMEs collapse will cause “a wave of breweries going out of business or financially restructuring significantly.”