-
7 times the internet was gloriously ridiculous
The internet is a very silly place indeed, and only a fool would wander through its murky shores unprotected. To celebrate my not-quite-100th blog post, I thought it might be fun to showcase some of t...
-
6 features we actually want on our iPhones
This article was originally published on October 27, 2017. New phones are exciting. They bring new features, make existing features more powerful and get us excited about spending half a month’s wag...
-
An interview with Bruce Schneier on the Internet of Things, global surveillance, and cybersecurity
Bruce Schneier is a world-renowned cryptographer and security technologist whom the Economist has dubbed an “internet-security guru.” Schneier has authored a dozen books since 1993, with his next ...
-
What is the WPA2 Wi-Fi Encryption Vulnerability and how does it affect you?
WPA2 is a popular standard used to set up Wi-Fi networks and is most commonly used to authenticate users with a password but can also handle more sophisticated authentication schemes using usernames, ...
-
Technical Overview: Preventing DNS Leaks When Switching Network Interfaces
To effectively offer a user privacy and security, a VPN application must ensure that a user’s DNS requests remain private for the entire duration of the connection to the VPN. Applications usually d...
-
ExpressVPN: Better Privacy and Security with Industry-Leading DNS Leak Protection
This post was originally published on October 12, 2017. Sometimes a VPN can fail to protect your device’s DNS (Domain Name System) queries even when the rest of your traffic is protected by the VPN ...
-
Is Bitcoin traceable? Privacy risks & how to stay anonymous
Think Bitcoin is untraceable? Think again. Every Bitcoin transaction leaves a digital footprint. Investigators, hackers, and even governments can track your Bitcoin transaction history—sometimes all...
-
The evolution of encryption and why governments hate it
Long before governments started fighting to outlaw encryption, politicians from around the world were turning to secret codes to communicate with one another. From Julius Caesar’s cipher to Thomas J...
-
iPhone vs. Bitcoin: Over the years, how many iPhones could you buy for 1 Bitcoin?
Between its inception in 2009 and today, Bitcoin has enjoyed a spectacular rise in value. First traded in early 2010, the cryptocurrency was pretty much worthless through its first year. In June 2010,...
-
A great scam or a good investment: What is an ICO?
This post was originally published on September 28, 2017. An ICO is an Initial Coin Offering, which essentially means “raising money on the blockchain.” It’s become quite the status symbol to pr...
Featured
