-
The NSA versus the CIA: How to protect yourself from both
In 2013, Edward Snowden showed the National Security Agency (NSA) has a global surveillance apparatus covering all our digital communications. Then, in 2017, Wikileaks released a trove of data from in...
-
Perfect forward secrecy (PFS) explained
You’re on the beach with your metal detector and you come across a locked treasure chest. Even though you can’t open it, you decide to keep it anyway. Why? Because you might find the key later. Th...
-
Meet OSTIF, the privacy advocates who make the internet safer by auditing its code
ExpressVPN talks to Derek Zimmer: President and CEO of the Open Source Technology Improvement Fund (OSTIF), about his organization, the audit of OpenVPN, and the future of internet privacy tools. The ...
-
An interview with OSTIF, the team behind the OpenVPN audit
You’ve just completed your security audit of OpenVPN. Two people worked for almost two months on this project. How does such an audit work? It actually wound up being three researchers working a tot...
-
5 common apps that put your privacy at risk
In the cold Canadian winter, there’s nothing like a cup of Tim Hortons hot chocolate. With their app, it’s easier than ever to customize and order your favorite hot drink. However, you might not w...
-
The best ways to secure your Bitcoins
Not only has Bitcoin’s value gone up over the past year, but the available options for Bitcoin storage have also increased. The choice can be especially intimidating for Bitcoin novices. No matter w...
-
Whistleblowing guide: How to protect your sources
** This is part three of ExpressVPN's whistleblowing guide. ** Part 1: Whistleblowing guide: Blowing the whistle is tough Part 2: Whistleblowing guide: How to stay anonymous when blowing the whistle P...
-
How you could lose everything with Bitcoin
With the value of cryptocurrencies skyrocketing into the $100 billion range, it’s easy to get infected by the biggest “digital gold rush” since the dot com bubble. But while everyone with half a...
-
What is an SSL stripping attack? How can you prevent it?
There are two types of SSL-based attacks: SSL stripping and SSL downgrading. In SSL downgrading, a hacker attempts to trick the server into abandoning an encrypted connection in favor of a less secure...
-
Internet safety for kids: 10 rules every parent must know
The internet can be an incredible place for kids to learn, explore, and stay entertained—but it also comes with serious risks. From cyberbullying to online predators and privacy threats, children fa...
Tips & tricks
