BestVPN.com Awards gives ExpressVPN top honors
NOTE: This post was originally published on December 18, 2017
Over the last few weeks, people have voted at BestVPN.com for their favorite VPN service—across...
Is your VPN protecting your privacy and security? Check for yourself with the new...
With cyber attacks and hacks, government surveillance, and big data mining all on the rise, more and more people are turning to VPNs to...
It’s official: ExpressVPN is number 1 for speed
In an independent review, BestVPN.com tested 15 VPN services in a series of controlled speed tests. The test confirmed ExpressVPN as the fastest VPN,...
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs
In part 1 of our zero-knowledge proof series, we explained how a zero-knowledge proof could work when the verifier and the prover interact with...
Which countries do the Dutch join with their new mass surveillance law?
It’s official—the Dutch government doesn’t care about its citizens’ right to privacy.
With its new mass surveillance law, the Netherlands will join the US, UK,...
3 things the U.S. could learn from India’s new net neutrality rules
On November 28th, the Telecom Regulatory Authority of India (TRAI) released its own set of recommendations declaring the internet as a basic human right....
The Three Greatest Scams in History
Long before the internet, people cheated each other in more and less creative ways. Three particularly imaginative scammers managed to sell the Eiffel Tower...
Meet Federico Tenga: The guy who teaches North Koreans about Bitcoin
Despite being the most hermetic country on Earth, North Korea is certainly no stranger to cyberspace—in both its uses and abuses. Despite a tiny...
Five myths that the NSA wants you to believe about FISA 702
UPDATE: January 19, 2018
On January 18, the Senate officially voted to reauthorize FISA Section 702 in a 65-34 vote. The President will almost certainly...
Zero-knowledge proofs explained: Part 1
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs
Cryptography mostly concerns itself with secure communications and includes hiding information from adversaries and authentication of individuals.
Hashes,...