What are VPN connection logs?
A connection log is a record of incoming and outgoing connections to a VPN server which may include:
A user’s IP address
The IP address of...
Not even a scandal will stop Facebook from harvesting your data
News of Facebook’s role in Cambridge Analytica’s collection of millions of user profiles leading up to the 2016 US general elections paints a worrisome...
5 defiant, worrying, or outright bizarre Edward Snowden statements
Like the great Nostradamus, Edward Snowden has been a purveyor of the future, signaling time and again signs of things to come. Since joining...
Go incognito: Avoid surveillance in real life
Here are 6 ways to avoid CCTV cameras and stay anonymous as you move about in your everyday life.
5 most shocking cyber scams of 2017
The results are in and 2017 is already being called the worst year in terms of cyber scams. Where 2016 saw an influx of...
In memory of John Perry Barlow
It is with great sadness that we received the news of John Perry Barlow’s passing. Very early on, Barlow saw the internet as a...
4 guides that will help improve your digital security
The ExpressVPN blog features advice, explanations, reviews, information security updates, online privacy, politics, ExpressVPN products, and all the things about which we are passionate.
Some...
The website that knows where your cat lives
Fact: Cats like attention. Anyone who’s ever tried to watch the TV around a cat licking its nether-regions in front of the screen will...
Two Supreme Court cases that will redefine your digital privacy in 2018
NOTE: This post was originally published on January 16, 2018
Within the next six months, the U.S. Supreme Court will rule on two cases that...
How to use Bitcoin’s multisignature wallets
A Bitcoin generally can only be spent by its owner as identified through their public key hash, e.g., their Bitcoin address. The Bitcoin protocol...