Latest Posts

Filter Posts

Clear all filters
Red fist with cascadings numbers.
1 min

3 things activists can do to strengthen their privacy and security

Plummeting press freedoms, stifled internet access, attempts to subvert encryption, and plenty of other indicators point to a budding...
Mohammed Al-Maskati
6 mins

Interview: Meet the person protecting human rights activists amid mass surveillance

Front Line Defenders’s Mohammed Al-Maskati has spent most of his life fighting for human rights in Bahrain and the...
An illustration of a laptop and a pick axe.
4 mins

Cryptojacking: What is it and how do I guard against it?

The term “cryptocurrency,” a combination of “cryptography” and “currency,” alludes to the fact that cryptocurrencies are a form of...
An illustration of a graduate's cap.
3 mins

How technology affects education

Technology in education systems comes with a couple of significant obstacles, but as with previous technologies, also presents some...
A thief attempts to steal a laptop.
5 mins

6 of the biggest crypto heists of all time

When you store your money in a traditional bank, you do so because you have few other options. Of...
Browser with boxes containing different types of browsing activity.
2 mins

You should be compartmentalizing your browsers. Here’s how it works.

We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish...
An illustration of a meter. Thumbs up on one end, thumbs down on the other.
4 mins

Your devices are rating you. Behave accordingly.

In a world judged by social media, a low score makes everyday life difficult. You can’t rent a car, book a hotel, or pay for flights.
An illustration of a CA certificate.
3 mins

What is a CA certificate, and how does it work?

Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to...
Profile of a man whose face has identifiable information about him.
4 mins

Anonymized demographic data can still be used to identify you

If you’re one of the few people who read terms of service, you may find buried in various companies’...
Numerous Bitcoin logos daisy-chained together.
4 mins

What is a Bitcoin node and who needs one?

The Bitcoin network does not have a central authority that decides which transactions are valid and which are not....
1 min
1 min

Demo Canva and Typeform Shortcode

3 mins
3 mins
4 mins
1 min

Featured Posts

4 mins
13 mins
8 mins
2 mins
4 mins
4 mins

The Three Greatest Scams in History

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online

This site is registered on wpml.org as a development site.