Latest Posts

Filter Posts

Clear all filters
Bitcoin logo with arrow
6 mins

Upgrading Bitcoin, Part 2: A challenging process

It takes time for an idea to turn into code, and that code to be deployed on the Bitcoin network. Here is how this process works.
Shield with a home on it.
2 mins

Turn your old Android phone into a security camera

Don’t throw out your old Android phone! We’ll show you how to turn it into a DIY security camera instead.
2021 year with a zero falling off.
9 mins

14 cybersecurity resolutions to stay private in 2021

With the new year almost upon us, it’s time to sit down and draw up a few New Year’s...
various operating system logos
9 mins

Ranked: Top operating systems for security and privacy

We take a look at some of the most popular operating systems, including Windows 10, iOS, macOS, and Android, and rank them based on privacy and security.
Video camera icon with confetti and numbers around it.
2 mins

5 things to do in isolation, whatever your holiday mood

Spend your socially distanced holidays the way you want, whether it’s with others or in your own company.
apple-facebook-feud
3 mins

Why is Facebook fighting Apple’s App Store ‘privacy labels’?

Apple has started requiring apps in its App Store to provide privacy labels, which tell users what types of data the app collects and sends to third parties.
code on celluloid film
15 mins

Top 12 surveillance-themed movies and shows

Our picks for some of the most entertaining movies and shows about privacy and surveillance.
bitcoin logo with parachute
7 mins

Upgrading Bitcoin, Part 1: The pitfalls of hard forks and soft...

The Bitcoin network relies on strong consensus rules. These can be upgraded through forks, but it isn’t always easy.
Microchip manipulating marionette
8 mins

New AI tech bodes ill for identity theft, scams, and propaganda

Artificial intelligence like GPT-3 is advancing deepfakes by imitating real faces, voices, and words. This could spell trouble for the future of humanity.
Tin cans connected by a string.
3 mins

Why more apps should integrate Tor

It allows for end-to-end encrypted peer-to-peer connections on the dark web.
1 min
1 min

Demo Canva and Typeform Shortcode

3 mins
3 mins
4 mins
1 min

Featured Posts

4 mins
4 mins
3 mins
3 mins

DNS hijacking explained

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online

This site is registered on wpml.org as a development site.