What’s best for internet privacy: Tor then VPN, or VPN then...
There's ongoing confusion about how VPNs and Tor compare in regards to privacy and anonymity and competing opinions on...
Salts and hashes: How apps and websites protect your passwords
Password protection methods like Diceware, password managers, and two-factor authentication are just one side of the story. What are...
Why the world must demand a decentralized internet
Development of various packet switching networks like ARPANET laid the foundations of the modern internet, for example by adopting...
What is an .onion address on Tor, and how to get...
Getting the URL of your choice is quite straight forward on the regular internet. But getting a vanity .onion domain can be lengthy work.
Is there a big Pokémon Go conspiracy? Probably not
There can be no doubt about it; Pokémon Go has taken the world by storm. The application has quickly...
The 3 best Bitcoin wallets for Android
*Are you looking for the best Bitcoin Wallets for iOS? Click here.* Android was the first mobile platform with Bitcoin...
ExpressVPN reviews the 3 best Bitcoin wallets for iOS
*Are you looking for the best Bitcoin Wallets for Android? Click here.* As recently as 2014, there was only one...
Pokémon, no! 9 privacy issues to consider when playing Pokémon Go
NOTE: This post was originally published on July 13, 2016 Within just a few days of its launch, Pokémon Go...
How to secure your Bitcoins and prevent irrecoverable wallet loss
Your Bitcoin wallet is like a Swiss bank account in your pocket. It’s not easy for others to view...
How to replace old or damaged hard drives securely
If you are like most other computer users, you’ll rarely throw away or delete data. And with disk space...