-
18 top tips to protect your online privacy in 2025
Take your internet privacy seriously. With cybercriminals stalking the internet and social engineering attacks on the rise, it’s prudent to keep yourself safe and guarded on the web. Protecting your...
-
Upgrading Bitcoin, Part 2: A challenging process
Previously we discussed why upgrading Bitcoin is so difficult. Bitcoin is a network that’s reliant on full consensus of all participants, so it is notoriously difficult and often highly controversia...
-
Turn your old Android phone into a security camera
In 2017, Edward Snowden along with The Guardian Project developed and released ...
-
14 cybersecurity resolutions to stay private in 2023
With the new year almost upon us, it’s time to sit down and draw up a few New Year’s resolutions. You might want to hit the (home) gym more, check a few travel goals off your list (even if they ma...
-
5 things to do in isolation, whatever your holiday mood
This post was originally published on December 23, 2020. The winter days feel particularly dark this year, with travel restrictions discouraging visits to family and friends over the holiday season. B...
-
Why is Facebook fighting Apple’s App Store ‘privacy labels’?
This post was originally published on December 22, 2020. Whenever large tech corporations position themselves as champions for privacy, there’s always plenty of room for skepticism. But Apple’s in...
-
Top 12 surveillance-themed movies and shows
Welcome to the ExpressVPN viewing lounge, where we’ll be presenting our favorite privacy-themed movies and TV shows. While surveillance seems to be an intensifying issue around the world today, the ...
-
Upgrading Bitcoin, Part 1: The pitfalls of hard forks and soft forks
The Bitcoin protocol is known for developing slowly, favoring predictability and compatibility over the prevalent Silicon Valley ethos of “move fast and break things.” Indeed, the Bitcoin network ...
-
New AI tech bodes ill for identity theft, scams, and propaganda
What happens when AI and machine learning evolve beyond the uncanny valley? How will we know what is real and what isn’t? Developments in AI and machine learning have progressed forward in leaps and...
-
Why more apps should integrate Tor
Tor is most known for its anonymous browser. The Tor browser is built on Firefox and customized to defend against the most common forms of tracking as well as malicious code on the sites you visit. Al...
Featured
