-
An interview with Mark Burdon on the sensor society phenomenon
Our devices, as convenient as they may be, are getting creepily good at collecting data. Phones, cars, and even carpets are packed full of sensors that can detect and record day-to-day activities with...
-
3 cryptocurrencies that care about your privacy
Bitcoin is not perfectly anonymous. While it's true that you don’t have to connect your real name or phone number to a Bitcoin transaction, there are multiple ways to de-anonymize your account. Ever...
-
7 times the internet was gloriously ridiculous
The internet is a very silly place indeed, and only a fool would wander through its murky shores unprotected. To celebrate my not-quite-100th blog post, I thought it might be fun to showcase some of t...
-
6 features we actually want on our iPhones
This article was originally published on October 27, 2017. New phones are exciting. They bring new features, make existing features more powerful and get us excited about spending half a month’s wag...
-
An interview with Bruce Schneier on the Internet of Things, global surveillance, and cybersecurity
Bruce Schneier is a world-renowned cryptographer and security technologist whom the Economist has dubbed an “internet-security guru.” Schneier has authored a dozen books since 1993, with his next ...
-
What is the WPA2 Wi-Fi Encryption Vulnerability and how does it affect you?
WPA2 is a popular standard used to set up Wi-Fi networks and is most commonly used to authenticate users with a password but can also handle more sophisticated authentication schemes using usernames, ...
-
Technical Overview: Preventing DNS Leaks When Switching Network Interfaces
To effectively offer a user privacy and security, a VPN application must ensure that a user’s DNS requests remain private for the entire duration of the connection to the VPN. Applications usually d...
-
ExpressVPN: Better Privacy and Security with Industry-Leading DNS Leak Protection
This post was originally published on October 12, 2017. Sometimes a VPN can fail to protect your device’s DNS (Domain Name System) queries even when the rest of your traffic is protected by the VPN ...
-
Is Bitcoin traceable? Privacy risks & how to stay anonymous
Think Bitcoin is untraceable? Think again. Every Bitcoin transaction leaves a digital footprint. Investigators, hackers, and even governments can track your Bitcoin transaction history—sometimes all...
-
The evolution of encryption and why governments hate it
Long before governments started fighting to outlaw encryption, politicians from around the world were turning to secret codes to communicate with one another. From Julius Caesar’s cipher to Thomas J...
Featured
