-
What is the WPA2 Wi-Fi Encryption Vulnerability and how does it affect you?
WPA2 is a popular standard used to set up Wi-Fi networks and is most commonly used to authenticate users with a password but can also handle more sophisticated authentication schemes using usernames, ...
-
Technical Overview: Preventing DNS Leaks When Switching Network Interfaces
To effectively offer a user privacy and security, a VPN application must ensure that a user’s DNS requests remain private for the entire duration of the connection to the VPN. Applications usually d...
-
ExpressVPN: Better Privacy and Security with Industry-Leading DNS Leak Protection
This post was originally published on October 12, 2017. Sometimes a VPN can fail to protect your device’s DNS (Domain Name System) queries even when the rest of your traffic is protected by the VPN ...
-
Is Bitcoin traceable? Privacy risks & how to stay anonymous
Think Bitcoin is untraceable? Think again. Every Bitcoin transaction leaves a digital footprint. Investigators, hackers, and even governments can track your Bitcoin transaction history—sometimes all...
-
The evolution of encryption and why governments hate it
Long before governments started fighting to outlaw encryption, politicians from around the world were turning to secret codes to communicate with one another. From Julius Caesar’s cipher to Thomas J...
-
iPhone vs. Bitcoin: Over the years, how many iPhones could you buy for 1 Bitcoin?
Between its inception in 2009 and today, Bitcoin has enjoyed a spectacular rise in value. First traded in early 2010, the cryptocurrency was pretty much worthless through its first year. In June 2010,...
-
A great scam or a good investment: What is an ICO?
This post was originally published on September 28, 2017. An ICO is an Initial Coin Offering, which essentially means “raising money on the blockchain.” It’s become quite the status symbol to pr...
-
The votes are in and your favorite ExpressVPN blog is...
Firstly, big thanks to everyone who voted for their favorite ExpressVPN blog! After counting the votes, it appears your favorite blog post is Lexie’s How banks or governments could wipe Bitcoin off ...
-
Meet the five students fighting for the future of Dutch digital privacy
UPDATE: Wednesday October 11, 2017 Meet the five students who fought for the future of Dutch digital privacy... And won! They did it! The students behind the Sleepwet petition surpassed 300,000 signat...
-
Q&A with TAILS on privacy and being labeled extremists by the NSA
This post was originally published on September 4, 2017. This blog has never made any attempt to disguise our love of TAILS (The Amnesic Incognito Live System). TAILS is an operating system optimized ...
Featured
