Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • Internet hacks: Brute-force attacks and how to stop them

    Internet hacks: Brute-force attacks and how to stop them

    A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...

    Lexie 29.03.2016 6 mins
  • What is a man-in-the-middle (MITM) attack?

    What is a man-in-the-middle (MITM) attack?

    A man-in-the-middle attack (also described as monster-in-the-middle, or MITM) describes a very specific attack in which the attacker sits between the two victims (in this case, you and the server). Bo...

    Lexie 08.03.2023 11 mins
  • How much can metadata reveal? Just ask John McAfee

    How much can metadata reveal? Just ask John McAfee

    Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...

    Lexie 14.03.2016 1 mins
  • The court case that will define technology and privacy for decades

    The court case that will define technology and privacy for decades

    On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...

    Lexie 07.03.2016 10 mins
  • OnionShare: Secure and anonymous file sharing

    OnionShare: Secure and anonymous file sharing

    Sharing files can be a hassle. Even when in the same room as the person you want to share files with, the easiest option is often to share them with a USB stick. But when you’re hundreds or thousand...

    Lexie 29.02.2016 5 mins
  • Guide to stronger passwords – Part 3 (Diceware)

    Guide to stronger passwords – Part 3 (Diceware)

    This is Part 3 of our stronger password series. For the other parts, click below: Part 1 (Two-factor authentication) Part 2 (Password managers) Generate secure and memorable passwords with Diceware If...

    Lexie 24.02.2016 4 mins
  • Guide to stronger passwords, Part 2 (password managers)

    Guide to stronger passwords, Part 2 (password managers)

    This is Part 2 of our stronger password series. For the other parts, click below: Part 1 (Two-factor Authentication) Part 3 (Diceware) In Part 1 of our Guide to Stronger Passwords, we explained two-fa...

    Lexie 15.02.2016 3 mins
  • Guide to stronger passwords, Part 1 (two-factor authentication)

    Guide to stronger passwords, Part 1 (two-factor authentication)

    This is Part 1 of our stronger password series. For the other parts, click below: Part 2 (Password Managers) Part 3 (Diceware) ExpressVPN has written a three-part series in which we highlight three ea...

    Lexie 08.02.2016 6 mins
  • How to keep your messages private and anonymous

    How to keep your messages private and anonymous

    Keeping your chats private can be an arduous and tiring task. And trying to keep them anonymous can be very daunting. Yet our chats contain some of our most sensitive pieces of information - we often ...

    Lexie 01.02.2016 6 mins
  • Tails 2.0 installation and review

    Tails 2.0 installation and review

    This post was originally published on January 25, 2016. One of the major barriers Edward Snowden faced when preparing the most extensive leak of classified documents in modern history was teaching Gle...

    Lexie 25.01.2016 4 mins
Get Started