ExpressVPN username and password authentication.

How ExpressVPN authenticates its apps

How do ExpressVPN servers know which app belongs to a customer and which does not? On most apps, the authentication happens in the background....
Secure your Bitcoins!

The best ways to secure your Bitcoins

Not only has Bitcoin’s value gone up over the past year, but the available options for Bitcoin storage have also increased. The choice can...
How to keep your kids safe online.

Internet safety guide: 5 ways to help your child stay safe online

Last Updated: You may not see it on the evening news, but the world of education technology is booming. In fact, experts say investments...
What you need to know about OSTIF's OpenVPN audit

The facts about the OSTIF OpenVPN source code audit

With funding from the Open Source Technology Improvement Fund (OSTIF), a group of security experts from QuarksLab spent the first few months of 2017...
OSTIF is auditing OpenVPN for the benefit of all.

Meet OSTIF, the privacy advocates who make the internet safer by auditing its code

ExpressVPN talks to Derek Zimmer: President and CEO of the Open Source Technology Improvement Fund (OSTIF), about his organization, the audit of OpenVPN, and...
OSTIF is auditing OpenVPN for the benefit of all.

An interview with OSTIF, the team behind the OpenVPN audit

You’ve just completed your security audit of OpenVPN. Two people worked for almost two months on this project. How does such an audit work? It...
ExpressVPN: Perfect Forward Secrecy

Perfect Forward Secrecy makes encryption safer

Encryption protocols keep you safe and your communications private. A secure chat app will encrypt conversations, and HTTPS secures websites (indicated by a green lock in...
NSA v CIA

The NSA versus the CIA: How to protect yourself from both

In 2013, Edward Snowden showed the National Security Agency (NSA) has a global surveillance apparatus covering all our digital communications. Then, in 2017, Wikileaks released...

A comparison of two-factor authentication methods: Which is best for you?

Two-factor authentication makes it impossible for hackers to break into your accounts by brute-force and even protects you if the hackers get your password....
when iot goes wrong

I’m sorry, Dave. I’m afraid I can’t do that: When virtual assistants go very,...

The Wall Street Journal estimates that one million IoT devices were recently used by hackers to carry out a glut of DDoS attacks. But it’s...

Popular Posts