Tips & tricks

Padlock with omni-directional protection.
2 mins
PGP is still pretty good for privacy
Many privacy advocates use PGP (GNU Privacy Guard/GPG in its open source form) to encrypt, sign, and verify data and text of all sorts. PGP...
Use unique passwords for each online account.
3 mins
Why you should use a unique password for every online account
So, you’re signing up for yet another online service. It’ll probably ask you to choose password with rules like: Must have at least eight...
FB ISP privacy
2 mins
Upset about Facebook? You should be more worried about your ISP
Sure, Facebook’s data policies are bad, but they pale in comparison to your ISP’s (internet service provider). With Congress recently passing legislation that allows...
A printer with a surveillance eye.
3 mins
Here’s why your printer is a tattletale
When you print, scan, or copy a document at home or in the office, it might look like any other document to your eyes....
Protect against DNS leaks.
3 mins
What are DNS leaks and how to prevent them
A DNS leak is when your VPN connection reveals information about your DNS requests to a third party. Here's how ExpressVPN stops DNS leaks.
Best Edward Snowden Tweets
4 mins
5 defiant, worrying, or outright bizarre Edward Snowden statements
Here are some of his strangest, strongest, and most influential things Snowden has said over the last few years.
How to improve your digital security
1 min
4 guides that will help improve your digital security
The ExpressVPN blog features advice, explanations, reviews, information security updates, online privacy, politics, ExpressVPN products, and all the things about which we are passionate. Some...
Supreme Court building overflowing with data
4 mins
Two Supreme Court cases that will redefine your digital privacy in 2018
NOTE: This post was originally published on January 16, 2018 Within the next six months, the U.S. Supreme Court will rule on two cases that...
Bitcoin's multisig wallets and how to use them
6 mins
How to use Bitcoin’s multisignature wallets
A Bitcoin generally can only be spent by its owner as identified through their public key hash, e.g., their Bitcoin address. The Bitcoin protocol...
Non-interactive zero-knowledge proofs example: Sudoku and playing cards
2 mins
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs
In part 1 of our zero-knowledge proof series, we explained how a zero-knowledge proof could work when the verifier and the prover interact with...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online