-
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues coins, and nobody who can take them back. Nobody knows how...
-
How to stop the Kazakhstan government from intercepting your internet traffic
Update: The Kazakh government has halted its CA plans for now. If you previously installed the certificate, make sure it has been thoroughly removed from your system, and let us know if you encounter ...
-
9 things you can do with a home server
Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted into a server without any physical modifications, and even a modest d...
-
Staying private online could save you big bucks
By far the biggest offenders when it comes to mining your data are not governments or police, but rather advertising agencies. They will buy up your credit card history from your bank, embed trackers ...
-
ExpressVPN survey reveals Americans do care about privacy after all
NOTE: This post was originally published on June 13, 2019 A representative survey, commissioned by ExpressVPN and undertaken by Propeller Insights, produced many surprising results while confirming so...
-
How to set up your own home server
This guide requires you to use the command line interface, or CLI, and an SSH client. SSH (Secure Shell) is a popular tool to “remote control” devices securely. In principle, it functions similarl...
-
6 common misconceptions about passwords
We all need passwords. They are by far the most used form of authentication, not only for accessing accounts over the internet, but also for phone banking, ATM use, opening a safe, and even to take bo...
-
Share files securely and anonymously with OnionShare 2
We’ve been using OnionShare for a while at ExpressVPN and are quite excited to get our hands on the second version of Micah Lee’s convenient privacy tool. Before OnionShare, sending files to a col...
-
Laws that threaten internet freedom around the world
We recently explained why Australia’s new cybersecurity bill is a bad idea. It gives law enforcement the ability to coerce anybody into using compromising apps, handing over passwords, or snitching ...
-
What are botnets, and how do you protect against them?
Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit by criminal organizations, botnets can, for example, be used to mine cry...