Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

171 Posts
0 Comments
15765 Claps
Edward Snowden's glasses.
3 mins

Quick biography: Edward Snowden

Since becoming a household name in 2013, Edward Snowden has remained in the global spotlight for his privacy advocacy and personal legal drama.
A laptop with a set of tools on the screen.
3 mins

3 lesser-known online privacy tools you should start using

ExpressVPN recently surveyed 3,000 users and non-users of VPN tools in France, the United Kingdom, and the United States....
A cloud padlock.
6 mins

How to back up your files and encrypt them

Choose the best backup method for you. Keep your data safe and accessible with these tips.
An envelope with a lock on it.
6 mins

How to improve your email security

No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From...
An illustratin of a woman juglging different faces.
10 mins

How (and why) to keep multiple online identities separate

To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Wrapping around a hexagonal bar.
6 mins

Modern-day encryption has ancient cryptography beginnings

How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would...
Magnifying glass over code.
3 mins

Here’s how bug bounties improve security

Software could be the most complex tool created by humans. While it might still be possible for a single...
A trojan horse with a bug inside.
3 mins

What is malware? How viruses, trojans, and ransomware work

Definitions of the many types of malware, plus tips on how to protect yourself from viruses, trojans, and ransomware.
A pigeon with a dollar sign for an eye.
3 mins

How do advertisers always know where you are?

To build a profile of you, advertisers can gather a multitude of information. They can follow you around the...
A whip with the lashes made from a stream of ones and zeroes.
3 mins

What is cybertorture? How our minds are vulnerable to online experiences

What will change if we are forced to move our social circle to virtual lands, browse the web anonymously,...

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online