Face masks do help evade facial recognition tech—for now
A study by the U.S. government found that even some highly accurate algorithms failed to match photos of masked individuals to their pictures up to 50% of the time.
How (and why) to keep multiple online identities separate
To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
Infographic: How your phone gives up your privacy
This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Here’s how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the...
ExpressVPN launches a bug-bounty program hosted by Bugcrowd
We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.
The U.S. wants to stop funding open-source projects. Here’s why that’s bad.
You may not have heard of the Open Technology Fund (OTF), but you’ve probably used tools that have gotten its financial support—Tor, Tails, and...
What is malware? How viruses, trojans, and ransomware work
Definitions of the many types of malware, plus tips on how to protect yourself from viruses, trojans, and ransomware.
What is internet privacy and how should you protect your online privacy?
We use the internet for just about everything in our personal and private lives—and what we do online has become valuable data. Large corporations want...
How to secure your video-conferencing apps
This post was originally published on May 14, 2020. If you are working from home right now, chances are you are relying heavily on at...