4 VPN Myths Debunked

4 VPN Myths Debunked

It seems like every other ad and sponsorship on YouTube is for some VPN provider. While VPNs definitely have a purpose, they're not a one-size-fits-all solution. There seems to be a lot of VPN myths and general misinformation about VPNs on the internet. Hopefully this...

How To Secure Your Online Accounts

How To Secure Your Online Accounts

Keeping your online accounts secure is one of those important things that no one likes to do. But, it's a necessity in today's day and age, so here are a few tips on how to keep your accounts secure. Use Common Sense There's not much you can do if a website implements...

The Problem With Encryption Backdoors

The Problem With Encryption Backdoors

There has been a debate going on for quite a while as to whether or not companies should implement backdoors into their encryption. While there are many valid points from both sides, backdoors would cause more problems than they solve. What Are Encryption Backdoors?...

Should You Run Your Own VPN Server?

Should You Run Your Own VPN Server?

The most important thing to keep in mind when choosing a VPN provider is how much you're willing to trust them. If you misplace your trust, there are VPN providers that log everything you do and sell it. Which, if you're using a VPN, probably is the exact opposite of...

Why We Need End-to-end Encryption

Why We Need End-to-end Encryption

At the same time everyone is concerned with how companies use their data, we're moving towards an era where virtually everything will be done in the cloud. No longer will we need expensive computers with tons of processing power, and no longer will we need to remember...

What is 1.1.1.1 and WARP?

What is 1.1.1.1 and WARP?

An awful lot of our lives seems to be occurring online these days; whether or not that’s a good thing is up to you. But, protecting the part of our lives that’s online seems like the obvious thing to do; we expect a certain level of privacy when sending a letter in...

Asymmetric Encryption

Asymmetric Encryption

When you think of the term “encryption”, you’re likely thinking of what is known as symmetric encryption. With symmetric encryption, you encrypt data with a password, and use the same exact password when you need to decrypt the data. This works fine when you’re...

How Secure Is Your iPhone?

How Secure Is Your iPhone?

We all spend more time than we care to admit staring at our iPhone screens and mindlessly typing away. Everything from contacts to messages and images are things we would rather not have the world see. Boot Process The iPhone is designed with security in mind,...

The Problems With End-to-end Encryption

The Problems With End-to-end Encryption

What Is End-to-end Encryption? End-to-end encryption is a way to ensure only the sender and recipient of a message can see it. The message is encrypted on the sender’s device and can only be decrypted once it reaches the recipient. Although the message may be sent...

How Secure Is iCloud?

How Secure Is iCloud?

iCloud is what makes all the magical features of backups and syncing happen, on Apple devices anyways. But, just how secure is your information stored in Apple’s cloud? “In Transit” vs “At Rest” These two terms are rather important for understanding the remainder...

Newsletter

Sign up here to be one of the first to know when we publish a post, as well as other exclusive blog updates.