It seems like every other ad and sponsorship on YouTube is for some VPN provider. While VPNs definitely have a purpose, they’re not a one-size-fits-all solution. There seems to be a lot of VPN myths and general misinformation about VPNs on the internet. Hopefully this post clears some of that up. How VPNs Work Before … Read more 4 VPN Myths Debunked
Keeping your online accounts secure is one of those important things that no one likes to do. But, it’s a necessity in today’s day and age, so here are a few tips on how to keep your accounts secure. Use Common Sense There’s not much you can do if a website implements poor security standards. … Read more How To Secure Your Online Accounts
There has been a debate going on for quite a while as to whether or not companies should implement backdoors into their encryption. While there are many valid points from both sides, backdoors would cause more problems than they solve. What Are Encryption Backdoors? Simply put, encryption backdoors are a way to break encryption without … Read more The Problem With Encryption Backdoors
The most important thing to keep in mind when choosing a VPN provider is how much you’re willing to trust them. If you misplace your trust, there are VPN providers that log everything you do and sell it. Which, if you’re using a VPN, probably is the exact opposite of what you want. As you … Read more Should You Run Your Own VPN Server?
At the same time everyone is concerned with how companies use their data, we’re moving towards an era where virtually everything will be done in the cloud. No longer will we need expensive computers with tons of processing power, and no longer will we need to remember on which computer we put what document on. … Read more Why We Need End-to-end Encryption
An awful lot of our lives seems to be occurring online these days; whether or not that’s a good thing is up to you. But, protecting the part of our lives that’s online seems like the obvious thing to do; we expect a certain level of privacy when sending a letter in the mail, so … Read more What is 184.108.40.206 and WARP?
When you think of the term “encryption”, you’re likely thinking of what is known as symmetric encryption. With symmetric encryption, you encrypt data with a password, and use the same exact password when you need to decrypt the data. This works fine when you’re encrypting a file, or maybe even an entire hard drive; however, … Read more Asymmetric Encryption
We all spend more time than we care to admit staring at our iPhone screens and mindlessly typing away. Everything from contacts to messages and images are things we would rather not have the world see. Boot Process The iPhone is designed with security in mind, starting as early as the boot process. Securing the … Read more How Secure Is Your iPhone?
What Is End-to-end Encryption? End-to-end encryption is a way to ensure only the sender and recipient of a message can see it. The message is encrypted on the sender’s device and can only be decrypted once it reaches the recipient. Although the message may be sent through one or more servers, it’s only stored in … Read more The Problems With End-to-end Encryption
iCloud is what makes all the magical features of backups and syncing happen, on Apple devices anyways. But, just how secure is your information stored in Apple’s cloud? “In Transit” vs “At Rest” These two terms are rather important for understanding the remainder of this post, so it’s important to understand what they mean with regard … Read more How Secure Is iCloud?