Having everything on the cloud (i.e. cloud storage) is great; it means you don’t have to remember if you saved that document on your desktop or laptop. You can also access your files from any computer connected to the internet, as well as not worry about what happens if your computer dies. However, that convenience … Read more Do You Have To Sacrifice Privacy For Cloud Storage?
It seems like every other ad and sponsorship on YouTube is for some VPN provider. While VPNs definitely have a purpose, they’re not a one-size-fits-all solution. There seems to be a lot of VPN myths and general misinformation about VPNs on the internet. Hopefully this post clears some of that up. How VPNs Work Before … Read more 4 VPN Myths Debunked
The most important thing to keep in mind when choosing a VPN provider is how much you’re willing to trust them. If you misplace your trust, there are VPN providers that log everything you do and sell it. Which, if you’re using a VPN, probably is the exact opposite of what you want. As you … Read more Should You Run Your Own VPN Server?
At the same time everyone is concerned with how companies use their data, we’re moving towards an era where virtually everything will be done in the cloud. No longer will we need expensive computers with tons of processing power, and no longer will we need to remember on which computer we put what document on. … Read more Why We Need End-to-end Encryption
I recently went all-in on the Apple ecosystem, replacing my laptop with a MacBook and my primary computer with an iMac. As such, it made sense for me to switch from Chrome to Safari, but more importantly, I switched from Google Drive to iCloud Drive because the latter is much better integrated into the OS. … Read more The Privacy Problems With iCloud
An awful lot of our lives seems to be occurring online these days; whether or not that’s a good thing is up to you. But, protecting the part of our lives that’s online seems like the obvious thing to do; we expect a certain level of privacy when sending a letter in the mail, so … Read more What is 126.96.36.199 and WARP?
When you think of the term “encryption”, you’re likely thinking of what is known as symmetric encryption. With symmetric encryption, you encrypt data with a password, and use the same exact password when you need to decrypt the data. This works fine when you’re encrypting a file, or maybe even an entire hard drive; however, … Read more Asymmetric Encryption
We all spend more time than we care to admit staring at our iPhone screens and mindlessly typing away. Everything from contacts to messages and images are things we would rather not have the world see. Boot Process The iPhone is designed with security in mind, starting as early as the boot process. Securing the … Read more How Secure Is Your iPhone?
Yet again, the US government is proposing that “warrant-proof” encryption be made illegal. Attorney General Barr essentially states that encryption as it currently stands allows criminals to completely hide their communications from the government. While that point is valid, the modern alternatives are even worse than how things currently stand. Here are just a few of … Read more The No Encryption Dystopia
What Is End-to-end Encryption? End-to-end encryption is a way to ensure only the sender and recipient of a message can see it. The message is encrypted on the sender’s device and can only be decrypted once it reaches the recipient. Although the message may be sent through one or more servers, it’s only stored in … Read more The Problems With End-to-end Encryption