Select Page
Do You Have To Sacrifice Privacy For Cloud Storage?

Do You Have To Sacrifice Privacy For Cloud Storage?

Having everything on the cloud (i.e. cloud storage) is great; it means you don't have to remember if you saved that document on your desktop or laptop. You can also access your files from any computer connected to the internet, as well as not worry about what happens...

4 VPN Myths Debunked

4 VPN Myths Debunked

It seems like every other ad and sponsorship on YouTube is for some VPN provider. While VPNs definitely have a purpose, they're not a one-size-fits-all solution. There seems to be a lot of VPN myths and general misinformation about VPNs on the internet. Hopefully this...

Should You Run Your Own VPN Server?

Should You Run Your Own VPN Server?

The most important thing to keep in mind when choosing a VPN provider is how much you're willing to trust them. If you misplace your trust, there are VPN providers that log everything you do and sell it. Which, if you're using a VPN, probably is the exact opposite of...

Why We Need End-to-end Encryption

Why We Need End-to-end Encryption

At the same time everyone is concerned with how companies use their data, we're moving towards an era where virtually everything will be done in the cloud. No longer will we need expensive computers with tons of processing power, and no longer will we need to remember...

The Privacy Problems With iCloud

The Privacy Problems With iCloud

I recently went all-in on the Apple ecosystem, replacing my laptop with a MacBook and my primary computer with an iMac. As such, it made sense for me to switch from Chrome to Safari, but more importantly, I switched from Google Drive to iCloud Drive because the latter...

What is 1.1.1.1 and WARP?

What is 1.1.1.1 and WARP?

An awful lot of our lives seems to be occurring online these days; whether or not that’s a good thing is up to you. But, protecting the part of our lives that’s online seems like the obvious thing to do; we expect a certain level of privacy when sending a letter in...

Asymmetric Encryption

Asymmetric Encryption

When you think of the term “encryption”, you’re likely thinking of what is known as symmetric encryption. With symmetric encryption, you encrypt data with a password, and use the same exact password when you need to decrypt the data. This works fine when you’re...

How Secure Is Your iPhone?

How Secure Is Your iPhone?

We all spend more time than we care to admit staring at our iPhone screens and mindlessly typing away. Everything from contacts to messages and images are things we would rather not have the world see. Boot Process The iPhone is designed with security in mind,...

The No Encryption Dystopia

The No Encryption Dystopia

Yet again, the US government is proposing that “warrant-proof” encryption be made illegal. Attorney General Barr essentially states that encryption as it currently stands allows criminals to completely hide their communications from the government. While that...

The Problems With End-to-end Encryption

The Problems With End-to-end Encryption

What Is End-to-end Encryption? End-to-end encryption is a way to ensure only the sender and recipient of a message can see it. The message is encrypted on the sender’s device and can only be decrypted once it reaches the recipient. Although the message may be sent...

Recently Published

Newsletter

Sign up here to be one of the first to know when we publish a post, as well as other exclusive blog updates.