What is the WPA2 Wi-Fi Encryption Vulnerability and how does it affect you?
WPA2 is a popular standard used to set up Wi-Fi networks and is most commonly used to authenticate users with a password but can...
Technical Overview: Preventing DNS Leaks When Switching Network Interfaces
To effectively offer a user privacy and security, a VPN application must ensure that a user’s DNS requests remain private for the entire duration...
ExpressVPN: Better Privacy and Security with Industry-Leading DNS Leak Protection
Many VPNs leak DNS data when your network connection changes, compromising your security and privacy. Learn how ExpressVPN protects you.
How to make Bitcoin Anonymous
Bitcoin is both an anonymous payment system and a transparent, open network where anyone can track and verify transactions. How can both be true? It...
The evolution of encryption and why governments hate it
Long before governments started fighting to outlaw encryption, politicians from around the world were turning to secret codes to communicate with one another. From...
iPhone vs. Bitcoin: Over the years, how many iPhones could you buy for 1...
Between its inception in 2009 and today, Bitcoin has enjoyed a spectacular rise in value. First traded in early 2010, the cryptocurrency was pretty...
A great scam or a good investment: What is an ICO?
Paris Hilton, Floyd Mayweather, The Game have all launched ICO projects. But what is an ICO? And are they worth your attention or investment?
The votes are in and your favorite ExpressVPN blog is…
Firstly, big thanks to everyone who voted for their favorite ExpressVPN blog! After counting the votes, it appears your favorite blog post is Lexie’s How...
Meet the five students fighting for the future of Dutch digital privacy
The Netherlands passed a law that will greatly increase government surveillance. These students wanted a public discussion first.
Q&A with TAILS on privacy and being labeled extremists by the NSA
TAILS is an OS that runs from a USB stick. It's optimized for security and privacy, and all traffic is routed through the Tor by default.