Here’s why your printer is a tattletale
When you print, scan, or copy a document at home or in the office, it might look like any other document to your eyes....
What are DNS leaks and how to prevent them
A DNS leak is when your VPN connection reveals information about your DNS requests to a third party. Here's how ExpressVPN stops DNS leaks.
5 defiant, worrying, or outright bizarre Edward Snowden statements
Here are some of his strangest, strongest, and most influential things Snowden has said over the last few years.
4 guides that will help improve your digital security
The ExpressVPN blog features advice, explanations, reviews, information security updates, online privacy, politics, ExpressVPN products, and all the things about which we are passionate. Some...
Two Supreme Court cases that will redefine your digital privacy in 2018
NOTE: This post was originally published on January 16, 2018 Within the next six months, the U.S. Supreme Court will rule on two cases that...
How to use Bitcoin’s multisignature wallets
A Bitcoin generally can only be spent by its owner as identified through their public key hash, e.g., their Bitcoin address. The Bitcoin protocol...
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs
In part 1 of our zero-knowledge proof series, we explained how a zero-knowledge proof could work when the verifier and the prover interact with...
Meet Federico Tenga: The guy who teaches North Koreans about Bitcoin
Despite being the most hermetic country on Earth, North Korea is certainly no stranger to cyberspace—in both its uses and abuses. Despite a tiny...
ExpressVPN’s 2017 Cyber Monday and Black Friday VPN Discount!
***ExpressVPN's 2017 Cyber Monday deal is over, but you can still get 35% off a one year subscription!*** Black Friday is back, which means it’s...
Zero-knowledge proofs explained: Part 1
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs Cryptography mostly concerns itself with secure communications and includes hiding information from adversaries and authentication of individuals. Hashes,...