BestVPN.com Awards gives ExpressVPN top honors
NOTE: This post was originally published on December 18, 2017 Over the last few weeks, people have voted at BestVPN.com for their favorite VPN service—across...
Is your VPN protecting your privacy and security? Check for yourself with the new...
With cyber attacks and hacks, government surveillance, and big data mining all on the rise, more and more people are turning to VPNs to...
It’s official: ExpressVPN is number 1 for speed
In an independent review, BestVPN.com tested 15 VPN services in a series of controlled speed tests. The test confirmed ExpressVPN as the fastest VPN,...
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs
In part 1 of our zero-knowledge proof series, we explained how a zero-knowledge proof could work when the verifier and the prover interact with...
Which countries do the Dutch join with their new mass surveillance law?
It’s official—the Dutch government doesn’t care about its citizens’ right to privacy. With its new mass surveillance law, the Netherlands will join the US, UK,...
3 things the U.S. could learn from India’s new net neutrality rules
Update on June 2, 2022: In light of data retention regulations, ExpressVPN no longer has physical servers in India. Find out more. On November 28,...
5 biggest scams in history
Fraudsters have been running creative scams long before the internet. From Portugal to the U.S., here are some of the biggest scams ever.
Meet Federico Tenga: The guy who teaches North Koreans about Bitcoin
Despite being the most hermetic country on Earth, North Korea is certainly no stranger to cyberspace—in both its uses and abuses. Despite a tiny...
Five myths that the NSA wants you to believe about FISA 702
UPDATE: January 19, 2018 On January 18, the Senate officially voted to reauthorize FISA Section 702 in a 65-34 vote. The President will almost certainly...
Zero-knowledge proofs explained: Part 1
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs Cryptography mostly concerns itself with secure communications and includes hiding information from adversaries and authentication of individuals. Hashes,...