Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

174 Posts
16746 Claps
A monitor with windows showing different personal details in a doxing campaign.
7 mins

What is doxing, and how to avoid getting doxxed

Online stalking, doxing, and cyberbullying have increased alongside the growth of the internet. But there are ways to protect yourself and your family.
bitcoin barcode
21 mins

Protect your financial privacy with Bitcoin: A comprehensive guide

This comprehensive manual will explain how you can protect your financial privacy by using Bitcoin.
How To Delete Your Browsing History
2 mins

How to delete your hard drive browsing history

Don't just settle for deleting your web browser's history. Learn how to take it off your hard drive too. We show you how here.
binary code falling out of a book
66 mins

The jargon-busting internet security technical glossary

Don't be overwhelmed by internet security jargon. Use this handy glossary to figure out what’s what!
tor red onion symbol
23 mins

All about Tor, the Tor Browser, and the Dark Web

We explain the origins of Tor, how the network works, how you can make use of it and contribute to it, and the many other things Tor enables us to do online.
mobile phone security icons
26 mins

Ultimate guide to mobile security for iPhone and Android devices

Learn how to keep your privacy safe on the go! Here's everything you need to know to keep your mobile devices safe and secure.
50 mins

How to set up a home server and use it as...

The sovereign individual runs their own bank, on their own server. We show you how to do it, and how to get the most out of it.
15 mins

The safe browsing guide: 21 ways to protect yourself online

Be it work or leisure, we use our browsers for just about everything these days. Find out exactly how to secure your browser.
7 mins

What is off-the-record messaging (OTR)?

OTR practices deniable authentication, making it impossible for an eavesdropper to tell solely from encrypted messages who is communicating with whom.
A laptop and a light in the dark.
21 mins

Tech safety for survivors of domestic violence

Take steps to assert your digital autonomy, prevent stalking, and regain control over your communications and information.
2 mins
3 mins
12 mins
5 mins

Featured Posts

3 mins
3 mins
3 mins
3 mins

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Subscribe to the Newsletter