Tor or VPN? The truth is, it’s not an apples to apples comparison, and since you really care about your privacy and security online, in this article I’m going to provide a basic explanation of how each of these tools work and the specific jobs they’re built for. There’s one important question you need to […]
What is a Decentralized VPN? The Pros and Cons of dVPN
The biggest problem with using any virtual private network, or VPN, is simply trust. Can you trust this company with your most sensitive data? But what if trust wasn’t part of the equation? In this article, we’re going to explore how decentralized virtual private networks, or “dVPN” for short, might be a solution. The Problem […]
How to Create Strong Passwords You Can Remember (3 Strategies)
You know you need to create a strong password for your online logins. Everybody does. The trouble is coming up with unique passwords for each account and then remembering them. Is that even possible? It is, I promise you. As proof, I’d like to share with you three simple password strategies to create strong passwords […]
Proton Mail now uses Blockchain to Verify Email Addresses (Key Transparency Explained)
In November 2023, Proton Privacy launched a beta feature called “Key Transparency” that utilizes a private blockchain to verify that an email address belongs to the person you intend to communicate with. Despite being one of the most respected providers of data privacy products in the world, this is the first time that Proton has […]
How to Use Gmail Confidential Mode (password-protect email)
There are times when sending sensitive information over email requires the ability to set that email to expire or to limit who can open that email. While there are pros and cons to using Gmail’s Confidential Mode, which I’ll explain here, this tutorial will show you exactly how to set it up and use it. […]
CyberGhost vs NordVPN | Testing Which VPN is Best in 2023
As you do your research before purchasing a VPN, I’d like to help you compare CyberGhost vs NordVPN. Since I’ve used and tested both services, you’ll be able to see the similarities, primary differences and a balanced opinion as to which is worth your time and money. When it comes to protecting your online privacy […]