4 guides that will help improve your digital security
The ExpressVPN blog features advice, explanations, reviews, information security updates, online privacy, politics, ExpressVPN products, and all the things...
Taking your first steps on the Lightning Network
Cryptocurrencies are beginning to change the world, but they have not been able to prove themselves for regular consumer...
How to use Bitcoin’s multisignature wallets
A Bitcoin generally can only be spent by its owner as identified through their public key hash, e.g., their...
Is there still privacy in the real world?
There are sensors and cameras everywhere, social convention dictates we carry what is essentially a surveillance device with us...
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs
In part 1 of our zero-knowledge proof series, we explained how a zero-knowledge proof could work when the verifier...
5 biggest scams in history
Fraudsters have been running creative scams long before the internet. From Portugal to the U.S., here are some of the biggest scams ever.
Zero-knowledge proofs explained: Part 1
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs Cryptography mostly concerns itself with secure communications and includes hiding information from...
3 cryptocurrencies that care about your privacy
Bitcoin is not perfectly anonymous. While it's true that you don’t have to connect your real name or phone number...
6 features we actually want on our iPhones
This article was originally published on October 27, 2017. New phones are exciting. They bring new features, make existing features...
How to make Bitcoin Anonymous
Bitcoin is both an anonymous payment system and a transparent, open network where anyone can track and verify transactions. How...