Privacy news

Browser with boxes containing different types of browsing activity.
2 mins
You should be compartmentalizing your browsers. Here’s how it works.
We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish to target us for their...
An illustration of a meter. Thumbs up on one end, thumbs down on the other.
4 mins
Your devices are rating you. Behave accordingly.
In a world judged by social media, a low score makes everyday life difficult. You can’t rent a car, book a hotel, or pay for flights.
An illustration of a CA certificate.
3 mins
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to decrypt all content and communications...
Profile of a man with anonymized credentials .
4 mins
Anonymized demographic data can still be used to identify you
If you’re one of the few people who read terms of service, you may find buried in various companies’ privacy policies a clause saying...
An illustration of a shredder shredding a terms of service document.
2 mins
Study confirms less than 20% always read terms of service
If you frequently click ‘I agree’ with regards to companies’ terms of service (ToS) without actually reading them, you’re not alone. A new study...
Red circular record button.
5 mins
Siri and Alexa train their AI with your voice. Here’s how to delete that...
If you’ve ever said “Hey” to Alexa, or an “OK” to Google, chances are your voice has been recorded and transcribed to improve their...
The Kazakhstan flag, except with a padlock where the sun should be.
2 mins
How to stop the Kazakhstan government from intercepting your internet traffic
Update: The Kazakh government has halted its CA plans for now. If you previously installed the certificate, make sure it has been thoroughly removed...
The internet's home icon. But bigger. And red.
7 mins
9 things you can do with a home server
Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted...
A smartphone screen with an open eye on a red background.
3 mins
Report: Stalkerware apps not held accountable for infringing privacy rights
Stalkerware—spyware applications installed on devices to surveil children, employees, and partners—has become the latest tool used by abusers to exert power and control over...
A green boxing glove, covered in Matrix style code.
4 mins
The fight for online privacy is heating up in Maine
About two years ago, the United States Senate voted in favor of Senate Joint Resolution 34, essentially enabling internet service providers (ISPs) to sell...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online