Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

171 Posts
902 Comments
15791 Claps
Edward Snowden's glasses.
3 mins
Quick biography: Edward Snowden
Since becoming a household name in 2013, Edward Snowden has remained in the global spotlight for his privacy advocacy and personal legal drama.
A laptop with a set of tools on the screen.
3 mins
3 lesser-known online privacy tools you should start using
ExpressVPN recently surveyed 3,000 users and non-users of VPN tools in France, the United Kingdom, and the United States....
A cloud padlock.
6 mins
How to back up your files and encrypt them
Choose the best backup method for you. Keep your data safe and accessible with these tips.
An envelope with a lock on it.
6 mins
How to improve your email security
No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From...
An illustratin of a woman juglging different faces.
10 mins
How (and why) to keep multiple online identities separate
To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Wrapping around a hexagonal bar.
6 mins
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would...
Magnifying glass over code.
3 mins
Here’s how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single...
A trojan horse with a bug inside.
3 mins
What is malware? How viruses, trojans, and ransomware work
Definitions of the many types of malware, plus tips on how to protect yourself from viruses, trojans, and ransomware.
A pigeon with a dollar sign for an eye.
3 mins
How do advertisers always know where you are?
To build a profile of you, advertisers can gather a multitude of information. They can follow you around the...
A whip with the lashes made from a stream of ones and zeroes.
3 mins
What is cybertorture? How our minds are vulnerable to online experiences
What will change if we are forced to move our social circle to virtual lands, browse the web anonymously,...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online