Is there still privacy in the real world?
There are sensors and cameras everywhere, social convention dictates we carry what is essentially a surveillance device with us...
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs
In part 1 of our zero-knowledge proof series, we explained how a zero-knowledge proof could work when the verifier...
5 biggest scams in history
Fraudsters have been running creative scams long before the internet. From Portugal to the U.S., here are some of the biggest scams ever.
Zero-knowledge proofs explained: Part 1
Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs Cryptography mostly concerns itself with secure communications and includes hiding information from...
3 cryptocurrencies that care about your privacy
Bitcoin is not perfectly anonymous. While it's true that you don’t have to connect your real name or phone number...
6 features we actually want on our iPhones
This article was originally published on October 27, 2017. New phones are exciting. They bring new features, make existing features...
iPhone vs. Bitcoin: Over the years, how many iPhones could you...
Between its inception in 2009 and today, Bitcoin has enjoyed a spectacular rise in value. First traded in early...
A great scam or a good investment: What is an ICO?
Paris Hilton, Floyd Mayweather, The Game have all launched ICO projects. But what is an ICO? And are they worth your attention or investment?
Q&A with TAILS on privacy and being labeled extremists by the...
TAILS is an OS that runs from a USB stick. It's optimized for security and privacy, and all traffic is routed through the Tor by default.
Whistleblowing guide: Why you should remove the metadata
** This is part four of ExpressVPN's whistleblowing guide. ** Part 1: Whistleblowing guide: Blowing the whistle is tough
Part 2:...