What is an evil twin attack, and should they worry you?

January 26th, 2024 in Privacy deep dives

An evil twin attack is a cyberattack that occurs when an attacker  sets up a malicious WiFi network that mimics a legitimate one, often in…

What is ChaCha20?

December 28th, 2023 in Privacy deep dives

ChaCha20 is a performant and lightweight, yet highly secure, 256-bit stream cipher used to encrypt and decrypt data. It’s often used to secure data transmitted…

8 tips to secure your remote workforce (plus an employee checklist)

December 21st, 2023 in Privacy deep dives

Your remote workforce should be as digitally secure as any in-office workforce. Fortunately, the same tools that can enable you to operate a distributed workplace,…

What is Freenet (now called Hyphanet)?

December 11th, 2023 in Privacy deep dives

Freenet is a decentralized, encrypted, open-source dark web designed to let you communicate with others, upload and download content, and access online information anonymously.  Learn…

What is a keylogger?

November 24th, 2023 in Privacy deep dives

A contraction of “keystroke logger”, a keylogger is either a piece of software or a hardware device that records input from your device’s keyboard. Although…

Google Chrome’s IP Protection is privacy washing

November 21st, 2023 in Privacy deep dives

Last month, Google launched a new feature for Chrome called IP Protection that makes it easier for the company to spy on you. No surprise,…

How to change your IP address on Windows

November 16th, 2023 in Privacy deep dives

This artcile was updated and refreshed November 2023. We discuss how to change the IP address of your Windows 10 or Windows 11 device. This…

What is content filtering?

November 14th, 2023 in Privacy deep dives

Businesses and other organizations use content filtering to block employees or customers from accessing certain online content.  There are a few reasons they may do…

What is WPA3?

November 9th, 2023 in Privacy deep dives

WiFi is the technology that lets you wirelessly connect your computer or mobile device to the internet. As with any connection on a network, there…

Secure
your internet

Get Proton VPN
Get Proton VPN