How to Use Vim to Encrypt Text Files on Linux
It's easy to secure the contents of a text file on Linux by encrypting it with Vim.
Why the FBI Isn't Happy About Apple's iCloud Encryption
End-to-end encryption for Apple's iCloud service is a win for its loyal users but not so much for the FBI. Let's discuss all about it.
ProtonMail vs. Tutanota: Which Encrypted Email Service Is Best?
We compare Tutanota and ProtonMail, accounting for security and privacy features, spam filters, ease of use, and more.
What Is Lattice-Based Cryptography and Why Is It Important?
Quantum computing has the power to break regular cryptography algorithms. Here's why lattice-based cryptography will protect us in the future.
How to Use VeraCrypt’s Advanced Features to Secure Important Files
Are you encrypting your data using VeraCrypt? Here are some advanced settings to help you protect your sensitive files.
How to Back Up and Print Your GnuPG Key to Paper
You don't have to store a backup digitally. Using paper might even be safer. Here's how to back up your GnuPG key the old-fashioned way!
How to Generate Your Own GnuPG Key
By creating your own GnuPG key, you can encrypt your important files and correspondence. And it's not as difficult as it sounds. Here's what to do.
How to Encrypt a Windows System Drive With VeraCrypt
Here's how to keep your Windows drive or partition secure using encryption courtesy of VeraCrypt.
7 Common Email Security Protocols Explained
How do ISPs and webmail services protect email users? Here's how email security protocols keep your messages safe.
5 Free Privacy Tools You Can Use on Any Device
Here are some free tools you can download to your PC, laptop, and smartphone to keep your data private. And they sync between devices too!
What Is the Best Encryption Software?
Looking to render your files unreadable to hackers and other intruders? Here are the best services that encrypt your data.
How to Enable Video End-to-End Encryption on Your Ring Devices
We'll show you how to enable the important security feature.
WEP vs. WPA vs. WPA2 vs. WPA3: Wi-Fi Security Types Explained
There are many types of wireless security but which should you be using? Which Wi-Fi is most secure: WEP, WPA, WPA2, or WPA3?
Should You Always Leave Your VPN Turned On?
VPNs have their positives and negatives, so should you stay connected? In what circumstances should you turn your VPN off?
What Is Zero-Knowledge Encryption and Why Should You Use It?
Standard encryption isn't always good enough to secure your private data. That's where zero-knowledge encryption comes in...
How to Encrypt and Protect Your Data and Files Using VeraCrypt
Protecting your valuable personal data can be easy using VeraCrypt, a free and open-source encryption tool.
Access Your Home Assistant Server Remotely With DuckDNS and Let’s Encrypt
Access your smart home securely via the internet without paying a subscription fee.
What Is the XChaCha20 Encryption Algorithm?
The Advanced Encryption Standard (AES) might be a thing of the past. So what exactly is XChaCha20 encryption, the new kid on the block?
10 Best Practices to Implement Zero Trust Security
Looking for a belt-and-braces approach to securing your network? Zero trust security could be the key. Here's how to approach it.
What Is Quantum Computing, Is It Real, and How Does It Change Things?
How will quantum computing change our relationship with computers?