Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • Quick biography: Julian Assange

    Quick biography: Julian Assange

    In 2006, Australian computer programmer Julian Assange founded WikiLeaks, the website that would eventually gain worldwide fame in 2010 for publishing Chelsea Manning’s leaked Afghan and Iraq war fi...

    Lexie 13.10.2020 3 mins
  • Quick biography: Edward Snowden

    Quick biography: Edward Snowden

    In 2013, Edward Snowden and his hard drive full of classified NSA documents boarded a plane and changed forever how we understood privacy. His actions forced the world to reckon with the realities of ...

    Lexie 12.10.2020 3 mins
  • 3 lesser-known online privacy tools you should start using

    3 lesser-known online privacy tools you should start using

    ExpressVPN recently surveyed 3,000 users and non-users of VPN tools in France, the United Kingdom, and the United States. Online privacy topics are high on the list of concerns, and respondents genera...

    Lexie 25.09.2020 3 mins
  • How to improve your email security

    How to improve your email security

    No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From your emails, anyone can learn about your work, relationships, vacatio...

    Lexie 21.08.2020 6 mins
  • How (and why) to keep multiple online identities separate

    How (and why) to keep multiple online identities separate

    For some, online anonymity is just fun. We can redefine who we are, pretend to be a dolphin, or vent into the void without having to worry what our conservative parents or restrictive boss would think...

    Lexie 12.08.2020 10 mins
  • Modern-day encryption has ancient cryptography beginnings

    Modern-day encryption has ancient cryptography beginnings

    How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple cryptographic tools. Julius Caesar rep...

    Lexie 06.08.2020 6 mins
  • Here's how bug bounties improve security

    Here's how bug bounties improve security

    Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the functioning parts of a car or telephone, it’s unlikely any o...

    Lexie 20.07.2020 3 mins
  • What is malware? How viruses, trojans, and ransomware work

    What is malware? How viruses, trojans, and ransomware work

    Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...

    Lexie 23.06.2020 3 mins
  • What is malware? How viruses, trojans, and ransomware work

    What is malware? How viruses, trojans, and ransomware work

    Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...

    Lexie 23.06.2020 3 mins
  • How do advertisers always know where you are?

    How do advertisers always know where you are?

    To build a profile of you, advertisers can gather a multitude of information. They can follow you around the web using a tracking code, browser fingerprinting, store cookies on your machine, or even b...

    Lexie 19.05.2020 2 mins
Get Started