Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • How to set up your own home server

    How to set up your own home server

    This guide requires you to use the command line interface, or CLI, and an SSH client. SSH (Secure Shell) is a popular tool to “remote control” devices securely. In principle, it functions similarl...

    Lexie 17.05.2019 5 mins
  • 6 common misconceptions about passwords

    6 common misconceptions about passwords

    We all need passwords. They are by far the most used form of authentication, not only for accessing accounts over the internet, but also for phone banking, ATM use, opening a safe, and even to take bo...

    Lexie 03.05.2019 2 mins
  • How to Boost Online Banking Security

    How to Boost Online Banking Security

    It should require no explanation why our online banking details are essential. We keep our money there, and if our accounts become unavailable for a short time or we lose access to them, it would be h...

    Lexie 17.01.2023 29 mins
  • Share files securely and anonymously with OnionShare 2

    Share files securely and anonymously with OnionShare 2

    We’ve been using OnionShare for a while at ExpressVPN and are quite excited to get our hands on the second version of Micah Lee’s convenient privacy tool. Before OnionShare, sending files to a col...

    Lexie 22.02.2019 2 mins
  • Laws that threaten internet freedom around the world

    Laws that threaten internet freedom around the world

    We recently explained why Australia’s new cybersecurity bill is a bad idea. It gives law enforcement the ability to coerce anybody into using compromising apps, handing over passwords, or snitching ...

    Lexie 15.02.2019 3 mins
  • What are botnets, and how do you protect against them?

    What are botnets, and how do you protect against them?

    Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit by criminal organizations, botnets can, for example, be used to mine cry...

    Lexie 04.02.2019 2 mins
  • Here's why Australia’s cybersecurity bill is a terrible idea

    Here's why Australia’s cybersecurity bill is a terrible idea

    Despite international protest, Australia has passed a new bill that essentially outlaws encryption technology, making its population of 25 million (and 10 million annual visitors) less safe. The “Te...

    Lexie 14.01.2019 2 mins
  • 4 Ways you can be identified through social media

    4 Ways you can be identified through social media

    On social media, it is easy to forget who can see our posts. A pseudonym can protect us from revealing too much, but there are still plenty of ways we can accidentally dox ourselves. 1. There's lots o...

    Lexie 08.01.2019 2 mins
  • 4 ways to back up your data securely

    4 ways to back up your data securely

    Photos, documents, saved video games, and old emails: We accumulate a lot of data throughout our lives. And just like our parents’ attic, our digital bags are getting fuller and fuller. Luckily, the...

    Lexie 10.06.2018 5 mins
  • 5 famous whistleblowers who risked everything

    5 famous whistleblowers who risked everything

    “See something, say something” is a safety and awareness campaign running across multiple cities in the United States. If you see misconduct, criminal activity or just something suspicious, you ar...

    Lexie 11.12.2018 4 mins
Get Started