
Josh Lake
Specialist in Security, Privacy and Encryption
Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.
Articles by Josh
TLS (SSL) handshakes are a crucial part of your online security. Find out how they work and protect your information in our detailed guide.
By Josh Lake
in Information Security
on December 14, 2023
Third-party cookies may disappear soon, but that doesn't mean tracking via cookies will stop. Find out how your data will still be collected.
By Josh Lake
in Information Security
on January 29, 2021
It's no secret that your mobile tracks you. A lot. We explain everything you need to know about how your mobile tracks you and how you can reduce this as much as possible.
By Josh Lake
in VPN & Privacy
on September 26, 2023
Warrant canaries were once all the rage, but we hear about them less and less now. Are they still useful? How are the newer transparency reports different?
By Josh Lake
in VPN & Privacy
on April 15, 2022
Plausible deniability seems like the ultimate get-out-of-jail-free card. But does it really work when it comes to encryption?
By Josh Lake
in Information Security
on January 8, 2024
There are major concerns about whether TikTok is a threat. Could it be used to censor information or spread propaganda? Is it dangerous?
By Josh Lake
in Information Security
on April 13, 2022
TikTok is constantly in the headlines, with allegations that it's a spy app or a tool for the Chinese Government. But how much of this is true?
By Josh Lake
in VPN & Privacy
on July 23, 2022
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states and target highly valuable systems and data. We explain what APTs are and how to defend against them.
By Josh Lake
in Information Security
on January 5, 2024
The domain name system is complex, which leaves it open to a range of DNS attacks. Find out what the different types of DNS attacks are and how to defend against them.
By Josh Lake
in Information Security
on October 30, 2023