author-image

Josh Lake

Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.

Articles by Josh

TLS (SSL) handshakes are a crucial part of your online security. Find out how they work and protect your information in our detailed guide.
By Josh Lake in Information Security on December 14, 2023
Third-party cookies may disappear soon, but that doesn't mean tracking via cookies will stop. Find out how your data will still be collected.
By Josh Lake in Information Security on January 29, 2021
It's no secret that your mobile tracks you. A lot. We explain everything you need to know about how your mobile tracks you and how you can reduce this as much as possible.
By Josh Lake in VPN & Privacy on September 26, 2023
Warrant canaries were once all the rage, but we hear about them less and less now. Are they still useful? How are the newer transparency reports different?
By Josh Lake in VPN & Privacy on April 15, 2022
Plausible deniability seems like the ultimate get-out-of-jail-free card. But does it really work when it comes to encryption?
By Josh Lake in Information Security on January 8, 2024
There are major concerns about whether TikTok is a threat. Could it be used to censor information or spread propaganda? Is it dangerous?
By Josh Lake in Information Security on April 13, 2022
TikTok is constantly in the headlines, with allegations that it's a spy app or a tool for the Chinese Government. But how much of this is true?
By Josh Lake in VPN & Privacy on July 23, 2022
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states and target highly valuable systems and data. We explain what APTs are and how to defend against them.
By Josh Lake in Information Security on January 5, 2024
The domain name system is complex, which leaves it open to a range of DNS attacks. Find out what the different types of DNS attacks are and how to defend against them.
By Josh Lake in Information Security on October 30, 2023
Page 3 of 7