Josh Lake
Specialist in Security, Privacy and Encryption
Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.
Articles by Josh
Digital signatures can be used to verify the identity of another party, check the integrity of data and provide non-repudiation. Find out how they work in our comprehensive guide.
By Josh Lake
in Information Security
on December 21, 2023
SSH is a security protocol used for remote login, tunneling and much more. Find out how it works, what it does and whether it is secure.
By Josh Lake
in Information Security
on November 22, 2023
Quantum computing looks like it could revolutionize our technological world in the not too distant future. Find out what it is and how it may affect our security.
By Josh Lake
in Information Security
on August 2, 2023
The Diffie-Hellman key exchange was one of the most important developments in public-key cryptography. Find out why it's still such an important aspect of internet security.
By Josh Lake
in Information Security
on August 24, 2023
Everything you need to know about the TLS protocol. This article covers what it is, how it works, its many different uses as well as its security problems.
By Josh Lake
in Information Security
on September 14, 2023
Learn everything you need to know about IPsec. Find out about its different protocols, modes, uses, as well as its known security issues.
By Josh Lake
in Information Security
on December 15, 2023
Learn what ARP poisoning is, about the protocol itself, as well as how you can detect and put a stop to these attacks.
By Josh Lake
in Information Security
on September 7, 2023
Want to know more about how to use Tor country codes to change your location? This guide teaches you everything you need to know about using Tor's country codes to spoof your location on Windows, Mac or Linux.
By Josh Lake
in Information Security
on September 18, 2023
The unique properties of encryption, hashing and salting are vital for keeping our online world secure. In this article, we'll look at each of them in depth in order to understand what these processes are and how they are used.
By Josh Lake
in Information Security
on January 24, 2024