
Josh Lake
Specialist in Security, Privacy and Encryption
Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.
Articles by Josh
Want to know more about how to use Tor country codes to change your location? This guide teaches you everything you need to know about using Tor's country codes to spoof your location on Windows, Mac or Linux.
By Josh Lake
in Information Security
on September 18, 2023
The unique properties of encryption, hashing and salting are vital for keeping our online world secure. In this article, we'll look at each of them in depth in order to understand what these processes are and how they are used.
By Josh Lake
in Information Security
on January 24, 2024
Comparitech breaks down the concepts behind encryption, explaining the most common algorithms, security protocols and their uses.
By Josh Lake
in Information Security
on September 29, 2023
Interested in learning more about RSA encryption? We explain how RSA encryption was developed, how it works and the biggest security issues involved.
By Josh Lake
in Information Security
on March 5, 2024
Pretty Good Privacy (PGP) is an encryption program that provides a free way to secure online communications. Find out how to use it in our step-by-step guide.
By Josh Lake
in Information Security
on November 16, 2023
Learn how to set up PGP encryption in Outlook's desktop app in just a few minutes. Send and receive encrypted emails in Outlook.
By Josh Lake
in Information Security
on June 8, 2023
Find out why you should use PGP encryption with Gmail and how to configure the different available options.
By Josh Lake
in Information Security
on September 1, 2023
PGP encryption is useful for securing everything from emails to hard drives. But what exactly is it, and how does it work? We find out.
By Josh Lake
in Information Security
on November 16, 2023
This article covers what AES encryption is, how and why it was developed and explains how it works. We also look at some security issues with AES encryption.
By Josh Lake
in Information Security
on October 27, 2023