author-image

Josh Lake

Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.

Articles by Josh

Want to know more about how to use Tor country codes to change your location? This guide teaches you everything you need to know about using Tor's country codes to spoof your location on Windows, Mac or Linux.
By Josh Lake in Information Security on September 18, 2023
The unique properties of encryption, hashing and salting are vital for keeping our online world secure. In this article, we'll look at each of them in depth in order to understand what these processes are and how they are used.
By Josh Lake in Information Security on January 24, 2024
Comparitech breaks down the concepts behind encryption, explaining the most common algorithms, security protocols and their uses.
By Josh Lake in Information Security on September 29, 2023
Interested in learning more about RSA encryption? We explain how RSA encryption was developed, how it works and the biggest security issues involved.
By Josh Lake in Information Security on March 5, 2024
Pretty Good Privacy (PGP) is an encryption program that provides a free way to secure online communications. Find out how to use it in our step-by-step guide.
By Josh Lake in Information Security on November 16, 2023
Learn how to set up PGP encryption in Outlook's desktop app in just a few minutes. Send and receive encrypted emails in Outlook.
By Josh Lake in Information Security on June 8, 2023
Find out why you should use PGP encryption with Gmail and how to configure the different available options.
By Josh Lake in Information Security on September 1, 2023
PGP encryption is useful for securing everything from emails to hard drives. But what exactly is it, and how does it work? We find out.
By Josh Lake in Information Security on November 16, 2023
This article covers what AES encryption is, how and why it was developed and explains how it works. We also look at some security issues with AES encryption.
By Josh Lake in Information Security on October 27, 2023
Page 7 of 7