Blog
Message authentication codes (MACs) and hash-based message authentication codes (HMACs) are tools used in cryptography to verify data integrity.
By Kyle Schurman in Information Security on October 8, 2023
Removing your details from people search services is a great way to improve your privacy. We explain what LexisNexis is and how to opt out of LexisNexis in just a few minutes. 
By Ian Garland in VPN & Privacy on November 17, 2023
Looking to take control of your digital privacy? Today, we’ll reveal how to opt out of CoreLogic and prevent the company from selling or sharing your personal information. 
By Ian Garland in VPN & Privacy on November 16, 2023
Want to delete your Google account but don’t know where to start? We explain how to delete a Google account, taking you step-by-step through the process.
By Mark Gill in VPN & Privacy on October 7, 2023
Worried you might have spyware on your Android device but not sure how to find it? Read on to learn all about spyware including the risks, how to detect it, and how to remove it for good.
By Mark Gill in VPN & Privacy on October 6, 2023
Want to reduce your digital footprint? Removing yourself from people search sites is a great start. Below, we’ll explain how to opt out of Private Eye and ensure your profile never comes back. 
By Ian Garland in VPN & Privacy on October 6, 2023
People search sites like SpyFly are a huge privacy risk. Today, we’ll explain how to opt out, delete your SpyFly profile, and take back control of your personal information. 
By Ian Garland in VPN & Privacy on December 1, 2023
Looking to share information without it leading back to you? We’ll explain how to send an anonymous email and reveal a few alternative options for privacy-conscious journalists and activists. 
By Ian Garland in VPN & Privacy on October 2, 2023
Using a VPN on iOS? You may not be as secure and private as you think. This post looks at some VPN-related bugs in iOS and explains how to mitigate them.
By Marc Dahan in VPN & Privacy on October 2, 2023
Page 49 of 278