ExpressVPN Blog https://www.expressvpn.com/blog/ The official blog of ExpressVPN Wed, 08 May 2024 05:31:16 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.4 Ups and downs of post-quantum cryptography—and our hybrid solution https://www.expressvpn.com/blog/kyber-security-post-quantum-cryptography/ https://www.expressvpn.com/blog/kyber-security-post-quantum-cryptography/#comments Mon, 22 Apr 2024 08:53:19 +0000 https://www.expressvpn.com/blog/?p=128557

A paper claiming the creation of an algorithm that could break post-quantum encryption created a stir in the cybersecurity world.

The post Ups and downs of post-quantum cryptography—and our hybrid solution appeared first on ExpressVPN Blog.

]]>

On April 10, 2024, a paper with the title Quantum Algorithms for Lattice Problems was published on the IACR (International Association for Cryptologic Research) preprint service. Despite the unassuming title, this paper made a bold claim that could have toppled the world’s attempts to create post-quantum safe encryption.

In this blog post, we look at the claim that was made, especially as it pertained to the choice of Kyber, and what happened next. We also delve into how our VPN’s post-quantum encryption could have been affected.

Kyber’s security called into question

Kyber is a lattice-based encryption algorithm designed to be secure against attacks by quantum computers. The National Institute of Standards and Technology (NIST) ran a competition to help determine which of many candidates would progress towards becoming an official standard and recommendation, and Kyber effectively won. 

However, in the paper in question, Dr. Yilei Chen, an assistant professor at Tsinghua University, claimed to have found a quantum algorithm that could solve the learning with errors problem (LWE)—which in turn meant it had found a way to break (or significantly weaken) Kyber.

This was headline news in some circles: If the claim held, it would mean that the technology on which the world has based the latest post-quantum tech is fundamentally broken. 

At this stage, a lot of time, energy, and money has gone into standardizing on Kyber with all modern browsers supporting it. It is also Kyber that we use for ExpressVPN’s post-quantum protections (via our protocol Lightway). If significant flaws were found at this stage, it would mean starting again from scratch, and undoing all the work that has already been done. Obviously this would not only be devastating in terms of the amount of time and work already invested, but it would further shake confidence in the solutions that have been created.

It was thus a major claim—but given the academic credentials of who was making the claim and the significant work that had gone into the discovery, it certainly looked like the claim could be valid.

All eyes on post-quantum cryptography

So how assured can we be in the strength of existing post-quantum cryptography? I am not a cryptographer, nor do I have a strong background in math, but the people who have worked for years on post-quantum technologies do. Those who created the Open Quantum Safe Project—which aims to support the transition to quantum-resistant cryptographyare literally leaders in their fields. They’ve not only checked the math, but they’ve implemented the technologies and verified it themselves. All of this was done in the open, and so it had a lot of eyes on the project, and a lot of people giving feedback. This would make it much more difficult for a serious error to slip through.

But that doesn’t mean that that can’t happen. It’s also not uncommon for engineers to not see the wood for the trees until it’s pointed out to them by someone outside of the system. After all, this is how such advancements are made—by people plugging and chipping away at these sorts of challenging problems.

Carl Sagan once said, “Extraordinary claims require extraordinary evidence.” In general this is good advice—if something is claimed to change the status quo, it is reasonable to hold the evidence required to a suitably robust standard. And that is what happened in the case of the paper put forth.

Kyber security remains unbroken

On April 18, Dr. Chen updated the paper to acknowledge that a bug had been identified (independently by Hongxun Wu and Thomas Vidick) in the algorithm he created, and that the paper’s claim indeed did not hold. He has left the paper available so that others may still build upon it.

It is important to note that Dr. Chen is a legitimate researcher and works at one of the top research universities in China. The process he followed with his paper is consistent with best practices for the field. By submitting a preprint, he was able to solicit fast feedback from the cryptographic community with the intention of improving the paper. If the feedback had shown everything looking solid, he would likely have submitted the paper to a peer-reviewed journal.

In this case, however, he received critical feedback on the algorithm that called into doubt whether the algorithm used would work as intended. The best thing he could have done at that stage (once he had verified those counterclaims) was to gracefully accept the feedback, withdraw his own claim, and get back to work. By all accounts, that is exactly what he did, and this shows strong academic integrity and a commitment to progressing the field.

ExpressVPN’s hybrid encryption for post-quantum protection

At ExpressVPN, we always assumed that Kyber could be broken. After all, one of the contenders for selection (called Rainbow) ended up being broken on a single laptop. Not only was it not quantum safe, but it also wasn’t classically safe either.

That’s where hybrid encryption comes in. When deploying post-quantum protections on our Lightway protocol, we combined both the current classical state-of-the-art encryption technology and Kyber to produce a key that would require an attacker to break both forms of key exchange. 

By doing this, if Kyber turns out to be susceptible to attack, then you still have the security of classical P521 protecting you. And in the future if it turns out that quantum computers can break P521, well, you also have Kyber, which as of today is the best-known way to protect you against that threat. In other words, you get a two-layered shield of sorts when using Lightway. 

For the majority of the cryptographic community, the retraction of the claim means that we can breathe a little easier. It is likely that we will see more claims on breaking lattice encryption, and eventually maybe one of them will be successful. This is just part of the rigor that we must place on our encryption technologies to ensure we are as safe as possible.

ExpressVPN will continue to use hybrid cryptography to offer the best of both worlds when it comes to protecting our users. We have no plans to switch to Kyber only and imagine that hybrid encryption will be with us for many years to come.

The post Ups and downs of post-quantum cryptography—and our hybrid solution appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/kyber-security-post-quantum-cryptography/feed/ 1
How to use a VPN for Starlink https://www.expressvpn.com/blog/starlink-vpn/ https://www.expressvpn.com/blog/starlink-vpn/#comments Mon, 22 Apr 2024 07:08:32 +0000 https://www.expressvpn.com/blog/?p=128515 How to use a VPN with Starlink

... And why it's a must-have for your router.

The post How to use a VPN for Starlink appeared first on ExpressVPN Blog.

]]>
How to use a VPN with Starlink

Satellite internet has become increasingly popular in recent times, especially for those in underserved and remote areas. Among satellite internet providers, Starlink is the undisputed leader. However, it’s exposed to the same risks as any other provider, which is where a VPN can come in handy. Read on to find out how to use a VPN on Starlink.

Jump to…

What is Starlink?
Why do I need a VPN for Starlink?
Best VPN for Starlink
How to get a Starlink VPN
Should I use a free VPN with Starlink?
Starlink VPN troubleshooting

Developed and operated by SpaceX, Starlink is a satellite internet network that provides high-speed internet access in over 70 countries. Launched under the vision of Elon Musk, Starlink’s network consists of thousands of low Earth orbit (LEO) satellites working together to deliver fast internet connectivity. If you’re thinking of getting Starlink, here are some pros and cons to take note of.

Advantages of Starlink

  • Widespread coverage. Starlink’s constellation of satellites covers 70+ countries and is planned to provide global coverage in the future, reaching remote and rural areas that often lack reliable internet access.
  • High-speed internet. Despite being a satellite-based service, Starlink offers high-speed internet comparable to traditional broadband speeds, with much lower latency than previous satellite internet technologies. This is particularly suitable for latency-sensitive activities such as gaming or video calling.
  • Easy installation and maintenance. Touted as user-friendly, Starlink’s setup involves just a small satellite dish and modem, allowing for relatively simple self-installation. The dish also automatically aligns itself and even heats to melt snow if necessary.

Disadvantages of Starlink

  • Cost. Starlink’s initial setup and monthly subscription fees are higher than many traditional broadband services, making it less accessible for some users. However, it’s still cheaper than conventional satellite-based internet services.
  • Weather dependency. Like all satellite communications, severe weather conditions can affect Starlink’s connectivity, leading to potential service interruptions or noticeably reduced speeds.
  • Limited capacity. Increased demand in densely populated areas can strain the system, potentially affecting speeds and connectivity.

Using a reliable VPN like ExpressVPN with Starlink, or any other internet provider, can help boost your overall online experience. Here’s how ExpressVPN can benefit Starlink users:

  • Boost your privacy and security. ExpressVPN keeps your connection fully encrypted so no one else can see into your online traffic. This is particularly important for Starlink users, as the satellite-based internet connection may be more susceptible to interception than traditional wired connections.
  • Bypass censorship. In regions where internet access is heavily censored or monitored, a VPN can help Starlink users avoid government-imposed restrictions. This is particularly relevant for users in remote areas who rely on Starlink as their primary internet connection but face limitations on what they can access online.
  • Browse throttle-free. While Starlink aims to provide high-speed internet access globally, you might still encounter bandwidth throttling amid network congestion. ExpressVPN can help manage these issues and potentially improve connection speeds during peak times.

A VPN complements Starlink’s capabilities by ensuring users enjoy a secure, private, and unrestricted internet experience. Whether you’re concerned about privacy, aiming to enhance your security, or want a smoother and more seamless experience, a VPN is a must-have tool for Starlink users.

ExpressVPN is the best VPN for Starlink users, offering an optimal blend of speed, security, and ease of use that complements Starlink’s capabilities. Here are some key features of ExpressVPN:

  • A vast network of high-speed servers in 105 countries ensures that Starlink users can enjoy stable connections without compromising on speed.
  • With best-in-class AES-256 encryption, ExpressVPN secures your internet traffic and protects your data from interception or snooping.
  • ExpressVPN offers a strict no-logging policy so you can browse with peace of mind, knowing that your data is for your eyes only.
  • ExpressVPN is designed for simplicity, making it easy for anyone to set up and start using with their Starlink connection.
  • Should you need assistance, ExpressVPN provides 24/7 customer support to help you resolve any issues quickly, ensuring your Starlink connection remains secure and uninterrupted.

You have two options since the Starlink router doesn’t directly work with VPNs. The first one is to use your Starlink router in “bypass mode” to only work as a modem and use another router as your network router and Wi-Fi access point. The benefit is that you can use a mesh Wi-Fi system to get the best coverage.

If that isn’t an option, you should download the ExpressVPN app on your devices. ExpressVPN has apps for all the most important platforms, so you’ll likely be completely covered. This is pretty straightforward, so we’ll focus on installing the VPN for Starlink on routers.

Before you start

Before starting, you must know that not all routers are natively compatible with VPNs. ExpressVPN has its own router integrated with VPNs, Aircove. If you go for it, you’ll ensure the best compatibility. However, ExpressVPN is also compatible with many other routers, and here you can find the full list

If your router isn’t on the list, you could still try to install a third-party firmware to your router, such as DD-WRT or Tomato. Once you have a compatible router, you can start the installation.

Note: This guide assumes you’ve already subscribed to ExpressVPN. If you haven’t done it yet, you can easily subscribe from here.

Step 1. Put your Starlink router on bypass mode

The first thing you need to do is put your Starlink router on bypass mode. This is equivalent to the bridge mode of other routers, and it turns off the Wi-Fi part of the router and makes it act only as a modem. This is important because you’ll be using your other router’s network (wired and Wi-Fi), not Starlink’s. To enable bypass mode, follow these steps:

  1. Ensure you have a working internet connection, and log in to your Starlink app.
  2. Click on Settings in the home screen. You’ll see the Starlink router settings.
  3. Scroll down to Bypass Mode and tap it. You’ll be directed to a page with a slider.
  4. Move the slider to the right to enable bypass mode.

Important: The Starlink router doesn’t come with an Ethernet port, which you must connect to the other router. Make sure you have the Starlink Ethernet adapter beforehand.

Step 2. Open your router’s firmware

Once you’ve followed your new router’s instructions, and it’s up and running, you have to open its firmware in your browser. This guide uses a Netgear Nighthawk R6400v2, but the steps are similar for every router.

To open your router’s firmware, type its IP address into your browser. Most routers have a default IP address of 192.168.1.1. You can type this address into your URL bar to open your router’s firmware. If you don’t know your router’s IP address, you can find it by opening a command prompt and typing ipconfig. The entry for Default Gateway points to your router’s IP address.

Step 3: Find the VPN settings

Where your VPN settings are will depend on your router’s model. It’s usually under your router’s firmware’s Advanced or Security section. For example, it’s on Advanced > Administration > Router Update on Netgear routers.

Step 4: Enable the VPN service

This will allow your router to connect to the VPN server, which usually involves clicking a button or checkbox labeled Enable VPN. You may also need to upload the VPN firmware to the router. 

On Netgear, for example, you would need to select the Browse button and upload the VPN firmware you downloaded from ExpressVPN’s website. Once your ExpressVPN firmware is finished uploading to your router, you must log in to the ExpressVPN router setup site and then follow the prompts.  

Step 5: Check if your VPN is working on your router 

Once you’ve enabled the VPN, you should test your connection to ensure it works properly. You can check if your VPN is working on your router by searching Google for “what’s my IP” or a website that checks your IP address, such as whatismyipaddress.com. Verify that the output shown is not your home IP address, and you’re all set!

As you may already know, nothing is really free. If you’re not paying for a VPN service, you are the product—in this case, your information is. So, while free VPNs might not take your money upfront, they may make you pay in other ways, such as by tracking your activity, serving intrusive ads, or providing less robust features that can leave you vulnerable to data leaks and cyberattacks.

There is no free VPN that matches all that ExpressVPN has to offer, and you can even try us risk-free for 30 days with our money-back guarantee. Here’s what you’ll get with ExpressVPN vs. a typical free VPN:

ExpressVPN Most free VPNs
Monthly data limit Unlimited 10GB
Number of countries with servers 105 <10
Customer support 24/7 live chat Email
Compatible devices All popular devices Desktop and mobile
Tracks your online activity Never Maybe
Simultaneous connections 8 1
Proprietary VPN protocol Lightway None

 

If you’ve set up your VPN correctly, the VPN will work flawlessly most of the time, but sometimes, there could be teething problems between these two complex technologies. Here are some common issues with using a Starlink VPN.

Unable to establish a connection with the VPN

If you followed the steps above, Starlink’s router is now only acting as a modem, so it’s likely that Starlink is working fine. You may want to try the following steps:

  • Ensure you have an active internet connection. Go to your Starlink app and run a speed test. If you don’t have internet access, try resetting everything.
  • Try connecting to a different server location. 
  • Check your VPN settings. Return to your router’s firmware (not Starlink’s) to check that everything is in order. Ensure that your VPN is using the Lightway protocol for the fastest, most reliable connection.
  • Turn off your firewall or antivirus software. Sometimes, these types of software block your traffic by default. You may need to add the VPN under your firewall exceptions.
  • Reinstall the firmware or app. Depending on whether you’re using the VPN on a router or directly on your device, you may need to reinstall it to get everything working.

Random connection drops

It’s expected that a VPN (or any) connection drops every once in a while. This is why ExpressVPN offers a kill switch feature that protects your data if the VPN gets disconnected.

However, if you’re experiencing dropouts with Starlink, the most probable cause is satellite switchover. Starlink positions its satellites in a much lower orbit than a geosynchronous one, unlike traditional satellite internet service providers. This means the satellites move relative to your position, so your dish constantly switches between satellites. Usually, the drops are so short that you don’t notice them, but VPNs could be more sensitive to these micro-disconnections.

Switching to an older VPN protocol (such as IKEv2) could help, as it’s used on mobile networks because of its resiliency and ability to reestablish connections.

Slow connection speeds

All VPNs slow down internet speeds. However, the best VPNs on the market can reduce the slowdowns until they’re almost imperceptible. 

To ensure you get the best speeds, pick a server that’s geographically close to you, as the shorter the distance, the faster your data will reach its destination. If you still have speed problems, ensure you use ExpressVPN’s proprietary Lightway VPN protocol, which is designed for speed.

High latency

Higher latencies are inherent to any satellite internet service because data has to travel greater distances. Starlink is much better in this sense than traditional satellite services, thanks to the lower orbits it uses. If you’re experiencing high latencies, you should try the same solutions for slow connection speeds, so switch to a VPN server closer to you and ensure that you’re using the Lightway VPN protocol.

The post How to use a VPN for Starlink appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/starlink-vpn/feed/ 1
How to recover a hacked Telegram account https://www.expressvpn.com/blog/how-to-recover-a-hacked-telegram-account/ https://www.expressvpn.com/blog/how-to-recover-a-hacked-telegram-account/#comments Thu, 11 Apr 2024 02:26:58 +0000 https://www.expressvpn.com/blog/?p=126671 how-to-recover-telegram-hacked-account

Here’s how someone could access your account and what to do to keep it safe.

The post How to recover a hacked Telegram account appeared first on ExpressVPN Blog.

]]>
how-to-recover-telegram-hacked-account

Telegram is known for being one of the most secure instant messaging apps around. But what happens if your Telegram account gets hacked? 

The reality is that Telegram isn’t immune to hacking. But don’t fret; we will show you what you can do if your account gets hacked and how to prevent it from being compromised.

Can a Telegram account get hacked?

Yes, a Telegram account can be hacked. Hackers can try to access your account by providing the right credentials.

Telegram accounts are linked to phone numbers, so it’s not that easy for someone to pretend to be you, if they do not have physical access to your phone. Each Telegram account can be used on multiple devices at the same time, but a code sent to your phone needs to be used to verify that it’s really you.

This is why hackers might use social engineering to trick you into giving them the necessary code to verify your number on their device.

They might also try to send you malicious links that download malware onto your device as a way of getting the right credentials to log in to your Telegram account.

How do I know if my Telegram account has been hacked?

1. Unusual activity

The first red flags of a hacked Telegram account often manifest as anomalies in your account activity. This could include being added to channels and groups you didn’t join, messages you don’t remember sending, unfamiliar conversations, or changes to your account settings that you still need to make. Such discrepancies are tell-tale signs that someone else might be controlling your account.

2. You find random linked devices on your account 

Telegram lets you see a list of devices currently logged in to your account under Settings > Devices. If you see devices you don’t recognize, especially in locations or on operating systems you don’t use, it could suggest someone else is using your account. Telegram also has a feature that notifies users of new logins from unfamiliar devices or locations.

3. Unauthorized payments or subscriptions 

Telegram has a payment feature. If you notice unauthorized purchases or subscriptions made through your account, this could indicate that someone else has access to your account. 

4. Sessions unexpectedly closed

If you were using Telegram on your devices but are unexpectedly logged out, it’s possible that someone is using your account and terminated your legitimate sessions.

What do I do if my Telegram account has been hacked?

It’s relatively easy to regain control of your Telegram account, as long as you still have access to the phone number tied to your account. 

1. Log in to Telegram on your phone

Your account is tied to your phone number. So first thing is to ensure you are logged in to Telegram on your phone. There isn’t much that an attacker could do to prevent you from logging in using your own phone number. Perform the next steps within your account via your phone.

2. Terminate suspicious sessions

Go to Settings > Devices > Active Sessions and review the list of devices that are currently logged into your account. Terminate any sessions that you do not recognize or that seem suspicious. This will log out those devices immediately.

3. Set or change your 2FA password

While you don’t need a password to use Telegram, you can set up a password as a form of two-factor authentication. Go to Settings > Privacy and Security > Two-Step Verification to set it up. This will add an additional security measure to your account. If you’d already set up 2FA and yet someone was still able to access your account, change your password as a precaution.

4. Contact Telegram support

If you cannot regain access to your account or notice unauthorized transactions or changes you cannot reverse, contact Telegram support. You can reach them via the Contact Support option in the app or through their official website. Provide a detailed description of your issue, any steps you’ve taken, and any evidence of the hack. They might be able to assist you in getting your account back.

[Optional] Check your phone for malware

If your account has been accessed but there’s been no suggestion of how someone could have had access to your phone for verification purposes, the problem could be malware installed on your device. Spyware or keyloggers, for instance, would allow a hacker to see what you’re typing or looking at, making it possible for them to know your passwords and verification codes. Scrutinize the apps on your phone and perhaps run a scan using antivirus tools. Spyware persisting on your phone would keep a hacker coming back even after you’ve solved the problem and regained control of your Telegram. 

The other most likely way you were hacked was via phishing, meaning someone asked you to provide the necessary information. This one’s easy: Never provide information about your passwords or verification codes to anyone, ever. Only use them to log in to your accounts.

How safe and secure is Telegram?

Privacy policy. Telegram’s privacy policies highlight their commitment to user privacy, stating they do not share data with third parties. They have also been known to resist attempts by governments to access user data. However, their policies also indicate that they may cooperate with authorities in cases of terrorism or national security threats, which is a standard practice for many companies.

Encryption. Telegram is secure, but the encryption type depends on the feature you’re using. Every chat and call on Telegram is encrypted. Telegram offers end-to-end encryption for one-to-one calls, plus messages if you select the Secret Chats option. Secret Chat messages also can’t be forwarded, and there’s a self-destruct timer you can switch on, with intervals ranging from one second to one week.

However, end-to-end encryption is not used on all other types of chats, group calls, live streams, groups, and channels. Instead, they use secure client-server encryption. Telegram states that everything stored on their servers is encrypted, and the keys protecting that data are split apart and never kept with the data they protect.

Encryption is critical to ensuring private data remains private. While end-to-end encryption is the gold standard, client-server encryption also helps protect your messages by ensuring they cannot be deciphered when intercepted by your internet service provider, owners of Wi-Fi routers you connect to, or other third parties.

How do I set up passcode and multifactor authentication for Telegram?

Telegram offers two types of optional passwords. 

Passcode Lock

Passcode Lock forces you to enter a four-digit PIN to open Telegram on your device. This is meant for security in case you share your device with someone else. To set this up, go to Settings > Privacy and Security > Passcode Lock, then enable the feature and enter your preferred passcode. You can also choose to use Face ID instead of a passcode.

Additional Password

Additional Password, on the other hand, is designed to be used as a 2FA method, required for setting up your account on a different device. Go to Settings > Privacy and Security > Two-Step Verification > Set Additional Password. You’ll be prompted to enter your preferred password, a hint to help you remember it, and an email address for password recovery.

Can I get hacked through a Telegram bot?

Telegram bots are small applications within Telegram that can enhance a user’s experience, helping them complete various tasks. They also allow brands and companies to provide customer service, receive payments, host games, and more.

Sadly, there are malicious bots out there. For instance, there have been ones that pose as customer service and attempt to trick users into revealing their login information.

Ultimately the strongest advice regarding Telegram bots is to never reveal your account information to them, including your phone number, verification code, and 2FA additional password. 

How do I delete my Telegram account?

Deleting your Telegram account is a permanent action that cannot be undone. If you decide to proceed, you will lose all your messages, groups, and contacts associated with the account. There are two main methods to delete your Telegram account: automatic deletion due to inactivity and manual deletion through the Telegram deactivation page.

1. Automatic deletion due to inactivity 

Telegram has a feature that allows your account to be automatically deleted after a period of inactivity (one month, three months, six months, or one year, based on user settings). To adjust this setting, go to Settings > Privacy and Security. Then scroll to Delete my account if away for and select the period of inactivity after which you want your account deleted. 

2. Manual deletion through the Telegram deactivation page

For immediate deletion, follow these steps:

  1. Visit the Telegram deactivation page: Open a web browser and go to the Telegram Account Deactivation page
  2. Enter your phone number: You need to enter the phone number associated with your Telegram account in the international format. 
  3. Login: Telegram will send a confirmation code to your Telegram app. Enter this code on the webpage to proceed.
  4. Request account deletion: After logging in, follow the instructions on the website to request account deletion. You may be asked to provide a reason for leaving Telegram, but it’s optional.
  5. Confirm deletion: Confirm your decision to delete your account. Remember, this action is irreversible, and all your data, including messages and contacts, will be permanently removed.

 

The post How to recover a hacked Telegram account appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/how-to-recover-a-hacked-telegram-account/feed/ 3
Best AirTag alternatives for Android and iPhone https://www.expressvpn.com/blog/best-airtag-alternatives/ https://www.expressvpn.com/blog/best-airtag-alternatives/#comments Thu, 30 Mar 2023 01:31:10 +0000 https://www.expressvpn.com/blog/?p=66158 Geo pin tied to a string

AirTags are great for keeping tabs on your stuff, only if you use an iPhone. Check out these AirTag alternatives for all devices.

The post Best AirTag alternatives for Android and iPhone appeared first on ExpressVPN Blog.

]]>
Geo pin tied to a string

Bluetooth trackers like Apple’s AirTag are a convenient way to keep track of your belongings. They’ve also proven their usefulness in other ways. AirTags have been used for investigative journalism and even helped track down a carjacker. And who can forget the headlines about AirTags helping travelers find their lost luggage

Watch our video: How to track your own luggage

There are more disturbing ways people have used them, such as stalking exes or celebrities. Despite this, an AirTag is a very useful piece of technology. But it’s far from the only one on the market, with plenty of AirTag alternatives mainly targeting Android users.

Best AirTag alternatives

Jump to…
Tile Pro
Chipolo One
Samsung SmartTag
Tracki GPS Tracker
Cube Shadow

Tile Pro

Tile has led the way with Bluetooth trackers and is easily one of the best alternatives to an AirTag. The Tile Pro has an impressive range of 400 feet and a loud ring to help you locate the tracker. Being built out of metal and featuring an IP67 rating, it’s probably the most durable tracker on the market.

The best thing about the Tile Pro is that they’re platform agnostic, ensuring full functionality no matter your phone. However, unlike Apple and Samsung’s trackers, Tile is fully dependent on app installs to build out its tracking network. Frustratingly, some features, like alerts when your Tile Pro is far from you, are locked behind a subscription service. 

Pros Cons
Works on both Android and iOS devices Some features are locked behind a subscription service
Easy-to-replace CR2032 battery Tracking network is wholly dependent on app installs
Covers a long range of 400 feet
Incredibly durable

Chipolo One

A solid pick outside of heavyweights Apple, Samsung, and Tile is Chipolo. Don’t be deceived by the Chipolo One’s small and minimalistic design, though; the tracker is incredibly loud at 120dB, and its battery can last for two years—longer than any other tracker. It comes at the expense of a replaceable battery, but many would find the tradeoff acceptable.

Chipolo One has a tracking range of 200 feet and is also platform agnostic. Its tracking network is far more limited, though, relying on users with the Chipolo app to build it out. Opting for the Chipolo One Spot solves your tracking network concerns as it taps into Apple’s Find My network. The best thing about the Chipolo One is that it is cheaper than most trackers while remaining fully featured. Nothing is locked behind a paywall. 

Pros Cons
Works with both Android and iOS devices Smaller tracking network compared to major players
Two-year battery life with replaceable CR2032 battery
Affordable and fully featured
Might be the loudest tracker you can get
Lots of color options available

Samsung SmartTag

If you’re a Samsung smartphone user, the SmartTag is your best choice. SmartTags are tightly integrated with Samsung’s ecosystem and feature integration with SmartThings, Samsung’s smart home platform. For example, pressing the SmartTag’s button can turn on your lights. 

Like AirTags, SmartTags are tracked by Samsung smartphones nearby. And with Samsung being the largest smartphone manufacturer in the world, chances are, you’ll be able to find your missing items with a SmartTag.  

Pros Cons
Vast network of Samsung phones to help locate your SmartTag Only compatible with Samsung phones
Easy-to-replace CR2032 battery Not the smallest tracker around
Smart home integration

Tracki GPS Tracker 

As its name implies, the Tracki GPS Tracker doesn’t rely on Bluetooth connection, but GPS instead. By using GPS, the tracker isn’t reliant on a tracking network of devices like the other options listed here. It can provide real-time GPS tracking all by its lonesome, and it also means it has an unlimited range. You can set up geofences to receive alerts when the tracker leaves a designated area.

The tracker is very portable and also rechargeable, with battery life lasting up to 75 days on a single charge. The Tracki GPS tracker is protected from the elements via a waterproof magnetic box and is also incredibly affordable at just $17 a pop. 

Pros Cons
Unlimited range and precise locations thanks to GPS tracking Not the nicest looking tracker
Not reliant on app installs for its tracking network
Rechargeable battery with good battery life
Works with both Android and iOS devices
Much cheaper than other trackers

Cube Shadow

At just 2mm thin, the thinnest tracker on the market is the Cube Shadow. Its size might be the best thing about it, keeping it out of your way as you use it. The ultra-thin design comes at a price, though; battery life isn’t the best around. At least it is rechargeable. 

The tracker is well protected against the elements with an IP67 rating, and its alarm is very loud at 100dB. The biggest downside to the Cube Shadow is its unintuitive software, and it’s prone to false alarms—making it unreliable.

Pros Cons
Works with both Android and iOS devices Prone to false alarms
Ultra-thin design Unintuitive software
Rechargeable battery

 

How does AirTag tracking work?

AirTags are incredibly easy to use. Say you want to use an AirTag to keep track of your keys. All you have to do is pair an AirTag to your iPhone before putting the AirTag onto your keyring. Then, you can see where your keys are on a map in real time by looking at an app on your phone.

AirTags tap into Apple’s Find My network by sending a secure Bluetooth signal that nearby Apple devices can detect. The location of your AirTag is relayed to iCloud, and you can see it displayed on a map. The AirTag will also play a sound for you to find it, if it’s close enough to you.

Apple claims this whole process is anonymous and encrypted, meaning you won’t be able to see the information of the phones the AirTag linked with to communicate with the Find My network. 

While these trackers are designed to help you locate your own items, people have used AirTags for nefarious purposes. From stalking, car theft, and even surveillance, many have rightfully become concerned about the safety and privacy risks associated with AirTags. It’s important to note that these risks are not exclusive to Apple AirTags but affect all trackers.

Apple, Tile, and the like have safeguards to protect you from these risks. But they’re not perfect. This is why you should familiarize yourself with tips to protect yourself from AirTag abuse—even if you don’t use them.

Can AirTags work with Android phones?

As with all Apple products, AirTags don’t play nice with devices outside the Apple ecosystem. So, if you’re using an Android phone, an AirTag isn’t even worth considering; they just won’t work. 

Luckily, there are a number of alternatives to choose from. Below, we’ve compiled a list of alternatives worth considering, along with what you should look out for when picking a Bluetooth tracker.

What to look out for in AirTag alternatives

Here are some things to keep in mind when shopping for Bluetooth trackers.

  • Compatibility. The phone you use could limit your options when shopping for Bluetooth trackers. AirTags are only compatible with iPhones. SmartTags are only compatible with Samsung phones. Others, like those from Tile, are platform agnostic.
  • Form factor. Most Bluetooth trackers are small, but they come in a variety of colors and shapes. Some are long, some are round, and some are thick. You’ll be trading battery life for a smaller form though, so it’s best to weigh the tradeoffs and settle on a compromise you can live with.
  • Tracking ecosystem. Bluetooth trackers are only as effective as the size of their ecosystems. Which is why the AirTag is so good at what it does. Tapping into the Find My network means millions of iPhones helping you find your AirTag. Few alternatives offer the reach of Apple’s system; the closest probably is Samsung’s SmartTag. The others are wholly dependent on the number of installs of their app.
  • Bluetooth range. Trackers use their same-brand ecosystem to let users pinpoint their location anywhere in the world. But if you lose something that’s within close proximity (say, in your home), you’ll be relying on Bluetooth range to find it by making your tracker chime. The longer the range, the greater the area in which you can find something. Trackers’ Bluetooth range also determines how close other devices need to be to make use of their tracking ecosystem.
  • Waterproofing. Placing the tracker on the collar of your wandering cat? Or even if you’re just attaching it to your keys, ensuring that it is protected from the elements with an IP rating will keep it working for longer.
  • Pricing. Bluetooth trackers are pretty affordable, but more obscure brands are typically a little cheaper. Buying them in sets can net you even more savings.

The post Best AirTag alternatives for Android and iPhone appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/best-airtag-alternatives/feed/ 6
How to track your own luggage https://www.expressvpn.com/blog/how-to-track-your-own-luggage/ https://www.expressvpn.com/blog/how-to-track-your-own-luggage/#comments Tue, 28 Mar 2023 13:30:18 +0000 https://www.expressvpn.com/blog/?p=32681 Phone with location pin and luggage handles.

Love to travel but hate lost luggage? You might want to consider including a tracker device in your suitcase. Our two-minute video will show you how it works.

The post How to track your own luggage appeared first on ExpressVPN Blog.

]]>
Phone with location pin and luggage handles.

A lot of people flew overseas for the first time in a while last year—and a lot of them encountered chaotic airports, which led to delayed and lost luggage. With airports and airlines still experiencing staff shortages, busy travel periods are likely to bring more of the same.

Sure, most lost luggage gets recovered at some point, thanks to reliable tracking methods among airlines. But stepping into a new city or country without your belongings is nevertheless stressful. Where is it? When will it arrive—if ever?

You can remove some of this uncertainty by tracking your own luggage. 

Read more: Traveling this summer? 8 tips for online safety

Tracking devices for your luggage

Tracking devices use a variety of technologies to show you where your lost items are on a map on your phone. It might be merely interesting or calming to your neuroses to know where in the world your luggage is, or it might even help you find your bags in a disorderly airport. Here are your options and how they work.

Common Bluetooth trackers

Bluetooth tracking devices like Apple’s AirTag, Life360’s Tile, and Samsung’s Galaxy SmartTag are convenient for finding your keys or valuables, but they can also help you keep an eye on your luggage while traveling. Each device has an accompanying app—Find My, Tile, and SmartThings, respectively—which can be used to track any item you’ve attached a tracker to.

Generally speaking, small Bluetooth trackers are great for tracking items within a short distance—so depending on the device you’re using, this could reach up to 400 to 800 feet. This is especially helpful if you’re at the baggage carousel in the arrivals hall at the airport and your luggage hasn’t appeared. Perhaps it’s still on the plane or perhaps it’s the next item coming out on the conveyor belt. With Bluetooth, if it’s within your immediate vicinity, you’ll know exactly where it is.

Bluetooth trackers can also work for longer distances; an approximate location on a map can be given when the tags’ signals bounce off each other. In this sense, the Apple AirTag benefits from its huge user base.

If you love the peace of mind of being able to see your luggage on a map, wherever it is in the world, then by all means give it a try. However, you might not be able to do anything about getting it back sooner. After all, the responsibility of tracking and returning your luggage should fall to the airlines and not travelers.

Read more: AirTag, Tile, SmartTag security: Are you being tracked?

GPS trackers

In contrast to Bluetooth, GPS tracking is a more accurate option for tracking items long distances—anywhere on the globe to be exact! GPS is great for tracking things like vehicles (cars or bikes) and pets.

The biggest downside of GPS over Bluetooth is its inaccuracy in enclosed spaces—specifically in densely packed indoor environments where they may be affected by concrete walls or other obstructions.

GPS luggage tags like those by Dynotag or LugLoc are great for tracking your luggage through a web portal or app in real time. If your luggage ever goes missing, you can take comfort in the fact that you’ll know exactly where it is at any given time… but unfortunately, that probably won’t help you get it back any faster.

Should you track your own luggage?

There isn’t a downside to placing a tracker on your luggage, except the cost of the tracker. Adding a tracker to your luggage does not pose a significant privacy risk to you, and there aren’t any airline rules restricting you from doing this. 

There are situations in which tracking your own luggage might be helpful. For example, if you can see that it’s arrived in an airport, you can make your way there to claim it, possibly even before the airline has a chance to contact you. 

And then there is, of course, the entertainment value and peace of mind that a luggage tracker can provide you.

Travel tips to avoid losing your luggage

  • Opt for carry-on. Most international carriers allow for a single carry-on bag—usually 11 to 26 lb or 5 to 12 kg. So if you can squeeze most of your essentials into a carry-on, go for it!
  • Personalize your bags. Making your luggage stand out as much as possible is a great way to set it apart from others in its vicinity and prevent others from taking it by accident. This can involve using loud colors or distinctive patterns; adding a unique design, such as with stickers or colored tape.
  • Take pictures. Before flying, take pictures of your luggage from multiple angles. This will help to ensure that you can show any airline or airport staff what they should be looking out for in the event your baggage is delayed or misplaced.

The post How to track your own luggage appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/how-to-track-your-own-luggage/feed/ 8
Helping to keep the internet open in challenging times https://www.expressvpn.com/blog/staying-connected-in-challenging-times/ https://www.expressvpn.com/blog/staying-connected-in-challenging-times/#comments Fri, 04 Mar 2022 08:58:49 +0000 https://www.expressvpn.com/blog/?p=20719 ExpressVPN logo.

We welcome journalists and organizers currently in an oppressive situation who need secure access to the internet to get in touch.

The post Helping to keep the internet open in challenging times appeared first on ExpressVPN Blog.

]]>
ExpressVPN logo.

Wars, conflicts, and turmoil increase censorship and restrictions on internet access. Right now, the obvious urgency is providing unrestricted, yet protected, internet access to citizens in Ukraine, Russia, and other war-affected areas.

As always, we welcome organizers and journalists, including citizen journalists and individuals supporting the situation on the ground, currently in an oppressive situation who need secure, uncensored internet access, to get in touch. Tell us how a VPN will help you in your mission to help others or support freedom of information via safe@expressvpn.com so we can help with VPN access.

Growing demand for secure, uncensored internet access

As a VPN provider that gives its users secure, uncensored access to the internet, we are only all too aware of the growing demands to provide such protection—and the need has never been more urgent. 

In recent weeks, we’ve watched the Russian government accelerate its attempts to control the flow of information among its people and its neighbors by suppressing news reports and blocking social media. This is antithetical to our mission to ensure everyone has access to the free and open internet. 

Over the last decade, we’ve seen in our close work with journalists and activists how critical it is to have access to tools for staying connected and protected. And recent events have made it clearer than ever before that citizen journalism via social media plays a critical role during times of conflict. 

Free access to social media and the broader internet is crucial for citizens to connect, organize, and overcome oppression—and we exist to be part of the solution.

Read more: Safety resources: Stay secure amid oppression

The post Helping to keep the internet open in challenging times appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/staying-connected-in-challenging-times/feed/ 77
How to know if your phone has a virus https://www.expressvpn.com/blog/how-to-know-if-your-phone-has-a-virus/ https://www.expressvpn.com/blog/how-to-know-if-your-phone-has-a-virus/#comments Mon, 11 Oct 2021 02:00:49 +0000 https://www.expressvpn.com/blog/?p=10395 Mobile phone cardiograph.

From the presence of strange apps to sudden increases in data usage, learn to recognise the signs of an infected smartphone.

The post How to know if your phone has a virus appeared first on ExpressVPN Blog.

]]>
Mobile phone cardiograph.

While it’s probably not the best idea to run a self-diagnosis on yourself with WebMD, there’s absolutely no reason why you shouldn’t be diagnosing issues with your technology—especially your smartphone

[Get more digital tips sent to your inbox by signing up for the ExpressVPN blog newsletter.]

Is it time to declutter your smartphone? Or is it time to invest in a mobile antivirus to fend off malware? 

Let’s take a look at the telltale signs of infected smartphones and how to keep yourself protected.

Read more: What is malware? How viruses, trojans, and ransomware work

Symptoms of a virus-infected smartphone

Slower phone or faster battery drain

Slower devices can commonly be a sign that you’re either running out of storage space or using an outdated operating system. However, a more dire possibility is the presence of malware. A virus can find its way onto your phone either through a suspicious link that you’ve clicked on or hidden inside an app you’ve downloaded. 

Read more: What is Pegasus spyware? And how to protect your phone

Sudden increase in data consumption

If you’ve found that your data usage has taken a sharp increase on your latest phone bill, chances are there’s a malicious code or program sending data from your phone to unknown servers. Or worse, your phone is being used to send texts or make calls to premium phone services—which leads to…

Messages being sent to your contacts

Some mobile viruses will send messages to contacts on your phone with links to infected software. Should any of your contacts click on these links and download any apps, their phones will also be infected.

Strange apps

If you see strange apps on your phone that you don’t remember installing, there’s a pretty high chance they’re viruses.

Read more: What is bloatware, and how can you remove it?

Persistent and aggressive ads

The sudden onset of pervasive ads is a big indicator that you’ve installed an app of unknown or nefarious origin that is pushing unwanted advertisements to your device.

Hijacked search engines

Are search results on your phone suddenly being rerouted to search engines or websites you’ve never heard of before? Are you finding it difficult to switch back to your default search engine or browser? You’ve definitely got a virus.

Read more: Ranked: Best (and worst) search engines for privacy in 2021

Keeping your smartphone protected

Keep your software up to date

Don’t ignore “update your device” prompts on your phone. Keeping your device software updated is one of the easiest ways to ensure you have a head start in thwarting the latest malware infections and fixing software bugs. Don’t want to be continually pestered with prompts? Set your device to perform updates automatically.   

Only install apps from trusted sources

This one is a no-brainer, by only installing apps from trusted sources, you can ensure that they’ve been authenticated. In other words, you’ll know exactly what’s going onto your phone.

Don’t open strange attachments

Never trust attachments of unknown origin. In fact, don’t trust all attachments sent to you by trusted sources—at least until you’ve verified its authenticity as phishing scams are extremely common.

Invest in a decent antivirus

While use of an antivirus won’t be a one-stop shop for mobile protection—in fact, our writer Lexie has written that it’s better to update your system than to use antivirus software)—it is worth considering as one aspect of your digital security. Especially when paired with a VPN!

Read more: 18 top tips to protect your online privacy in 2021

The post How to know if your phone has a virus appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/how-to-know-if-your-phone-has-a-virus/feed/ 1
Guide to data hoarding for the end of the world https://www.expressvpn.com/blog/guide-to-data-hoarding-for-the-end-of-the-world/ https://www.expressvpn.com/blog/guide-to-data-hoarding-for-the-end-of-the-world/#comments Tue, 27 Apr 2021 07:58:32 +0000 https://www.expressvpn.com/blog/?p=8007 RAID storage data backup.

Do you like to download large quantities of information off the internet for safe keeping? You might be a data hoarder—and that’s a good thing!

The post Guide to data hoarding for the end of the world appeared first on ExpressVPN Blog.

]]>
RAID storage data backup.

This is it. The moment you’ve dreaded. The unexpected has finally happened. Either:

  1. The internet has collapsed
  2. Your government has suddenly declared it illegal to access the internet
  3. Everything around you is being retroactively edited or censored

If only you had hoarded all of that freely available information!

What is data hoarding?

Hoarding is the obsessive compulsion to accumulate a variety of items, whether or not they are useful in the long run. The most well-known instance of this behavior is compulsive hoarding, which is the obsessive acquisition of physical objects. This practice is harmful in many ways and can affect a person’s health, economic situation, and productivity. In fact, you most likely know it from the aptly named TV series Hoarders

Data hoarding—also known as digital hoarding—on the other hand, is the practice of collecting or archiving excessive amounts of data. While it may share similar traits to physical hoarding, it is not recognised as a medical condition as it does not manifest in physical clutter. 

For this article, we’ll be focusing on the archival aspects of data hoarding rather than on the issue of clutter.

[Keep up with the latest in technology and security. Sign up for the ExpressVPN blog newsletter.]  

Whether you’re archiving for posterity, avoiding censorship, or preparing for the collapse of the internet, it’s never too late to start data hoarding. 

Who hoards data? And why?

There’s a pretty active and awesome data hoarding community over on Reddit that outlines several reasons for curating data. This includes: “Legal requirements, competitive requirements, uncertainty of permanence of cloud services, distaste for transmitting your data externally (e.g. government or corporate espionage), cultural and familial archivists, internet collapse preppers, and people who do it themselves so they’re sure it’s done right.

In one of the most recent instances of archiving for posterity, the folks at r/DataHoarder archived a whopping 1,013.12 GB of live streams and social-media posts surrounding the storming of the United States Capitol

If you want to start your journey towards data hoarding and digital archiving, this subreddit is the place to start!

While it isn’t as detrimental to individuals as hoarding physical items, data hoarding may lead to several unwanted side effects that can include accumulation of an excessive amount of hard drives, increased power consumption—especially when it comes to online storage—and an increased cybersecurity risk.   

Best things to download off the internet

Kiwix

Kiwix is a free and open-source browser and offline browser. It was originally created to serve as an offline reader for Wikipedia, but has now expanded to include content from the entire Wikimedia Foundation, TED Talks, and Khan Academy among others. Kiwix has found a lot of success in remote parts of the world where a steady internet connection is not possible including inland rural areas and out at sea.

Download the Kiwix browser here, content libraries here, and custom apps here.

Media

The Internet Archive is a universal library that provides universal and free access to a variety of media including books, magazines, movies, TV shows, music, images, software, and games. It is one of the largest libraries in the world and is a huge repository for public domain and creative commons content.

Learn how to download media from the Internet Archive here

YouTube is a great resource for user-generated content. Whether it’s how-to guides, tutorials, or classes on a variety of topics, YouTube has an endless supply of content. It’s also perfect for discovering video podcasts and discussions on topics that interest you. 

Download YouTube content with youtube-dl or 4K Download.

You can also rip media from websites by using download managers like JDownloader, Xtreme Download Manager, and Advanced Download Manager.

GOG also has a great selection of free offline games to download here.

Manuals

From a personal technology standpoint, one takeaway from the shift to remote working during the Covid-19 lockdowns has been the need to be able to repair our own devices. The issue that consumers faced during this period was that many licensed technicians were forced to shut down, leaving devices unusable.

Let’s take that one step further. What if one of the scenarios listed at the beginning of this article were to happen? How would you repair your personal technology then? How would you repair microwaves, vacuum cleaners, or refrigerators? 

Enter iFixit, a manual repository with over 70,000 free manuals for almost every conceivable piece of technology that you would interact with on a daily basis.

Search through iFixit’s extensive lists and download relevant manuals here

What about nature and survival guides? Thanks to the diligent work from the folks over at r/Survival, an extensive free survival library is available here

Linux distros

It’s not a secret that this writer is a fan of Linux for everyday use. Linux is a family of free and open-source operating systems that are highly customizable. There are thousands of distributions, each developed for different audiences. One of the best things about Linux, from an archiving perspective, is that distributions tend to be much lighter than proprietary operating systems like Windows and macOS. Keeping a selection of stable Linux distros on hand is a handy way to circumvent any issues that may arise when using a proprietary operating system long-term.

Not only do we suggest you collect several Linux distributions, but we also recommend that you switch over to Linux entirely. Plus, if you choose one with long-term support, it’ll require very little maintenance. It’s also a good idea to keep a live Linux USB on hand to troubleshoot any Windows issues you’re facing. 

Check out our guide on downloading and installing various Linux distributions here.

Productivity

Maybe you want to keep a journal of societal collapse, maybe you want to chronicle your journey out on the ocean, or maybe you want to collect your thoughts in solitude high up in the Andes. Well, you can’t do that without a productivity suite. If you have a Windows or Mac machine, you’ll most likely have access to some form of Microsoft Office or iWork but these may require updates or license renewals over time. Opting for a free and open-source alternative can ensure a longer product lifetime.

Our favorite is OnlyOffice Docs, which provides a document editor (analogous to Microsoft Word/iWork Pages), presentation editor (analogous to Microsoft PowerPoint/iWork Keynote), and spreadsheet editor (analogous to Microsoft Excel/iWork Numbers).

Get OnlyOffice Docs here.

Backup the data you’ve hoarded 

One of the most common backup strategies is called the 3-2-1 rule which states that you should have:

  • 3 copies of your data
  • 2 of those copies being backups stored on different types of media
  • 1 of those backups stored remotely

This is ideally something that you could start working on now. Who knows how much data you’ve already accumulated? The more you have, the longer this will take so start now!

Hoard away!

Read more: How to back up your files and encrypt them

The post Guide to data hoarding for the end of the world appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/guide-to-data-hoarding-for-the-end-of-the-world/feed/ 3
Want to win an additional 6 months of ExpressVPN? https://www.expressvpn.com/blog/top10vpn-review/ https://www.expressvpn.com/blog/top10vpn-review/#comments Mon, 09 Apr 2018 08:10:09 +0000 https://www.expressvpn.com/blog/?p=5367 All you need to do is leave a review at Top10VPN.com. Each month, we will randomly select five people who have left reviews to get an extra six months of ExpressVPN added to their subscription at no extra cost. Hurry up and let us know what you think of ExpressVPN! Leave a Review at Top10VPN […]

The post Want to win an additional 6 months of ExpressVPN? appeared first on ExpressVPN Blog.

]]>
All you need to do is leave a review at Top10VPN.com. Each month, we will randomly select five people who have left reviews to get an extra six months of ExpressVPN added to their subscription at no extra cost.

Hurry up and let us know what you think of ExpressVPN!

Leave a Review at Top10VPN

Note: Each winner is limited to one prize from any giveaway within a 12-month period.

The post Want to win an additional 6 months of ExpressVPN? appeared first on ExpressVPN Blog.

]]>
https://www.expressvpn.com/blog/top10vpn-review/feed/ 45