• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

All Things Secured

Online Security Made Simple

FREE ONLINE SECURITY CHECKLIST! DOWNLOAD NOW

  • Basics
    • Start Here (Security Guide)
    • What is a Digital Footprint?
    • What is a VPN?
    • What is 2-Factor Authentication?
    • What is SmartDNS?
    • Bad Security Habits
    • Http vs Https?
  • VPNs
    • Best VPNs 2026
    • Best Free VPNs 2026
    • VPN Reviews
      • ProtonVPN Review
      • ExpressVPN Review
      • Surfshark Review
      • NordVPN Review
      • VyprVPN Review
      • Mozilla VPN Review
      • IPVanish Review
      • Avast VPN Review
      • Ivacy VPN Review
      • PureVPN Review
    • Frequent Asked Questions
      • Are VPNs Illegal?
      • Tor vs VPN?
      • What is a VPN Kill Switch?
      • What is Split Tunneling?
      • Zero Log VPN?
      • Free VPN vs Paid VPN?
      • Lightway vs WireGuard vs OpenVPN
      • Increase Internet Speed on VPN?
      • How to Watch Netflix in China?
    • Key VPN Features
    • 5 Best VPNs for Routers
    • VPN Myths
    • VPN Scams
    • VPN Protocols Guide
  • Passwords
    • Password Manager Setup
    • Best Password Managers 2026
      • Proton Pass Review
      • 1Password Review
      • Dashlane Review
      • NordPass Review
      • Best iOS Password Manager
    • Frequently Asked Questions
      • How Do Password Managers Work?
      • Are Password Managers Safe?
      • Are Chrome Passwords Secure?
    • Double Blind Password Strategy
    • Using Google Authenticator
  • Email
    • Secure Email Providers in 2026
    • ProtonMail Review
    • Email Phishing Scams
  • Cloud
    • Best Encrypted Cloud Storage
    • Cryptomator vs Boxcryptor
  • Resources
    • Help! I’ve Been Hacked!
    • Password Strength Checker
    • Security Checklist PDF
    • Digital Death Checklist
  • About
    • Contact
    • Advertise

Josh

What is Split Tunneling VPN? (and is it actually secure?)

December 12, 2023 By Josh

What is Split Tunneling for VPNs?

VPN Split Tunneling is a feature that allows users to direct a portion of their internet traffic through an encrypted virtual private network while leaving the rest to be routed through a separate tunnel on the open network. It’s an advanced feature with specific uses that we’ll cover in detail here. By default, a virtual […]

Tor vs VPN | What’s the Difference? (which you should use)

December 8, 2023 By Josh

Tor vs VPN - What is the difference?

Tor or VPN? The truth is, it’s not an apples to apples comparison, and since you really care about your privacy and security online, in this article I’m going to provide a basic explanation of how each of these tools work and the specific jobs they’re built for. There’s one important question you need to […]

What is a Decentralized VPN? The Pros and Cons of dVPN

December 7, 2023 By Josh

What is a decentralized VPN

The biggest problem with using any virtual private network, or VPN, is simply trust. Can you trust this company with your most sensitive data? But what if trust wasn’t part of the equation? In this article, we’re going to explore how decentralized virtual private networks, or “dVPN” for short, might be a solution. The Problem […]

How to Create Strong Passwords You Can Remember (3 Strategies)

December 6, 2023 By Josh

What is your password strategy?

You know you need to create a strong password for your online logins. Everybody does. The trouble is coming up with unique passwords for each account and then remembering them. Is that even possible? It is, I promise you. As proof, I’d like to share with you three simple password strategies to create strong passwords […]

Proton Mail now uses Blockchain to Verify Email Addresses (Key Transparency Explained)

November 22, 2023 By Josh

Proton Mail Key Transparency

In November 2023, Proton Privacy launched a beta feature called “Key Transparency” that utilizes a private blockchain to verify that an email address belongs to the person you intend to communicate with. Despite being one of the most respected providers of data privacy products in the world, this is the first time that Proton has […]

How to Use Gmail Confidential Mode (password-protect email)

September 10, 2023 By Josh

Gmail Confidential Mode Tutorial

There are times when sending sensitive information over email requires the ability to set that email to expire or to limit who can open that email. While there are pros and cons to using Gmail’s Confidential Mode, which I’ll explain here, this tutorial will show you exactly how to set it up and use it. […]

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Page 28
  • Interim pages omitted …
  • Page 31
  • Go to Next Page »

Primary Sidebar

Download the free online security checklist!
Check your password with this password checker by All Things Secured

Best Personal Privacy Tools

Use DeleteMe to Remove Your data onlineDeleteMe (data removal)
Use Traveling Mailbox to keep your address privateTraveling Mailbox (private address)
Hushed private second phone numberHushed (private phone)

Recommended Password Managers

Proton Pass Logo MarkProton Pass (Best Overall)
1Password Logo Mark1Password (Popular)
Bitwarden Logo MarkBitwarden (Best Free Option)

Best Secure Email Providers

ProtonMail Logo MarkProtonMail (Recommended)
Tuta Encrypted EmailTuta (formerly Tutanota)
StartMail Logo MarkStartmail (from StartPage)

Recommended VPNs

ProtonVPN Logo MarkProtonVPN (Best Overall)
NordVPN Logo MarkNordVPN (best for streaming)
iVPN Logo MarkiVPN (best for privacy)

Best Identity Theft Protection

Identity Guard Logo MarkIdentity Guard (Recommended)

Build Better Security in 1 Week.

Start the 7-Day Email Course Today.

Take the Free Course

Copyright © 2026 · Disclaimer 
· Privacy Policy
 
· Terms of Service
 
· Cookie Policy
 · Advertise
 · Contact