April 10, 2023
Tutorials
8 min read

Proxy vs VPN: What Are the Differences?

VPNs have more features than a proxy, but they are more expensive. However, there are more pros and cons when choosing between a VPN or a Proxy.
Povilas M.
Security Expert
March 16, 2023
Security
5 min read
What Is a Remote Wipe? Remotely Delete Your Phone
A remote wipe is a remote deletion of data from a device without having the device physically. Remote wipes can run on mobile phones, desktops, etc.
Ross K.
Security Expert
December 12, 2022
Security
4 min read
Kraden Vault: Secure File Storage
Secure file storage feature that lets you store all of your important files, create notes, and even take photos directly from the app.
Ross K.
Security Expert
September 19, 2022
Updates
5 min read
Passcode security improvements on Kraden 1.17.0
Learn more about additional passcode security layer updates on Kraden, including optional biometric log-in.
Ross K.
Security Expert
August 4, 2022
Privacy
10 min read
Is Someone Spying on My Phone?
Are you taking your online privacy seriously? Learn tips and tricks to tell if someone is spying on your phone and how to prevent it.
Povilas M.
Security Expert
August 1, 2022
Security
11 min read
Brute Force Attack: What It Is and How to Protect Yourself
A brute force attack is an automated method to guess credentials (e.g. passwords). Learn how it works and what to do if you're experiencing one.
Povilas M.
Security Expert
July 27, 2022
Security
5 min read
Resetting Encrypted Data: Why and How Should You Do It?
What does reset encrypted data mean? Read our guide and learn more about resetting your encrypted data and why it's essential for online privacy.
Ross K.
Security Expert
July 20, 2022
Security
10 min read
What Is Sniffer? Ways To Protect Yourself
A sniffer is a software or hardware tool that monitors internet traffic and captures all the data flowing to and from your computer in a real time.
Povilas M.
Security Expert
July 14, 2022
Privacy
5 min read
How to Make an Anonymous Call From Your Phone?
Anonymous call is a solution for calling that lets you stay hidden and majorly improve security. No more intercepted calls or leaked confidential information.
Povilas M.
Security Expert
July 4, 2022
Tutorials
8 min read
What Is a Burner Phone: The Ultimate Guide
A burner phone, also called burn phone, is a cheap and temporary mobile phone that you can easily destroy when you no longer need it.
Ross K.
Security Expert
June 15, 2022
Security
7 min read
Kraden vs Signal: Apps Comparison
When deciding between Kraden and Signal, the right choice seems obvious – Kraden offers more security and privacy features while Signal provides a fraction.
Povilas M.
Security Expert
June 6, 2022
Security
8 min read
What is WEP, WPA, WPA2 and WPA3?
Wi-Fi Protected Access (WPA) is a wireless security protocol made to replace WEP. WPA2 and WPA3 are updated and more secure versions of WPA.
Povilas M.
Security Expert
June 2, 2022
Security
13 min read
What Is Pegasus Spyware? Everything You Need To Know
Pegasus spyware is powerful spyware used to compromise privacy and security. Used by the government, it is targeted at high-rank people or journalists.
Ross K.
Security Expert
May 1, 2022
Privacy
7 min read
How Self Destructing Messaging Works?
Self-destructing messaging, also called ephemeral messaging, is a disappearing messaging system where messages are erased after seconds when read.
Povilas M.
Security Expert
April 27, 2022
Tutorials
8 min read
Google Pixel Phone Explained
A pixel phone is a great value smartphone from Google with built-in security features, strong device management and an all-day lasting battery.
Ross K.
Security Expert
April 22, 2022
Tutorials
16 min read
What Is GrapheneOS? The Ultimate Guide
A step-by-step installation guide to set up your phone with GrapheneOS, a security and privacy focused mobile OS for Android.
Povilas M.
Security Expert
April 16, 2022
Privacy
8 min read
Is the Government Is Watching Me?
Government surveillance is a very real threat and in a lot of countries, it's only getting worse. How to know if you are being tracked and how to protect yourself.
Ross K.
Security Expert
April 13, 2022
Security
7 min read
Am I Being Throttled? 4 Ways to Find Out
Throttling is when your internet service provider (ISP) slows down your connection, and it can happen for a variety of reasons, including your activity.
Povilas M.
Security Expert
April 7, 2022
Tutorials
5 min read
How To Delete Your Telegram Account?
Discover this 5 easy steps guide to permanently delete your telegram account without leaving a trace or records. First, you'll find the delete in the apps' settings.
Ross K.
Security Expert
April 4, 2022
Tutorials
8 min read
Secure Operating System for 2022 (Secure OS Guide)
Learn how to install a security-oriented operating system for your phone. Unlock an additional layer that will help you securely protect your digital life.
Povilas M.
Security Expert
March 31, 2022
Tutorials
10 min read
File Encryption & Encrypted File Sharing: Guide for Beginners
Learn how to encrypt files and securely share them by implementing cryptography methods used by top-level security experts worldwide.
Povilas M.
Security Expert
March 27, 2022
Privacy
5 min read
What Is Private Messaging?
Private messaging is a communication channel between users that is secure from data collection and hackers. It has encrypted and self-destructing messages.
Ross K.
Security Expert
March 23, 2022
Security
8 min read
What Is End-To-End Encryption (And Why You Need It)?
End-to-end encryption is a communication protocol that ensures only the intended recipients can read and see the contents of a message.
Povilas M.
Security Expert
March 19, 2022
Privacy
6 min read
What Is Anonymous Messaging? Anonymous Messenger Explained
Anonymous messaging is a way to send messages through anonymous messaging apps or websites without revealing your identity or information.
Povilas M.
Security Expert
March 18, 2022
Security
3 min read
What Is a Duress Code (And How to Use It)?
A duress code is a security measure that allows you to protect your data in case of an emergency event. When entered, it will perform security actions.
Povilas M.
Security Expert
March 17, 2022
Security
11 min read
AES Encryption Explained (Advanced Encryption Standard)
AES, or Advanced Encryption Standard, is one of the most versatile and popular symmetric key encryption algorithms in the cryptography sphere.
Ross K.
Security Expert
March 14, 2022
Security
5 min read
What Is a Peer-To-Peer (P2P) Connection?
A peer-to-peer (P2P) connection is a type of network connection that allows two or more devices to connect directly to each other, without the central server.
Povilas M.
Security Expert
March 11, 2022
Security
5 min read
Executive Phishing: Tips To Defend Your Company
Executive phishing, also known as whaling (or CEO fraud) is targeted cyber-attacks on enterprise's high-level executives to steal sensitive company information.
Povilas M.
Security Expert
March 10, 2022
Privacy
8 min read
What Is IP Spoofing? Ways To Protect Yourself
Internet Protocol (IP) spoofing is one of the most common cyber-attacks where the cybercriminal hides the true source of the IP packets to falsify the content.
Povilas M.
Security Expert
March 9, 2022
Privacy
8 min read
What Is Whaling Attack & Whaling Phishing?
A whaling attack, also known as whaling phishing is a method used by cybercriminals to target high-value individuals and access their private information.
Ross K.
Security Expert
March 8, 2022
Tutorials
8 min read
How Do I Unhack My Phone? The Ultimate Guide For Beginners
Learn how to unhack your phone, measure threats on a hacked phone and take precautionary measures by installing security services for future use.
Povilas M.
Security Expert
March 6, 2022
Security
8 min read
What Is Vishing? Vishing Attacks Explained
Vishing is a particular form of phishing attack that is done using voice over the phone. The call combined with social engineering leads victims to harm.
Ross K.
Security Expert
March 3, 2022
Security
10 min read
How to Make Your Phone Untraceable?
An untraceable phone is a custom-built secure device that lets you share sensitive information without being tracked or leaving a footprint.
Povilas M.
Security Expert
February 24, 2022
Security
6 min read
How to Prevent a Replay Attack in 2022
A replay attack is when the hacker or cybercriminal can sneakily intercept your data package and then repeat it back imitating you.
Povilas M.
Security Expert
February 16, 2022
Security
5 min read
Who Are White Hat Hackers?
White hat hackers are unique individuals with special talents in exploiting cybersecurity-related vulnerabilities. They do it ethically and help out businesses.
Povilas M.
Security Expert
February 15, 2022
Privacy
10 min read
What Is a Digital Footprint?
A digital footprint is a record that most digital devices leave behind after interactions. It is information such as location, websites visited, emails, etc.
Povilas M.
Security Expert
February 5, 2022
Privacy
5 min read
What Can Someone Do With Your Phone Number?
Learn how your phone number can become a significant threat when social engineers, cybercriminals take action or back-doors are presented.
Povilas M.
Security Expert
A security and IT company on a mission to make everyone’s privacy a default.
© 2022 Dragon Secure GmbH. Bahnhofstrasse 32, 6300, Zug, Switzerland
info@kraden.com