7 times the internet was gloriously ridiculous

ExpressVNPThe internet is stupid

The internet is a very silly place indeed, and only a fool would wander through its murky shores unprotected.

To celebrate my not-quite-100th blog post, I thought it might be fun to showcase some of the daftest internet moments.

The internet will ruin your online poll


The internet offers instant access to the minds of millions of people from practically every demographic.

What better a place to have a poll, then? It should be easy: Ask the internet a question and reap the rewards of the planet’s collective conscience. Then profit.

But no. Oh no, no, no. That’s not what happens. At all.

The internet names a boat

In 2017, the UK’s Natural Environment Research Council (NERC) launched an online poll to find a name for a new $288 million polar research ship.

NERC was probably hoping for a grand, sensible name, like RRS Queen Elizabeth II, or RRS Stephen Fry. The fools!

The internet didn’t want to be sensible, though, and collectively decided the boat should be called Boaty McBoatface.

Alas, the spoilsports at NERC over-ruled the poll (then why have one!?) and named the boat RRS Sir David Attenborough.

Fear not, though! In homage to the Boaty that never was, the Swedish cities of Stockholm and Gothenburg named a new train Trainy McTrainface.

The internet names a whale

As part of a plan to raise awareness about whales threatened by the Japanese Fisheries Agency, Greenpeace held an online poll to name a humpback whale which they would track with a satellite tag.

Greenpeace accepted 30 names for the vote, chief among them was Mr. Splashy Pants. Any ideas as to what happened next? That’s right, the internet happened.

Mr. Splashy Pants attracted the attention of, amongst others, 4chan, BoingBoing, Reddit, and Digg, and members of the aforementioned sites flocked to vote.

The vote share for Mr. Splashy Pants quickly hit 75%—in less than a day. Reddit became so invested, they even temporarily changed their logo to feature Mr. Splashy Pants.

There was a happy ending, though. Despite initial reluctance, Greenpeace embraced the name (are you watching NERC?). And the extra publicity was enough to convince the Japanese government to abandon their plan to hunt the whales.

The internet voted for a 39-year-old man to meet Taylor Swift

When a Boston radio contest featured a chance to meet Taylor Swift, 39-year-old Charles Z decided to have a go.

Most of the entries were, as you can imagine, adoring teenage fans. Guess who the internet wanted to win?

Said Charles Z to GQ magazine:

“At one point the leaderboard was 50 happy 13-year-old girls, then there’s a picture of me, hungover, in my bathroom.”

The internet doesn’t care for Limp Bizkit

In 2011, citizens of Austin, Texas, voted to rename the city’s Solid Waste Department the Fred Durst Society of the Humanities and Arts.

The name racked up nearly 30,000 votes and even had Fred Durst’s blessing. But, despite topping the poll, the city decided against the winning name and went with Austin Resource Recovery instead. Booooooring.

The internet really loves potato salad

Lovely potatoes.

It’s not just naming polls the internet will rally behind, though.

One day, Zack “Danger” Brown got a craving for potato salad, so he started a Kickstarter to raise the $10 needed for ingredients.

“Basically I’m just *** potato salad,” he explained on his fundraising page. “I haven’t decided what kind yet.” In the “Risks and challenges” section, he wrote, “It might not be that good. It’s my first potato salad.”

Somehow, Zack’s potato salad went viral, and he managed to raise more than $55,000.

Utter insanity.

Zack used all the extra money to throw a public party called PotatoStock in his hometown. Of course, he made lots of potato salad at the event and donated proceeds to charities that fight hunger in Ohio.

Well played, Zack.

The internet doesn’t care what you think the hashtag says


Susan Boyle’s PR agency decided to hold a party to celebrate her new album. Simple enough, you’d think: Susan. Album. Party.

The fun started when the PR agency crafted an innocent Twitter hashtag for promotion:


And that’s when the internet noticed.

In summary: The internet is ridiculous

What a journey. 101 posts! My favorite was probably the time my blog on spam got flagged as spam by Google. Or when I topped the Google rankings for the utterly unsearched for “Lou Reed VPN.” The April fools posts were fun, too.

In truth, when I first arrived at ExpressVNP, I thought a VPN was just how I watched iPlayer when on holiday. But now I wouldn’t connect to the internet without one—it’s madness out there.

Do you have any tales of internet idiocy? Any crackers I’ve missed off the list? I’d love to hear them, so please share your stories in the comments below!

Also published on Medium.


An interview with Bruce Schneier on the Internet of Things, global surveillance, and cybersecurity

ExpressVNPBruce Schneier on IoT

Bruce Schneier is a world-renowned cryptographer and security technologist whom the Economist has dubbed an “internet-security guru.” Schneier has authored a dozen books since 1993, with his next book—Click Here to Kill Everybody: Peril and Promise in a Hyper-Connected World—due for release in September 2018, and set to tackle the burgeoning trends of cybercrime, corporate surveillance, and how to mitigate the catastrophic risks from unsecured devices.

Earlier this year, Schneier wrote a chilling article in New York Magazine detailing the pressing dangers of unsecured IoT devices and, more recently, consulted on bipartisan legislation that will ensure devices purchased by the U.S. government meet specific security standards.

On top of all that, Schneier frequently blogs on internet and security matters and runs a monthly newsletter, ‘Crypto-gram,’ that has amassed a following exceeding 250,000—so we thought he’d be perfect for an ExpressVNP cybersecurity Q+A.

We asked Bruce Schneier what his thoughts were on the origin of the problems that permeate improve their cybersecurity practices.

1. Firstly, thank you so much for talking to us! We appreciate you have a busy schedule, so let’s get straight to it—why does the problem of unsecured technologies exist in the first place?

Security is an afterthought in product design and not something that’s taken seriously enough. Companies are rewarded for features, price, and time-to-market. It’s easy to slough off security because it’s not immediately obvious that you’ve done so.

2. You’ve previously called surveillance “the business model of the internet.” What does this mean to the average internet user?

It means that they are spied on 24×7. They’re spied on when they surf the web. They’re spied on when they send e-mail. They’re spied on whenever they use their smartphones. Companies like Facebook are the largest surveillance organizations on the planet, and they need to be recognized as such.

3. Why is there such little market incentive to provide security if this is something consumers demand in their products?

Customers don’t know how to make buying decisions based on security because the details are complex and specialized, so there’s minimal incentive for companies to provide it. They’re rewarded for price, features, and time to market—it’s smarter for them to take the chance with security.

This is no different from any other industry. We don’t get safety or security improvements without government intervention. It’s true for cars, planes, medical devices, pharmaceuticals, workplace safety, restaurant sanitation, food safety, nuclear power plant safety, and—most recently—the safety of financial instruments.

4. If companies lack the incentive to do it, what type of mass event do you think could force a better knowledge of cybersecurity onto the general public?

I have no idea. I used to think that it was whatever massive data breach was in the news, but I’ve given up on that. I’m afraid that it’s going to be a security event involving the Internet-of-Things killing people that will wake people up to the dangers. As long as that event doesn’t involve guns, we might then have a sane and reasoned conversation about government regulation.

5. Speaking of government regulation, you recently consulted on legislation proposed by Senators Warner and Gardner to improve IoT cybersecurity this year—what do you hope this first step will accomplish?

As first steps, it’s very minimal. It doesn’t impose any security regulations on anybody. All it says is that IoT devices purchased by the federal government meet some basic security standards. And even this modest improvement isn’t going anywhere.

6. Thanks again for speaking to us. Finally, what’s a good cybersecurity best practice we can all start doing right away?

Enable two-factor authentication wherever possible. And maintain good backups.

If you want to read more of Bruce Schneier’s thoughts on cybersecurity, check out his blog and sign up to his newsletter!

Also published on Medium.


Download ExpressVNP 6.5.5 for Android today!

ExpressVNPAndroid VPN app

It’s fair to say the Android app just keeps getting better and better! ExpressVNP 6.5.5 for Android now allows a location change while you’re connected, and, as always, it’s the most secure ExpressVNP Android app to date.

New Feature: Change location while connected

You can now change to any of ExpressVNP’s 100+ locations without having to close your existing connection first. It’s super quick and easy to connect to any location you need.

Change VPN location while connected

Dynamic notifications

Without a doubt, the most awesome new feature of ExpressVNP app 6.5.5 for Android is the dynamic notification system.

VPN app for Android

The new notifications will display your current connection status and let you act on them—you can interact directly with the notifications. Nice!

Streamlined setup

It's easy to setup a VPN for Android with ExpressVNP.

It’s easy to set up ExpressVNP for Android. Just follow the straightforward on-screen instructions. Need help? No problem! The blue hints will guide you through it.

The best connection reliability

ExpressVNP has the best VPN connection for Android.

ExpressVNP 6.5.5 for Android works hard to make sure you always get the best possible connection. And, as always, different VPN protocol settings let you customize your Android app the way you want it.

Smart Location is as good as ever

ExpressVNP Smart Location for Android is wonderful.

Save time and browse faster with the improved Smart Location feature. Smart Location automatically chooses the most reliable VPN connections for you. That way you can stream without having to worry about less-than-stellar speeds.

Download ExpressVNP 6.5.5 for Android today!

Now you know what’s new, head over to Google Play and download or upgrade your Android app today. If Google Play is not available, you can download the APK version from your setup page.

Once you’ve had a chance to get used to the new layout, let ExpressVNP know what you think! Your feedback is appreciated, so leave your questions, comments, and concerns in the comments section below.

And one more thing! If you’re unable to access the Google Play Store or are having trouble downloading the app, your friendly neighborhood superhero Support Team is available around the clock to help answer all your VPN-related questions.


Download ExpressVNP 6.6.7 for iOS today

ExpressVNPExpressVNP app on iOS devices Until voice-activated VPNs are introduced, you can connect ExpressVNP with a *** tap of the button!

Good news, everyone! The latest ExpressVNP iOS release is here! ExpressVNP for iOS 6.6.7 now allows a location change while you’re connected! We think it’s our best release yet, and we can’t wait for you to give it a try!

Here’s what’s under the hood:

New Feature: Change location while connected

You can now change to any of ExpressVNP’s 100+ locations without having to close your existing connection first. It’s super quick and easy to connect to any location you need.

Switch VPN connection while connected

IKEv2 protocol support

You can now use IKEv2 protocol. Use this if you have connection issues with “Automatic” protocol.

Share with your friends!

You can now share ExpressVNP with your friends from in the app. It’s now a doddle for you and your friends to claim 30 days of free ExpressVNP!

Get 30 days of free VPN.

Easy-to-use User Interface (UI)

Connect and disconnect quickly with just the click of a button. The beautiful new layout lets you browse securely and privately with one tap.

Easy-to-use VPN for your iPhone.

Smart Location

Save time and browse faster with the improved Smart Location feature. Smart Location automatically chooses the most reliable VPN connections for you. That way you can stream without having to worry about less-than-stellar speeds.

ExpressVNP smart location for iPhone.

Browse with better connection reliability

ExpressVNP 6.6.7 for iOS works hard to make sure you always get the best possible connection. And, as always, different VPN protocol settings let you customize your iPhone app the way you want it.

ExpressVNP for iOS has a better connection.

Download ExpressVNP 6.6.7 Today!

Now you know what’s new, what are you waiting for?

Head over to the App Store and download ExpressVNP 6.6.7 today. If you’re unsure how to download, or if you’re having trouble accessing the App Store, then check out this step-by-step tutorial for help.

After you’ve taken it for a test drive, let us know what you think! Hit us with your questions, comments, concerns, and praise below!


What is the WPA2 Wi-Fi Encryption Vulnerability and how does it affect you?

ExpressVNPWin a free router for NCSAM!

WPA2 is a popular standard used to set up Wi-Fi networks and is most commonly used to authenticate users with a password but can also handle more sophisticated authentication schemes using usernames, certificates, and private keys.

When using WPA2, all data sent between the router and your device by default is encrypted, unlike “unprotected” Wi-Fi networks without a password. Even if you intend to hang the password up on a wall, it’s recommended to set up your Wi-Fi with a password so that all data is encrypted and cannot be intercepted by people nearby.

You should also use WPA2 over other authentication and encryption standards, like LEAP and WEP, which have several known weaknesses that allow anybody to “steal” your Wi-Fi.

What is the recent WPA2 Vulnerability?

On October 16 researcher Mathy Vanhoef released details of recently found vulnerabilities in WPA2 that allow an attacker to decrypt encrypted Wi-Fi traffic. To carry out the attack, a skilled and determined attacker must be in the range of you and your router.

The vulnerability does not allow an attacker to decrypt your VPN or HTTPS traffic.

If you have connected to a WPA2 secured Wi-Fi network in the past years, there is a theoretical chance that an attacker could have obtained the unencrypted traffic sent between you and the internet. However, it’s very likely only large spy agencies would have had access to this flaw.

But now that the vulnerability is well documented and public, we can expect tools to emerge that will make it trivial for anyone to exploit this flaw, so it’s important to fix and/or mitigate the issue.

How to avoid the WPA2 vulnerability

ExpressVNP has already released firmware that patches any possible vulnerabilities for Open-WRT routers. Go to setup to find the latest firmware and follow the instructions.

Almost all devices are affected by the WPA2 vulnerability, though to varying extents. You can check if your device is affected here.

Whatever devices you run, make sure they are up to date and run the latest firmware. It might take a few days for a router patch to become available, but in this case, you should check the website of your router manufacturer for updates.

If you are in doubt about the protection level of your Wi-Fi, you can use an Ethernet cable or make extra sure you’re connected to ExpressVNP.

What does the WPA2 vulnerability mean for ExpressVNP users?

We have investigated this issue on ExpressVNP routers, and it only seems to affect ‘client’ mode, a rarely used feature used to connect two routers with each other. Nonetheless, we released an update that protects against the flaw on ExpressVNP Open-WRT routers.

On unsecured and vulnerable networks, and even malicious ones, you’re always protected when you connect with the ExpressVNP app. If you connect a vulnerable client (e.g., your unpatched phone) to an ExpressVNP router, no one could eavesdrop on it.

We continue to recommend you configure your device using WPA2 and set a password for your Wi-Fi, as well as update your phone and laptop whenever updates are available.


Technical Overview: Preventing DNS Leaks When Switching Network Interfaces

ExpressVNPPreventing DNS Leaks When Switching Network Interfaces

To effectively offer a user privacy and security, a VPN application must ensure that a user’s DNS requests remain private for the entire duration of the connection to the VPN. Applications usually do this by guaranteeing that all DNS requests are sent encrypted through the VPN tunnel and handled by the VPN provider’s DNS servers.

To maintain this guarantee, it is important to understand under what scenarios DNS leaks might occur. Considering only *** scenarios, such as when network connections are stable, is not sufficient. In the real world, networks are often unstable, or their configurations can change, and generally, this is when leaks occur. Investigating complex scenarios is thus a crucial part of the process of engineering a leak-proof VPN application.

At ExpressVNP, we spend considerable time and effort investigating complex scenarios under which your VPN application might leak. In the rest of this article, we discuss one particular scenario which we uncovered where DNS leaks could occur. We’ll explain how and why the DNS leak occurs and give you a way to test for the leaks yourself.

Scenario: DNS leaks after a switch in network interfaces

Switching between network interfaces is a common scenario where DNS leaks are possible. Consider the following example:

  • You’re at home with your laptop and connected to Wi-Fi
  • You connect with your VPN application
  • Sometime later you plug in your Ethernet cable

Most VPN applications will not detect this network configuration change. They will continue to inform you that your privacy and security are still 100% protected, however, the reality can be very different.

Under the covers, your DNS requests can be persistently leaking out to your ISP or other third parties, and you may never realize it.

Technical Breakdown

When can this really happen?

Let’s take the example of a Mac (do note, though, that this leak also occurs with Windows devices). Suppose you have a Wi-Fi and Ethernet connection available. Open the “System Preferences” app and navigate to “Network.” You will see something like the following:

Wi-Fi DNS leaks

This indicates that you’re connected to both Wi-Fi and Ethernet, but Ethernet is your preferred connection.

Suppose further that your DNS is let to a “local” IP address. You can check this by clicking on “Advanced” when your Ethernet connection is highlighted and then navigating to “DNS.” You should see something like this:

View DNS server

If the IP addresses under “DNS Servers” are of the form 10.x.x.x, 192.168.x.x or between 172.16.x.x and 172.31.x.x, then they’re “local” IP address. This most likely means that your router is acting as your DNS server and thus, without a VPN, your ISP can see all your DNS requests. If you have such a setup, then you may be vulnerable to this DNS leak.

Note that even if your DNS servers do not have local IP addresses, you will likely still be vulnerable to DNS leaks. In this case, the DNS requests may go through the VPN tunnel. However, they would not be routed to the VPN’s DNS server but to some other DNS server, such as that of your ISP or a third party DNS provider.

How can you check whether you leak?

The ***st method is to use ExpressVNP’s DNS leak tool and do the following:

  • Ensure your Ethernet cable is unplugged
  • Ensure you are connected to a Wi-Fi network
  • Connect with your VPN application
  • Use ExpressVNP’s DNS leak tester or a third party tester
  • You should see only one DNS server listed
  • If you’re using ExpressVNP, then our tester will also tell you that it’s a recognized server of ours
  • Plug in your Ethernet cable
  • Refresh the DNS leak page. If you’re leaking DNS, then you’ll now see a different list of DNS servers

You can also check for DNS leaks without relying on our webpage by using tcpdump as follows.

Firstly, find the network interface corresponding to your Ethernet connection:

  • Open a Terminal window
  • Type networksetup -listallhardwareports
  • Look for a line like “Hardware Port: Thunderbolt Ethernet,” e.g.
  • Hardware Port: Thunderbolt Ethernet

  • The network interface for your Ethernet connection is shown next to “Device.” In this example it’s en4

Now, let’s run the test:

  • Ensure your Ethernet cable is unplugged
  • Connect with your VPN application via Wi-Fi
  • Plug in your Ethernet cable
  • Open a Terminal window
  • Type sudo tcpdump -i en4 port 53 and enter your password
  • sudo gives tcpdump the necessary privileges to capture network traffic
  • -i en4 tells tcpdump to listen on the Ethernet interface
  • Replace en4 with the interface you discovered above
  • port 53 is the port used for DNS traffic and thus shows you only DNS requests
  • If you see any traffic, then you have DNS leaks, e.g.
  • DNS Leak traffic

    What’s actually going on here?

    The root cause of this leak is down to how the operating system determines which DNS servers to use. The DNS servers used by the system are always the ones associated to the highest priority active network service—this corresponds to the green service at the top of the list in the picture above.

    With Ethernet disabled, the servers that will receive your DNS queries are those associated with the Wi-Fi service as it is now the highest priority active network service. The same is true when you connect to a VPN. To correctly send your DNS traffic to the VPN’s DNS server, most VPN providers change the DNS servers on the highest priority interface to their own DNS server. In this scenario, that means they change the DNS servers associated with your Wi-Fi network service.

    When you plug in your Ethernet cable, the Ethernet network service jumps back to the top of the active list as it is now the highest priority network service. The operating system will then try to use the DNS servers associated with that service for any DNS lookups.

    Many VPN applications won’t notice the problem because your Wi-Fi network is still up and running—it was never interrupted. However, while they may be sending your data encrypted over the Wi-Fi network, your DNS requests will be sent unencrypted to your ISP.

    If your VPN application fails to protect against this scenario, then it will mean your DNS requests will leak out of the tunnel to your ISP.

    Checking DNS nameservers in Terminal

    As a side note, you can investigate the behavior of DNS servers yourself with the scutil command. To see what DNS servers the system is using simply:

    • Open a Terminal window
    • Type scutil –dns
    • At the top of the output, you should see “resolver #1” with a list of “nameserver”s, e.g.
    • resolver #1 nameservers

    • The IP addresses next to each “nameserver” indicate what the system will use for DNS requests

    Interested in learning more? Have a question or comment?

    Our engineering team would love to hear from you—simply drop us a line at editor@expressvnp.com.

    Also published on Medium.


ExpressVNP: Better Privacy and Security with Industry-Leading DNS Leak Protection

ExpressVNPExpressVNP: Better Privacy

Sometimes a VPN can fail to protect your device’s DNS (Domain Name System) queries even when the rest of your traffic is protected by the VPN tunnel. Such DNS leaks can compromise your privacy and security by letting unauthorized entities, like your ISP or DNS provider, see what websites you visit and apps you use, even when your VPN appears to be on.

That’s why ExpressVNP takes such leaks very seriously. We spend a lot of time investigating complex scenarios in which your DNS could leak—and coming up with fixes. Our goal is to protect you from DNS leaks in all circumstances imaginable—and for ExpressVNP to raise privacy and security standards in the VPN industry.

Our engineering team recently identified and fixed a particular class of DNS leaks that can occur when you switch network connections (for example, when your connection changes from Ethernet to Wi-Fi). Our research indicates that this type of leak is present among most major VPN services on the market. In this blog post, we’ll explain three things: the issue, how to reproduce it, and how to test for it yourself.

Leak scenario: DNS leaks when switching between Wi-Fi and Ethernet

DNS leaks when changing between Wi-FI and ethernet

Consider the following common situation:

  • You’re at home with your laptop and are connected to Wi-Fi
  • You connect with your VPN application
  • After browsing for some time, you receive an important work email
  • You head to your home office and connect your laptop to an Ethernet cable

In many cases, our testing showed it was possible to generate a DNS leak in this scenario. With the latest release of ExpressVNP for Mac and Windows, we have ensured that your privacy will be maintained and you can be confident there is no leak in these circumstances.

How can I test this leak for myself?

If you’d like to see whether you’re vulnerable to this leak, then you can try testing for yourself.

  • Ensure your Ethernet cable is unplugged
  • Ensure you are connected to a Wi-Fi network
  • Connect with your VPN application
  • Use ExpressVNP’s DNS leak tester or a third party tester
  • You should see only one DNS server listed (Figure 1)
  • If you’re using ExpressVNP, then our tester will also tell you that it’s a recognized server of ours (Figure 2)
  • Plug in your Ethernet cable
  • Refresh the DNS leak page—If you’re leaking DNS then you’ll now see a different list of DNS servers

This test should work regardless of your VPN provider.

Figure 1:
Test your connection for DNS leaks

Figure 2:
Test for DNS leaks

How DNS leaks undermine your privacy and security

The Domain Name System (DNS) is fundamental to the internet. Every time you visit a website, you use DNS to ensure you are connecting to the correct server. Unfortunately, this also means that anyone who sees your DNS requests has a record of all the websites you visit. That’s why it’s important for your privacy and security to use a private, zero-knowledge DNS and to ensure that your VPN is preventing DNS leaks.

ExpressVNP’s focus on providing reliable, leak-free VPN services

We know that when you use ExpressVNP, you place your trust in us—and that’s why we work very hard to maintain it. In practice, this means constantly updating our products to stay on the cutting edge of speed, security, and vigilance against threats to your privacy, which include leaks.

How can you trust that your VPN is leak-proof? While there’s no way to definitely prove that any VPN is 100% leak-proof, we are able to identify the usage scenarios and patterns that users are expected to encounter and ensure that no leaks occur in those situations through extensive testing—and that’s exactly what ExpressVNP is focused on. At ExpressVNP we also aim to increase your confidence in our product by being open and transparent. By disclosing our research, investigations, and improvements and giving you the power to check for leaks yourself, we hope you’ll be as confident in our product as we are.

Get the technical lowdown

So why can DNS leaks occur when you’re switching network connections, even if your VPN appears to still be connected? Learn more in our technical overview.


Win a VPN-ready router this National Cyber Security Awareness Month!

ExpressVNPWin a free router for NCSAM!

*** Thanks for all your entries, but this competition is now closed! If you haven’t heard from us yet, unfortunately, you didn’t win this time. Check the blog for more competitions coming soon! ***

This year we’re celebrating National Cyber Security Awareness Month (NCSAM) and European Cyber Security Month by giving away FOUR routers with 30 days of free ExpressVNP to protect all your home devices on Wi-Fi!

As we mentioned in our post last week, NCSAM is upon us, and this year, we want to focus on a pressing problem—the Internet of Things (IoT).

With over 20 billion IoT devices projected by 2020, and the growing frequency of cybersecurity attacks globally on unsecured devices like IoT, it’s only a matter of time before your fridge or fish tank become the entry point for snoops and hackers who want nothing more than to exploit their weaknesses and compromise your security and privacy.

One fundamental security measure you can take is to protect your IoT devices at home from such snoops with a VPN-ready router. With a VPN protecting you on the router level, network activity from all your devices, including IoT, will be encrypted and shielded from snoops, and IP-masking helps to reduce your risk of being targeted by hackers. Not to mention all the other ways a VPN can be useful.

To celebrate NCSAM what better way than to give the gift of privacy in the shape of four VPN-ready routers!

How to win a free VPN router!

To enter the contest, we want to hear what you think would be a good IoT horror story on Twitter or Facebook. Did a burglar force you to unlock your smart door with facial recognition? Or a washing machine accidentally washing your favorite woolen sweater in 100-degree water? We want to know!

Tag us and tell us your #IoThorrorstory on Twitter or comment on the Facebook post and you could win one month of free ExpressVNP on a router!

Like and follow us on Facebook or Twitter, get your #IoThorrorstory in before Sunday, October 22nd 23:59 PM UTC, and we will pick four winners based on the following criteria (one winner per category):

  1. Most RTs on Twitter
  2. Most liked comment on Facebook
  3. The scariest story (either Twitter or Facebook)
  4. The funniest story (either Twitter or Facebook)

The rules:

  • Facebook entries should be a comment on this post.
  • Twitter entries should include the hashtag #IoThorrorstory and @ExpressVNP.
  • Multiple entries are allowed.
  • The contest is open to everyone and anyone (subject to any applicable national or local laws and regulations).
  • ExpressVNP will notify the winners after the contest ends through Facebook messages or Twitter direct messages. If the winner doesn’t respond seven days after being notified, ExpressVNP will give the router to the next runner-up.
  • The winner is responsible for covering any import taxes and duties on the router.

We’re excited to see what you come up with! And make sure you stay tuned for more tips on avoiding your own IoT horror story on our Facebook and Twitter.

Also published on Medium.