Where are all the robot trucks?
How to Kill a Decentralised Network (such as the Fediverse)
Bruce Schneier’s Plan to Reinvent Democracy
WTF is a KDF?
Working Through It
How ‘radioactive data’ could help reveal malicious AIs
SMS Multifactor Authentication in Antarctica
Kidnapping, assassination and a London shoot-out
How JavaScript works
the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
How We Saved .ORG
The Dangers of Moving All of Democracy Online
I Accidentally Uncovered a Nationwide Scam on Airbnb
Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us
Political Operatives Are Faking Voter Outrage With Millions Of Made-Up Comments To Benefit The Rich And Powerful
Planting Tiny Spy Chips in Hardware Can Cost as Little as $200
a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
The hacking threat to the midterms is huge. And technology won’t protect us.
The Big Hack
A Primer on Public-key Encryption
A New Challenger to Equifax’s Employee Verification Service
How Quantum Computing Will Change Browser Encryption
Why Raspberry Pi isn't vulnerable to Spectre or Meltdown
Kremlin Cash Behind Billionaire’s Twitter and Facebook Investments
Sudhakar's Blog
Why So Many Top Hackers Hail from Russia – Krebs on Security
What the Repeal of Online Privacy Protections Means for You
If Everything Can Be ‘Weaponized,’ What Should We Fear?
What Putin Is Up To
How Classical Cryptography Will Survive Quantum Computers
Russians Engineer a Brilliant Slot Machine Cheat---And Casinos Have No Fix
31d6b300-be2a-11e6-94ac-3d324840106c_story.html
The Perfect Weapon
A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying
The War on Cash
Why Security Experts Think Russia Was Behind the D.N.C. Breach
Envisioning the Hack That Could Take Down New York City
The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare
How a Cryptic Message, ‘Interested in Data?,’ Led to the Panama Papers
How to Hack an Election
Why we should fear a cashless world
encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment
Why Apple and the FBI are fighting over an iCloud account
Why Apple’s fight with the FBI could have reverberations in China
A Back Door to Encryption Won't Stop Terrorists
OAuth Has Ruined Everything
A Gentle Primer on Reverse Engineering
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
How Spies Stole the Keys to the Encryption Castle