Watch Me Lose My Job on TikTok

Where are all the robot trucks?

How to Kill a Decentralised Network (such as the Fediverse)

Bruce Schneier’s Plan to Reinvent Democracy
WTF is a KDF?

Working Through It

How ‘radioactive data’ could help reveal malicious AIs

SMS Multifactor Authentication in Antarctica

Kidnapping, assassination and a London shoot-out

How JavaScript works

the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
How We Saved .ORG

The Dangers of Moving All of Democracy Online

I Accidentally Uncovered a Nationwide Scam on Airbnb

Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us

Political Operatives Are Faking Voter Outrage With Millions Of Made-Up Comments To Benefit The Rich And Powerful

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
The hacking threat to the midterms is huge. And technology won’t protect us.

The Big Hack

A Primer on Public-key Encryption
A New Challenger to Equifax’s Employee Verification Service

How Quantum Computing Will Change Browser Encryption
Why Raspberry Pi isn't vulnerable to Spectre or Meltdown

Kremlin Cash Behind Billionaire’s Twitter and Facebook Investments

Sudhakar's Blog
Why So Many Top Hackers Hail from Russia – Krebs on Security

What the Repeal of Online Privacy Protections Means for You

If Everything Can Be ‘Weaponized,’ What Should We Fear?

What Putin Is Up To

How Classical Cryptography Will Survive Quantum Computers

Russians Engineer a Brilliant Slot Machine Cheat---And Casinos Have No Fix

31d6b300-be2a-11e6-94ac-3d324840106c_story.html

The Perfect Weapon

A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying

The War on Cash

Why Security Experts Think Russia Was Behind the D.N.C. Breach
Envisioning the Hack That Could Take Down New York City

The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare

How a Cryptic Message, ‘Interested in Data?,’ Led to the Panama Papers
How to Hack an Election

Why we should fear a cashless world

encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment
Why Apple and the FBI are fighting over an iCloud account

Why Apple’s fight with the FBI could have reverberations in China

A Back Door to Encryption Won't Stop Terrorists
OAuth Has Ruined Everything
A Gentle Primer on Reverse Engineering
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
