Where are all the robot trucks?
Where are all the robot trucks?
How to Kill a Decentralised Network (such as the Fediverse)
How to Kill a Decentralised Network (such as the Fediverse)
Bruce Schneier’s Plan to Reinvent Democracy
Bruce Schneier’s Plan to Reinvent Democracy
WTF is a KDF?
WTF is a KDF?
Working Through It
Working Through It
How ‘radioactive data’ could help reveal malicious AIs
How ‘radioactive data’ could help reveal malicious AIs
SMS Multifactor Authentication in Antarctica
SMS Multifactor Authentication in Antarctica
Kidnapping, assassination and a London shoot-out
Kidnapping, assassination and a London shoot-out
How JavaScript works
How JavaScript works
the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
How We Saved .ORG
How We Saved .ORG
The Dangers of Moving All of Democracy Online
The Dangers of Moving All of Democracy Online
I Accidentally Uncovered a Nationwide Scam on Airbnb
I Accidentally Uncovered a Nationwide Scam on Airbnb
Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us
Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us
Political Operatives Are Faking Voter Outrage With Millions Of Made-Up Comments To Benefit The Rich And Powerful
Political Operatives Are Faking Voter Outrage With Millions Of Made-Up Comments To Benefit The Rich And Powerful
Planting Tiny Spy Chips in Hardware Can Cost as Little as $200
Planting Tiny Spy Chips in Hardware Can Cost as Little as $200
a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
The hacking threat to the midterms is huge. And technology won’t protect us.
The hacking threat to the midterms is huge. And technology won’t protect us.
The Big Hack
The Big Hack
A Primer on Public-key Encryption
A Primer on Public-key Encryption
A New Challenger to Equifax’s Employee Verification Service
A New Challenger to Equifax’s Employee Verification Service
How Quantum Computing Will Change Browser Encryption
How Quantum Computing Will Change Browser Encryption
Why Raspberry Pi isn't vulnerable to Spectre or Meltdown
Why Raspberry Pi isn't vulnerable to Spectre or Meltdown
Kremlin Cash Behind Billionaire’s Twitter and Facebook Investments
Kremlin Cash Behind Billionaire’s Twitter and Facebook Investments
Sudhakar's Blog
Sudhakar's Blog
Why So Many Top Hackers Hail from Russia – Krebs on Security
Why So Many Top Hackers Hail from Russia – Krebs on Security
What the Repeal of Online Privacy Protections Means for You
What the Repeal of Online Privacy Protections Means for You
If Everything Can Be ‘Weaponized,’ What Should We Fear?
If Everything Can Be ‘Weaponized,’ What Should We Fear?
What Putin Is Up To
What Putin Is Up To
How Classical Cryptography Will Survive Quantum Computers
How Classical Cryptography Will Survive Quantum Computers
Russians Engineer a Brilliant Slot Machine Cheat---And Casinos Have No Fix
Russians Engineer a Brilliant Slot Machine Cheat---And Casinos Have No Fix
31d6b300-be2a-11e6-94ac-3d324840106c_story.html
31d6b300-be2a-11e6-94ac-3d324840106c_story.html
The Perfect Weapon
The Perfect Weapon
A New Era of Internet Attacks Powered by Everyday Devices
A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying
Why Friday's Massive DDoS Attack Should be Terrifying
The War on Cash
The War on Cash
Why Security Experts Think Russia Was Behind the D.N.C. Breach
Why Security Experts Think Russia Was Behind the D.N.C. Breach
Envisioning the Hack That Could Take Down New York City
Envisioning the Hack That Could Take Down New York City
The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare
The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare
How a Cryptic Message, ‘Interested in Data?,’ Led to the Panama Papers
How a Cryptic Message, ‘Interested in Data?,’ Led to the Panama Papers
How to Hack an Election
How to Hack an Election
Why we should fear a cashless world
Why we should fear a cashless world
encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment
encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment
Why Apple and the FBI are fighting over an iCloud account
Why Apple and the FBI are fighting over an iCloud account
Why Apple’s fight with the FBI could have reverberations in China
Why Apple’s fight with the FBI could have reverberations in China
A Back Door to Encryption Won't Stop Terrorists
A Back Door to Encryption Won't Stop Terrorists
OAuth Has Ruined Everything
OAuth Has Ruined Everything
A Gentle Primer on Reverse Engineering
A Gentle Primer on Reverse Engineering
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
How Spies Stole the Keys to the Encryption Castle
How Spies Stole the Keys to the Encryption Castle