The Cloud Is a Prison. Can the Local-First Software Movement Set Us Free?
The Cloud Is a Prison. Can the Local-First Software Movement Set Us Free?
The little search engine that couldn’t
The little search engine that couldn’t
WTF is a KDF?
WTF is a KDF?
How ‘radioactive data’ could help reveal malicious AIs
How ‘radioactive data’ could help reveal malicious AIs
SMS Multifactor Authentication in Antarctica
SMS Multifactor Authentication in Antarctica
How Do You Prove a Secret?
How Do You Prove a Secret?
How JavaScript works
How JavaScript works
How your mobile carrier makes money off some of your most sensitive data
How your mobile carrier makes money off some of your most sensitive data
How We Saved .ORG
How We Saved .ORG
Taking Back Our Privacy
Taking Back Our Privacy
We Read 150 Privacy Policies. They Were an Incomprehensible Disaster.
We Read 150 Privacy Policies. They Were an Incomprehensible Disaster.
Opinion
Opinion
Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us
Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us
Firefox’s fight for the future of the web
Firefox’s fight for the future of the web
DMVs Are Selling Your Data to Private Investigators
DMVs Are Selling Your Data to Private Investigators
AI Needs Your Data—and You Should Get Paid for It
AI Needs Your Data—and You Should Get Paid for It
lockdown.html
lockdown.html
a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
Fountain codes and animated QR · divan's blog
Fountain codes and animated QR · divan's blog
The Big Hack
The Big Hack
Why decentralized social networking never makes it — ever heard of Crossing the Chasm?
Why decentralized social networking never makes it — ever heard of Crossing the Chasm?
A Primer on Public-key Encryption
A Primer on Public-key Encryption
A New Challenger to Equifax’s Employee Verification Service
A New Challenger to Equifax’s Employee Verification Service
How Quantum Computing Will Change Browser Encryption
How Quantum Computing Will Change Browser Encryption
Insights about the first five years of Right to Be Forgotten requests at Google
Insights about the first five years of Right to Be Forgotten requests at Google
How GDPR Will Change The Way You Develop
How GDPR Will Change The Way You Develop
What Would You Pay to Keep Your Digital Footprint 100% Private?
What Would You Pay to Keep Your Digital Footprint 100% Private?
Decentralized Social Networks Sound Great. Too Bad They’ll Never Work
Decentralized Social Networks Sound Great. Too Bad They’ll Never Work
What the Repeal of Online Privacy Protections Means for You
What the Repeal of Online Privacy Protections Means for You
How Classical Cryptography Will Survive Quantum Computers
How Classical Cryptography Will Survive Quantum Computers
A New Era of Internet Attacks Powered by Everyday Devices
A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying
Why Friday's Massive DDoS Attack Should be Terrifying
What Happens When the Surveillance State Becomes an Affordable Gadget?
What Happens When the Surveillance State Becomes an Affordable Gadget?
Why Apple and the FBI are fighting over an iCloud account
Why Apple and the FBI are fighting over an iCloud account
Why Apple’s fight with the FBI could have reverberations in China
Why Apple’s fight with the FBI could have reverberations in China
A Back Door to Encryption Won't Stop Terrorists
A Back Door to Encryption Won't Stop Terrorists
New Rules in China Upset Western Tech Companies
New Rules in China Upset Western Tech Companies
The Secret Life of Passwords
The Secret Life of Passwords
The Dark Market for Personal Data
The Dark Market for Personal Data
Gov.uk quietly disrupts the problem of online identity login
Gov.uk quietly disrupts the problem of online identity login
The Cost of Cryptography
The Cost of Cryptography
How Two Men Unlocked Modern Encryption
How Two Men Unlocked Modern Encryption
Personal Privacy Is Only One of the Costs of NSA Surveillance
Personal Privacy Is Only One of the Costs of NSA Surveillance
CAPTCHAs Are Becoming Security Theater
CAPTCHAs Are Becoming Security Theater
Out in the Open
Out in the Open
N.S.A. Gathers Data on Social Connections of U.S. Citizens
N.S.A. Gathers Data on Social Connections of U.S. Citizens
nsa-foils-much-internet-encryption.html
nsa-foils-much-internet-encryption.html
Why-Privacy-Matters-Even-if
Why-Privacy-Matters-Even-if
The Internet is a surveillance state
The Internet is a surveillance state
Hackers in China Attacked The Times for Last 4 Months
Hackers in China Attacked The Times for Last 4 Months