The Cloud Is a Prison. Can the Local-First Software Movement Set Us Free?

The little search engine that couldn’t

WTF is a KDF?

How ‘radioactive data’ could help reveal malicious AIs

SMS Multifactor Authentication in Antarctica

How Do You Prove a Secret?

How JavaScript works

How your mobile carrier makes money off some of your most sensitive data

How We Saved .ORG

Taking Back Our Privacy

We Read 150 Privacy Policies. They Were an Incomprehensible Disaster.

Opinion

Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us

Firefox’s fight for the future of the web

DMVs Are Selling Your Data to Private Investigators

AI Needs Your Data—and You Should Get Paid for It

lockdown.html

a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
Fountain codes and animated QR · divan's blog
The Big Hack

Why decentralized social networking never makes it — ever heard of Crossing the Chasm?
A Primer on Public-key Encryption
A New Challenger to Equifax’s Employee Verification Service

How Quantum Computing Will Change Browser Encryption
How GDPR Will Change The Way You Develop

Insights about the first five years of Right to Be Forgotten requests at Google

What Would You Pay to Keep Your Digital Footprint 100% Private?

Decentralized Social Networks Sound Great. Too Bad They’ll Never Work

What the Repeal of Online Privacy Protections Means for You

How Classical Cryptography Will Survive Quantum Computers

A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying

What Happens When the Surveillance State Becomes an Affordable Gadget?

Why Apple and the FBI are fighting over an iCloud account

Why Apple’s fight with the FBI could have reverberations in China

A Back Door to Encryption Won't Stop Terrorists
New Rules in China Upset Western Tech Companies

The Secret Life of Passwords
Gov.uk quietly disrupts the problem of online identity login

The Dark Market for Personal Data
The Cost of Cryptography

How Two Men Unlocked Modern Encryption

Personal Privacy Is Only One of the Costs of NSA Surveillance

CAPTCHAs Are Becoming Security Theater
Out in the Open

N.S.A. Gathers Data on Social Connections of U.S. Citizens
nsa-foils-much-internet-encryption.html
Why-Privacy-Matters-Even-if
The Internet is a surveillance state
Hackers in China Attacked The Times for Last 4 Months
