How ‘radioactive data’ could help reveal malicious AIs
SMS Multifactor Authentication in Antarctica
The 10-Year-Old Tweet That Still Defines the Internet
the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
Firefox’s fight for the future of the web
How Facebook Bought a Police Force
The Big Hack
Demystifying the Signal Protocol for End-to-End Encryption (E2EE)
Bitcoin Is Ridiculous. Blockchain Is Dangerous
Bitcoin May Have Just Solved Its Scaling Problem
How Classical Cryptography Will Survive Quantum Computers
Russians Engineer a Brilliant Slot Machine Cheat---And Casinos Have No Fix
31d6b300-be2a-11e6-94ac-3d324840106c_story.html
The Perfect Weapon
A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying
Why Security Experts Think Russia Was Behind the D.N.C. Breach
Envisioning the Hack That Could Take Down New York City
How to Hack an Election
Why Apple’s fight with the FBI could have reverberations in China
the-serial-swatter.html
A Back Door to Encryption Won't Stop Terrorists
I Followed My Stolen iPhone Across The World, Became A Celebrity In China, And Found A Friend For Life
The Secret Life of Passwords
Gov.uk quietly disrupts the problem of online identity login
The Cost of Cryptography
How Two Men Unlocked Modern Encryption
why-bitcoin-matters
nsa-foils-much-internet-encryption.html
google-pharma-whitaker-sting
Hackers in China Attacked The Times for Last 4 Months