How ‘radioactive data’ could help reveal malicious AIs

SMS Multifactor Authentication in Antarctica

The 10-Year-Old Tweet That Still Defines the Internet

the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
Firefox’s fight for the future of the web

How Facebook Bought a Police Force

The Big Hack

Demystifying the Signal Protocol for End-to-End Encryption (E2EE)

Bitcoin Is Ridiculous. Blockchain Is Dangerous

Bitcoin May Have Just Solved Its Scaling Problem

How Classical Cryptography Will Survive Quantum Computers

Russians Engineer a Brilliant Slot Machine Cheat---And Casinos Have No Fix

31d6b300-be2a-11e6-94ac-3d324840106c_story.html

The Perfect Weapon

A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying

Why Security Experts Think Russia Was Behind the D.N.C. Breach
Envisioning the Hack That Could Take Down New York City

How to Hack an Election

Why Apple’s fight with the FBI could have reverberations in China

the-serial-swatter.html
A Back Door to Encryption Won't Stop Terrorists
I Followed My Stolen iPhone Across The World, Became A Celebrity In China, And Found A Friend For Life

The Secret Life of Passwords
Gov.uk quietly disrupts the problem of online identity login

The Cost of Cryptography

How Two Men Unlocked Modern Encryption

why-bitcoin-matters
nsa-foils-much-internet-encryption.html
google-pharma-whitaker-sting
Hackers in China Attacked The Times for Last 4 Months
