Computer Scientists Achieve ‘Crown Jewel’ of Cryptography
Computer Scientists Achieve ‘Crown Jewel’ of Cryptography
WTF is a KDF?
WTF is a KDF?
How ‘radioactive data’ could help reveal malicious AIs
How ‘radioactive data’ could help reveal malicious AIs
How Do You Prove a Secret?
How Do You Prove a Secret?
The end-to-end principle in distributed systems
The end-to-end principle in distributed systems
the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
Quantum Cryptography vs Post-Quantum Cryptography
Quantum Cryptography vs Post-Quantum Cryptography
The Dangers of Moving All of Democracy Online
The Dangers of Moving All of Democracy Online
Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us
Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us
a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
The Big Hack
The Big Hack
A Primer on Public-key Encryption
A Primer on Public-key Encryption
A New Challenger to Equifax’s Employee Verification Service
A New Challenger to Equifax’s Employee Verification Service
How Quantum Computing Will Change Browser Encryption
How Quantum Computing Will Change Browser Encryption
Why Raspberry Pi isn't vulnerable to Spectre or Meltdown
Why Raspberry Pi isn't vulnerable to Spectre or Meltdown
Decentralized Social Networks Sound Great. Too Bad They’ll Never Work
Decentralized Social Networks Sound Great. Too Bad They’ll Never Work
What Is to Be Done?
What Is to Be Done?
Sudhakar's Blog
Sudhakar's Blog
How to Call B.S. on Big Data
How to Call B.S. on Big Data
How Classical Cryptography Will Survive Quantum Computers
How Classical Cryptography Will Survive Quantum Computers
WikiLeaks’ Gift to American Democracy
WikiLeaks’ Gift to American Democracy
A New Era of Internet Attacks Powered by Everyday Devices
A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying
Why Friday's Massive DDoS Attack Should be Terrifying
russia-sweden-disinformation.html
russia-sweden-disinformation.html
Why Security Experts Think Russia Was Behind the D.N.C. Breach
Why Security Experts Think Russia Was Behind the D.N.C. Breach
How technology disrupted the truth
How technology disrupted the truth
Envisioning the Hack That Could Take Down New York City
Envisioning the Hack That Could Take Down New York City
How to Hack an Election
How to Hack an Election
encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment
encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment
Why Apple and the FBI are fighting over an iCloud account
Why Apple and the FBI are fighting over an iCloud account
Why Apple’s fight with the FBI could have reverberations in China
Why Apple’s fight with the FBI could have reverberations in China
A Back Door to Encryption Won't Stop Terrorists
A Back Door to Encryption Won't Stop Terrorists
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
How Spies Stole the Keys to the Encryption Castle
How Spies Stole the Keys to the Encryption Castle
China Appears to Attack GitHub by Diverting Web Traffic
China Appears to Attack GitHub by Diverting Web Traffic
New Rules in China Upset Western Tech Companies
New Rules in China Upset Western Tech Companies
THE CODE
THE CODE
Gov.uk quietly disrupts the problem of online identity login
Gov.uk quietly disrupts the problem of online identity login
The Dark Market for Personal Data
The Dark Market for Personal Data
The Cost of Cryptography
The Cost of Cryptography
How Two Men Unlocked Modern Encryption
How Two Men Unlocked Modern Encryption
Personal Privacy Is Only One of the Costs of NSA Surveillance
Personal Privacy Is Only One of the Costs of NSA Surveillance
Out in the Open
Out in the Open
Saving the Lost Art of Conversation
Saving the Lost Art of Conversation
Edward Snowden, after months of NSA revelations, says his mission’s accomplished
Edward Snowden, after months of NSA revelations, says his mission’s accomplished
headroom-hacker
headroom-hacker
Why-Privacy-Matters-Even-if
Why-Privacy-Matters-Even-if
Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
NSA collecting phone records of millions of Verizon customers daily
NSA collecting phone records of millions of Verizon customers daily
nsa-whistleblower-edward-snowden-interview-video
nsa-whistleblower-edward-snowden-interview-video