Computer Scientists Achieve ‘Crown Jewel’ of Cryptography

WTF is a KDF?

How ‘radioactive data’ could help reveal malicious AIs

How Do You Prove a Secret?

The end-to-end principle in distributed systems

the-fbi-is-secretly-breaking-into-encrypted-devices-were-suing
Quantum Cryptography vs Post-Quantum Cryptography
The Dangers of Moving All of Democracy Online

Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us

a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
The Big Hack

A Primer on Public-key Encryption
A New Challenger to Equifax’s Employee Verification Service

How Quantum Computing Will Change Browser Encryption
Why Raspberry Pi isn't vulnerable to Spectre or Meltdown

Decentralized Social Networks Sound Great. Too Bad They’ll Never Work

What Is to Be Done?

Sudhakar's Blog
How to Call B.S. on Big Data

How Classical Cryptography Will Survive Quantum Computers

WikiLeaks’ Gift to American Democracy

A New Era of Internet Attacks Powered by Everyday Devices
Why Friday's Massive DDoS Attack Should be Terrifying

russia-sweden-disinformation.html
Why Security Experts Think Russia Was Behind the D.N.C. Breach
How technology disrupted the truth

Envisioning the Hack That Could Take Down New York City

How to Hack an Election

encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment
Why Apple and the FBI are fighting over an iCloud account

Why Apple’s fight with the FBI could have reverberations in China

A Back Door to Encryption Won't Stop Terrorists
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

How Spies Stole the Keys to the Encryption Castle
China Appears to Attack GitHub by Diverting Web Traffic

New Rules in China Upset Western Tech Companies

THE CODE

Gov.uk quietly disrupts the problem of online identity login

The Dark Market for Personal Data
The Cost of Cryptography

How Two Men Unlocked Modern Encryption

Personal Privacy Is Only One of the Costs of NSA Surveillance

Out in the Open

Saving the Lost Art of Conversation

Edward Snowden, after months of NSA revelations, says his mission’s accomplished
headroom-hacker
Why-Privacy-Matters-Even-if
Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
NSA collecting phone records of millions of Verizon customers daily
nsa-whistleblower-edward-snowden-interview-video