Human/Bear Security Trade-Off (2006)

Banning TikTok

The Coming AI Hackers (2021)

Breaking RSA with a quantum computer?

Kevin Mitnick Hacked California Law in 1983

The FBI Identified a Tor User

How to Surrender to a Drone

Charles V of Spain Secret Code Cracked

Visitors to Qatar for the World Cup need to install spyware on their phone

Signal has done a good job at misleading people about how safe it is

NIST’s Post-Quantum Cryptography Standards

Hyundai Uses Example Keys For Encryption System

On the Dangers of Cryptocurrencies and the Uselessness of Blockchain

Breaking 256-Bit Elliptic Curve Encryption with a Quantum Computer

Finding Vulnerabilities in Open Source Projects

Is Microsoft Stealing People’s Bookmarks?

I Hate Password Rules

macOS Zero-Day Used Against Hong-Kong Activists

Advice for Personal Digital Security

Hacking the Sony Playstation 5

A Cryptographic Evaluation of IPsec (1999)

Using Machine Learning to Guess Pins from Video

European Parliament Voted to Ban Remote Biometric Surveillance

I Am Not Satoshi Nakamoto

Did NSA Put a Secret Backdoor in New Encryption Standard? (2007)

Surveillance of the Internet Backbone

Apple's NeuralHash Algorithm Has Been Reverse-Engineered

I Am Parting with My Crypto Library

NSO Group Hacked

Impossible Cryptanalysis and Skipjack

More →