Breaking 256-Bit Elliptic Curve Encryption with a Quantum Computer

Finding Vulnerabilities in Open Source Projects

Is Microsoft Stealing People’s Bookmarks?

I Hate Password Rules

macOS Zero-Day Used Against Hong-Kong Activists

Advice for Personal Digital Security

Hacking the Sony Playstation 5

A Cryptographic Evaluation of IPsec (1999)

Using Machine Learning to Guess Pins from Video

European Parliament Voted to Ban Remote Biometric Surveillance

I Am Not Satoshi Nakamoto

Did NSA Put a Secret Backdoor in New Encryption Standard? (2007)

Surveillance of the Internet Backbone

Apple's NeuralHash Algorithm Has Been Reverse-Engineered

I Am Parting with My Crypto Library

NSO Group Hacked

Impossible Cryptanalysis and Skipjack

Detecting Deepfake Picture Editing

Newly Declassified NSA Document on Cryptography in the 1970s

WTF: Signal Adds Cryptocurrency Support

Illegal content and the blockchain

No, RSA Is Not Broken

Browser tracking using favicons

Chinese Supply-Chain Attack on Computer Systems

Military Cryptanalytics, Part III

Cellebrite Can Break Signal

Should There Be Limits on Persuasive Technologies?

Identifying People by Their Browsing Histories

Adversarial Machine Learning and the CFAA

On the Twitter Hack

More →