NIST’s Post-Quantum Cryptography Standards

Hyundai Uses Example Keys For Encryption System

On the Dangers of Cryptocurrencies and the Uselessness of Blockchain

Breaking 256-Bit Elliptic Curve Encryption with a Quantum Computer

Finding Vulnerabilities in Open Source Projects

Is Microsoft Stealing People’s Bookmarks?

I Hate Password Rules

macOS Zero-Day Used Against Hong-Kong Activists

Advice for Personal Digital Security

Hacking the Sony Playstation 5

A Cryptographic Evaluation of IPsec (1999)

Using Machine Learning to Guess Pins from Video

European Parliament Voted to Ban Remote Biometric Surveillance

I Am Not Satoshi Nakamoto

Did NSA Put a Secret Backdoor in New Encryption Standard? (2007)

Surveillance of the Internet Backbone

Apple's NeuralHash Algorithm Has Been Reverse-Engineered

I Am Parting with My Crypto Library

NSO Group Hacked

Impossible Cryptanalysis and Skipjack

Detecting Deepfake Picture Editing

Newly Declassified NSA Document on Cryptography in the 1970s

WTF: Signal Adds Cryptocurrency Support

Illegal content and the blockchain

No, RSA Is Not Broken

Browser tracking using favicons

Chinese Supply-Chain Attack on Computer Systems

Military Cryptanalytics, Part III

Cellebrite Can Break Signal

Should There Be Limits on Persuasive Technologies?

More →