A Brief Introduction to Deniability

Bizarre Design Choices in Zoom’s End-to-End Encryption

Bizarre Design Choices in Zoom’s End-to-End Encryption

Dead Ends in Cryptanalysis: Length Extension Attacks

EduTech Spyware Is Still Spyware: Proctorio Edition

Designing New Cryptography for Non-Standard Threat Models

Soatok’s Guide to Side-Channel Attacks

A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates

GNU: A Heuristic for Bad Cryptography

How To Learn Cryptography as a Programmer

Why AES-GCM Sucks

The Easy Way to Obtain a Website's IP Address That Hides Behind CloudFlare

Putting the “Fun” in “Hash Function”