Should There Be Limits on Persuasive Technologies?

Identifying People by Their Browsing Histories

Adversarial Machine Learning and the CFAA

On the Twitter Hack

The Psychology of Security (2008)

Facebook Helped Develop a Tails Exploit

Bart Gellman on Snowden

Me on Covad-19 Contact Tracing Apps

Security and Privacy Implications of Zoom

The Solitaire Encryption Algorithm (1999)