The legal rule that computers are presumed to be operating correctly (2022) [pdf]

What went wrong with Horizon: learning from the Post Office Trial

What Is Synthetic Data? The Good, the Bad, and the Ugly

How 4chan and The_Donald Influence the Fake News Ecosystem

Detecting Android malware by building Markov chains of behavioral models

How contactless cards are still vulnerable to relay attack

Analyzing Privacy Aspects of the W3C Vibration API

On the hunt for Facebook’s army of fake likes

Insecure by design: protocols for encrypted phone calls

Scaling Tor Hidden Services