Design choices for post-quantum TLS

A hard look at Certificate Transparency, Part I: Transparency Systems

Private Access Tokens, also not great

The endpoint of Web Environment Integrity is a closed Web

Defending against Bluetooth tracker abuse: it’s complicated

One does not simply destroy a nuclear weapon

Can we agree on the facts about QWACs?

First Impressions of Bluesky's at Protocol

How to hide your IP address: a field guide to VPNs, proxies, & traffic relaying

Challenges of building a peer-to-peer replacement for the web

End-to-End Encryption and Messaging Interoperability

Understanding The Web Security Model, Part I: Web Publishing

Understanding The Web Security Model, Part III: Basic Principles and the Origin Concept