Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

An appeal to companies doing AI

The insecurity of telecom stacks in the wake of Salt Typhoon

The Practical Limitations of End-to-End Encryption

Collatzeral damage: bitwise and proof foolish

Reviewing the cryptography used by Signal

Hell is overconfident developers writing encryption code

Don't Use Session (Signal Fork)

Don't use Session – Round 2

Too Many People Don't Value the Time of Security Researchers

The Better Daemons Of Our Profession

Key Transparency and the Right to Be Forgotten

Beyond Bcrypt

What To Use Instead of PGP

The Continued Trajectory of Idiocy in the Tech Industry

Invisible Salamanders Are Not What You Think

Alacrity to Federated Cryptography

What Does It Mean to Be a Signal Competitor?

Security Issues in Matrix’s Olm Library

Against XMPP+omemo

Towards Federated Key Transparency

The Tech Industry Doesn't Understand Consent – Opt-Out Is Not Consent

KEM Trails – Understanding Key Encapsulation Mechanisms

Return to Office Is Bullshit and Everyone Knows It

A Plan for Multicast Support in Noise-based Protocols

Asymmetric Cryptographic Commitments

Database Cryptography Fur the Rest of Us

How You Respond to Security Researchers Says Everything About You

What We Do in the /etc./Shadow – Cryptography with Passwords

Extending the AES-GCM Nonce Without Nightmare Fuel

Towards End-to-End Encryption for Direct Messages in the Fediverse

More →