How To Become A Hacker: A Step-By-Step Guide

Failing upwards: the Twitter encrypted DM failure

MLS is Coming to Wire App

Can I use Secure Curves in the Web Platform?

RPMB, a secret place inside the eMMC

Enhancing CA Practices: Key Updates in Mozilla Root Store Policy, v3.0

bad apple but it's ssh keys

Coding Theory and Cryptography [pdf]

Web-based cryptography is always snake oil

Encrypt Images Without a Key Using Visual Cryptography

Reviewing the cryptography used by Signal

Ring is unmaintained

U.K. asks to backdoor iCloud Backup encryption

Accelerating The Adoption of Post-Quantum Cryptography with PHP

Hell is overconfident developers writing encryption code

Why cryptography is not based on NP-complete problems

A brief history of code signing at Mozilla

Three questions about Apple, encryption, and the U.K

Europol: Financial institutions should switch to quantum-safe cryptography

Tuta Launches Post Quantum Cryptography for Email (2024)

Best practices for key derivation

Don't use Session – Round 2

How we share secrets at a fully-remote startup

Radical CS

Private Keys in the Fortigate Leak

Cracking a 512-bit DKIM key for less than $8 in the cloud

Verified post-quantum cryptography on the web

EU's Digital Identity Systems - Reality Check and Techniques for Better Privacy

Denuvo Analysis

The GPU, not the TPM, is the root of hardware DRM

More →