Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Age verification doesn't need to be a privacy footgun

Against the censorship of adult content by payment processors

Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps

An appeal to companies doing AI

The insecurity of telecom stacks in the wake of Salt Typhoon

The Practical Limitations of End-to-End Encryption

Collatzeral damage: bitwise and proof foolish

Reviewing the cryptography used by Signal

Hell is overconfident developers writing encryption code

Don't Use Session (Signal Fork)

Don't use Session – Round 2

Too Many People Don't Value the Time of Security Researchers

The Better Daemons Of Our Profession

Key Transparency and the Right to Be Forgotten

Beyond Bcrypt

What To Use Instead of PGP

The Continued Trajectory of Idiocy in the Tech Industry

Invisible Salamanders Are Not What You Think

Alacrity to Federated Cryptography

What Does It Mean to Be a Signal Competitor?

Security Issues in Matrix’s Olm Library

Against XMPP+omemo

Towards Federated Key Transparency

The Tech Industry Doesn't Understand Consent – Opt-Out Is Not Consent

KEM Trails – Understanding Key Encapsulation Mechanisms

Return to Office Is Bullshit and Everyone Knows It

A Plan for Multicast Support in Noise-based Protocols

Asymmetric Cryptographic Commitments

Database Cryptography Fur the Rest of Us

How You Respond to Security Researchers Says Everything About You

More →