-
As Ben noted last Friday, it seems clear to me that Apple (and the rest of industry) has won the encryption debate.
-
The Washington Post reported Wednesday that:
-
When Chancellor Angela Merkel recently cited the “challenges” concerning the National Security Agency as an area that the German government has “tackled excellently” this term, many observers were surpri...
-
I personally believe the NSA's systems for bulk surveillance represent a direct attack on the Internet and everyone who uses it. The mere presence of these systems is a threat to democracy, only mitigat...
-
As part of a security conference organized by Hewlett Packard, the former NSA Director sat down yesterday for a moderated discussion with the journalist and co-founder of the Intercept.
Here's the vid...
-
The D.C. Circuit has spoken in Obama v. Klayman—the constitutional challenge to the just-winding-down bulk metadata program—and it has announced its refusal to speak on the subject.
-
On Friday, the Foreign Intelligence Surveillance Court authorized the extension of the NSA's collection of bulk telephony metadata under Section 215 of the USA Patriot Act until November 29th, 2015—the l...
-
Benjamin Wittes recently asked "Is It Really Technically Impossible?" to build backdoors into security systems.
-
Quantum computing is a novel way to build computers -- one that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers. In...
-
This one has been puzzling me for several days. Since I have not yet been able to figure it out, I thought I would "bleg" for assistance from our encryption-savvy readership. According to the Sun Senti...
-
Over the past few weeks, I have been up to my neck in encryption.
-
What follows is a guest post from Nicholas Weaver, a computer security researcher at the International Computer Science Institute in Berkeley:
Properly configured, an iOS device is perhaps the most sec...