Categories » Encryption

Why Google is Hurrying the Web to Kill SHA-1- 7 September 2014

7 September 2014- Eric Mill’s Blog Why Google is Hurrying the Web to Kill SHA-1

Comcast Declares War on Tor?- 13 September 2014

13 September 2014- Deep.Dot.Web Comcast Declares War on Tor?

Silk Road 2.0 Hit by ‘Sophisticated’ DDoS Attack- 15 September 2014

15 September 2014- CoinDesk Silk Road 2.0 Hit by ‘Sophisticated’ DDoS Attack

Someone’s Threatening to Expose Bitcoin Founder Satoshi Nakamoto- 9 September 2014

9 September 2014- Wired Someone’s Threatening to Expose Bitcoin Founder Satoshi Nakamoto

Top US Colleges Begin Offering Bitcoin Courses- 4 September 2014

4 September 2014- CoinDesk Top US Colleges Begin Offering Bitcoin Courses

Google Launches Effort to Build Its Own Quantum Computer- 3 September 2014

3 September 2014- MIT Technology Review Google Launches Effort to Build Its Own Quantum Computer

NSA and GCHQ agents ‘leak Tor bugs’, alleges developer- 22 August 2014

22 August 2014- BBC NSA and GCHQ agents ‘leak Tor bugs’, alleges developer

How to Break Cryptography With Your Bare Hands-20 August 2014

20 August 2014- MIT Technology Review How to Break Cryptography With Your Bare Hands

What’s the matter with PGP?- 13 August 2014

13 August 2014- A Few Thoughts on Cryptographic Engineering What’s the matter with PGP?

Why one of cybersecurity’s thought leaders uses a pager instead of a smart phone- 11 August 2014

11 August 2014- The Washington Post Why one of cybersecurity’s thought leaders uses a pager instead of a smart phone

How to Use Your Cat to Hack Your Neighbor’s Wi-Fi- 8 August 2014

8 August 2014- Wired How to Use Your Cat to Hack Your Neighbor’s Wi-Fi

Canadian Developers Are Making the Next Tails Privacy Software- 1 August 2014

1 August 2014- Vice Motherboard Canadian Developers Are Making the Next Tails Privacy Software

How Al-Qaeda Uses Encryption Post-Snowden (Part 2)- 1 August 2014

1 August 2014- Recorded Future How Al-Qaeda Uses Encryption Post-Snowden (Part 2)

Tor attack may have unmasked dark net users- 30 July 2014

30 July 2014- BBC Tor attack may have unmasked dark net users

The Growing Threat Of Network-Based Steganography- 18 July 2014

18 July 2014- MIT Technology Review The Growing Threat Of Network-Based Steganography

Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords- 7 July 2014

7 July 2014- Ars Technica Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords

How the NSA Targets Tor Users- 4 July 2014

4 July 2014- Vice Motherboard How the NSA Targets Tor Users

Hackers Exploited Heartbleed Bug to Steal 4.5 Million Patient Records- August 19 2014

August 19 2014- SecurityWeek Hackers Exploited Heartbleed Bug to Steal 4.5 Million Patient Records: Report

Tor Is Being Used as a Safe Haven for Victims of Cyberstalking- 9 May 2014

9 May 2014- Vice News Tor Is Being Used as a Safe Haven for Victims of Cyberstalking

How Al-Qaeda Uses Encryption Post-Snowden- 8 May 2014

8 May 2014- Recorded Future How Al-Qaeda Uses Encryption Post-Snowden (Part 1)