-
+13 +1
German magazine “konkret” interviews Yasha Levine about Tor, spies and the cult of crypto
German leftwing magazine konkret published an interview with me on the the dark origins of the Tor Project, Jacob Applebaum and the normalization of sexual abuse inside the privacy community, the rightwing origins of the cult of crypto, the corruption of Internet activism, and lots of other topics.
-
+8 +1
John Podesta Was Warned in 2008 to Start Encrypting Sensitive Emails
Denis McDonough, now White House chief of staff, wrote in 2008 that he was surprised to see "a sensitive doc bumping around on public email addresses." By Dan Froomkin.
-
+4 +1
DKIM Verification Announcement on Wikileaks
Domain Keys Identified Mail, or DKIM, is a highly regarded email security system that can be used to independently authenticate the contents and sender of an email that uses it. DKIM was developed and is widely deployed as an email server anti-spam mechanism, including on Gmail.com and HillaryClinton.com. DKIM-enabled mail servers cryptographically sign the emails they relay so that the recipients’ mail servers can authenticate them. DKIM has the beneficial side-effect of causing messages to become "cryptographically non-repudiable"; that is, after the email has been sent, the sender cannot credibly repudiate the message ...
-
+43 +1
If The FBI Can’t Stop All These Leaks About An Investigation, Why Would it Be Able To Keep Encryption Backdoor Secret?
Basically, the FBI (and the DOJ) were leaking information like it was the last chance they’d ever have to leak information and their lives depended on who could leak the most. And, remember, this is the same damn agency that is so insistent on forcing tech companies to put backdoors into any encryption to make sure the FBI can get into anything it wants… By Mike Masnick.
-
+13 +1
Trump’s CIA Director Pick Thinks Using Encryption ‘May Itself Be A Red Flag’
He also has almost no experience in the world of intelligence. By Lorenzo Franceschi-Bicchierai.
-
+35 +1
The Unsolvable Mysteries of the Voynich Manuscript
Some of the greatest code breakers in history have tried to unlock the mysteries of the Voynich Manuscript. No one has succeeded. The word “ink” is a child of the Latin incaustum, which means “having been burned.” In the Middle Ages, people thought that ink burned its way into parchment, because iron-gall inks go onto the page pale, then darken. This is not what’s happening, physically, but it makes sense as a metaphor: a medieval manuscript, because it was made by hand...
-
+39 +1
Future of Privacy, The
The world’s best-kept secrets — those of private citizens and state institutions — will one day sit in plain sight. By William Gibson.
-
+21 +1
Phone-Cracking Cellebrite Software Used to Prosecute Tortured Dissident
Like any good, vaguely sinister spy outfitter, Cellebrite deflects questions about whether it would sell its phone-breaching tools to a repressive regime. By Sam Biddle, Fahad Desmukh.
-
+9 +1
Quantum counterfeiters might succeed
Physicists demonstrate security issue with quantum cash. By Emily Conover.
-
+17 +1
I Am A Number. Am I Prime?
On the search for an efficient algorithm to tell if a number is prime. By Kaneenika Sinha.
-
+16 +1
The world’s most mysterious book - Stephen Bax
-
+25 +1
Wikipedia’s Switch to HTTPS Has Successfully Fought Government Censorship
Harvard researchers found fewer instances of Wikipedia censorship after the site started encrypting all of its traffic. By Daniel Oberhaus.
-
+12 +1
In Trump’s America, Black Lives Matter activists grow wary of their smartphones
A movement born on social media begins to fear that technology is making it vulnerable. By Craig Timberg.
-
+15 +1
Big scientific breakthrough at sub-atomic level holds promise for secure comms
Chinese scientists have pulled off a major feat with one of the sub-atomic world's weirdest phenomena: photons that behave like twins and experience the same things simultaneously, even over great distances.
-
+17 +1
Five Eyes Unlimited
What A Global Anti-Encryption Regime Could Look Like. By Danny O’Brien, EFF.
-
+32 +2
The solution to the Voynich manuscript | Nicholas Gibbs
For medievalists or anyone with more than a passing interest, the most unusual element of the Voynich manuscript is its handwritten text.
-
+23 +1
Japan firm says it will pay part of salaries in Bitcoin
A Japanese company will start paying part of its employees’ salaries in Bitcoin, as it aims to get a better understanding of the virtual currency, a spokeswoman said on Friday. GMO Internet, which operates a range of web-related businesses including finance, online advertising and internet infrastructure, will start paying up to 100,000 yen (S$1,200) monthly by Bitcoin to its employees in Japan from February next year.
-
+43 +1
Spain cracks king's 500-year-old code
A secret code used in 16th-century letters by King Ferdinand is broken by intelligence agents.
-
+18 +1
[When privacy is outlawed only outlaws will have privacy]
Feds Bust CEO Allegedly Selling Custom BlackBerry Phones to Sinaloa Drug Cartel. By Joseph Cox.
-
+30 +1
What is Lattice cryptography?
Lattice cryptography is interesting for a few reasons. For one thing, nobody knows how to break it with a quantum computer, which would be pretty important if anyone knew how to build a quantum computer.
Submit a link
Start a discussion