Global tech giants back encryption
FBI director James B. Comey has for some time been a critic of encryption technologies, arguing that challenges for his agency are growing as groups they are monitoring "go dark"
FBI director James B. Comey has for some time been a critic of encryption technologies, arguing that challenges for his agency are growing as groups they are monitoring "go dark"
George Danezis from University College London has an excellent blog post detailing the most serious implications of the bill, particularly its gagging orders against disclosure of state surveillance.
The United States is no longer regarded as a "safe harbour" for EU data - and that's big (and welcome) news for Europeans.
In 1994 the source code for RC4 was leaked on the Internet, and it quickly became popular because of its simplicity and speed.
Details of a damaging hack of British phone and broadband provider TalkTalk's customer database are emerging.
Our previous post explained that the "nothing to hide, nothing to fear" argument is based on a narrow view of privacy that assumes it is primarily about concealing our wrongs.
"I've got nothing to hide so I've got nothing to fear from [insert surveillance program here]" is a commonly heard retort to concerns about our diminishing ability to keep our personal information private.
SHA-1 is a hash algorithm that has been widely used in cryptography.
An important lesson about software testing - specifically the importance of testing software "in the wild".
Over the last week we've learnt that VW perpetrated a massive fraud on the US Environmental Protection Agency, and on other government agencies world-wide.