Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.cryptographyengineering.com

A Few Thoughts on Cryptographic Engineering

Get the latest updates from A Few Thoughts on Cryptographic Engineering directly as they happen.

Follow now 232 followers

Latest posts

Last updated about 2 months ago

A case against security nihilism

2 months ago

This week a group of global newspapers is running a series of...

Thinking about “traceability”

4 months ago

A few weeks ago the messaging service WhatsApp sued the Indian government...

Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories)

6 months ago

It’s not every day that I wake up thinking about how people...

Ok Google: please publish your DKIM secret keys

10 months ago

The Internet is a dangerous place in the best of times. Sometimes...

Attack of the week: Voice calls in LTE

about 1 year ago

I haven’t written an “attack of the week” post in a while...

A few thoughts about Signal’s Secure Value Recovery

about 1 year ago

Over the past several months, Signal has been rolling out a raft...

Does Zoom use end-to-end encryption?

over 1 year ago

TL;DR: It’s complicated Yesterday Zoom (the videoconferencing company, not the defunct telecom)...

EARN IT is a direct attack on end-to-end encryption

over 1 year ago

Yesterday a bipartisan group of U.S. Senators introduced a new bill called...

What is the random oracle model and why should you care? (Part 5)

over 1 year ago

This is part five of a series on the Random Oracle Model...

On client-side media scanning

almost 2 years ago

A few weeks ago, U.S. Attorney General William Barr joined his counterparts...

How safe is Apple’s Safe Browsing?

almost 2 years ago

This morning brings new and exciting news from the land of Apple...

Looking back at the Snowden revelations

about 2 years ago

Edward Snowden recently released his memoirs. In some parts of the Internet...