Avi Rubin
bibliographies
Bitcoin
Bruce Schneier
7 July 2015: Keys under the Doormat
19 July 2018: Posting PDFs
CALEA
CIA
28 July 2007: Insider Attacks
12 November 2007: A Bad Week for Privacy
20 July 2014: What Spies Do
19 December 2014: Did the DPRK Hack Sony?
8 August 2018: Foldering
copyright
3 September 2008: This Blog and Creative Commons
12 September 2009: Skype's EULA
15 September 2009: Update to Skype's EULA
15 July 2010: How DRM Can Hurt Sales
14 September 2010: Intel's "Known-Good" Plan
18 January 2012: USACM SOPA and PIPA Letters
cryptocurrency
cryptography
22 April 2014: Doing Crypto
7 July 2015: Keys under the Doormat
22 December 2015: Cryptography is Hard
16 October 2017: Two More Crypto Holes
16 October 2017: Another Thought About KRACK
27 October 2017: Historical Loop
24 March 2018: Crypto War III: Assurance
cyberspooks
16 October 2010: The Worm and the Wiretap
21 October 2011: The Sins of the Flash
1 June 2012: Flame On!
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
19 December 2014: Did the DPRK Hack Sony?
16 February 2015: What Must We Trust?
19 February 2015: Hiding in the Firmware?
Ed Felten
27 October 2018: A Voting Disaster Foretold
exceptional access
16 October 2010: The Worm and the Wiretap
7 July 2015: Keys under the Doormat
24 March 2018: Crypto War III: Assurance
Facebook
12 November 2007: A Bad Week for Privacy
5 December 2007: Facebook Apologizes
16 August 2010: A Facebook Privacy Study
2 June 2015: Facebook and PGP
12 May 2017: Patching is Hard
11 March 2019: Facebook and Privacy
file-sharing
FTC
10 June 2012: Password Leaks
23 August 2013: I'm Back...
history
9 January 2009: A Telegraph-Era TLD?
2 March 2011: Doing History
30 June 2011: Robert Morris, 78
17 November 2011: Rewriting History
6 June 2014: The Battle of Midway
27 October 2017: Historical Loop
legal
12 September 2009: Skype's EULA
15 September 2009: Update to Skype's EULA
Matt Blaze
16 February 2008: A Technical Mistake
7 July 2015: Keys under the Doormat
Meltdown
Mets
30 September 2007: The Mets
Microsoft
ML
Netnews
NSA
29 June 2007: Quantum Cryptography
16 October 2010: The Worm and the Wiretap
2 March 2011: Doing History
21 October 2011: The Sins of the Flash
23 August 2013: I'm Back...
30 August 2013: Searching the NSA's Emails
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
20 July 2014: What Spies Do
19 December 2014: Did the DPRK Hack Sony?
16 February 2015: What Must We Trust?
19 February 2015: Hiding in the Firmware?
2 June 2015: Facebook and PGP
1 September 2017: Security is a System Property
24 March 2018: Crypto War III: Assurance
19 July 2018: Posting PDFs
Orin Kerr
passwords
PCLOB
PGP
2 June 2015: Facebook and PGP
privacy
3 July 2007: Beer and Privacy
12 November 2007: A Bad Week for Privacy
5 December 2007: Facebook Apologizes
12 December 2007: Ask.com's "AskEraser"
31 December 2007: Exploiting Linkages for Good
13 March 2008: Privacy: Little Brother
29 March 2008: Threat Models
16 August 2010: A Facebook Privacy Study
28 March 2011: I've Gone Encrypted
13 January 2012: Bilateral Authentication
15 September 2014: The U2 Incident
18 September 2017: Update on Equifax
20 September 2017: Yet Another Update on Equifax
11 March 2019: Facebook and Privacy
quantum cryptography
29 June 2007: Quantum Cryptography
reliability
20 August 2007: The Skype Outage
28 August 2007: Update on the Amtrak Outage
20 December 2008: Another Cluster of Cable Cuts
revenge porn
security
28 July 2007: Insider Attacks
24 August 2007: Defending Against the Owner
16 November 2007: Attempted Credit Card Fraud?
11 January 2008: Hacking Trains
13 February 2008: Teach a Man to Phish
29 March 2008: Threat Models
11 December 2009: The Real Face of Cyberwar?
14 September 2010: Intel's "Known-Good" Plan
23 September 2010: The Buried Threat in that Tweet
11 November 2010: Firewall Configuration Study
18 March 2011: The RSA SecurID Problem
28 March 2011: I've Gone Encrypted
28 May 2011: RSA Breach Fallout?
2 October 2011: The Untrusted Path
27 December 2011: Weird Idea of the Day
10 January 2012: Types of Attack
13 January 2012: Bilateral Authentication
1 June 2012: Flame On!
10 June 2012: Password Leaks
19 June 2012: Fixing Holes
30 August 2013: Searching the NSA's Emails
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
11 April 2014: Heartbleed: Don't Panic
22 April 2014: Doing Crypto
16 February 2015: What Must We Trust?
19 February 2015: Hiding in the Firmware?
24 November 2015: Why I Wrote Thinking Security
25 August 2016: Once Again, Don't Panic
12 May 2017: Patching is Hard
16 May 2017: Who Pays?
18 September 2017: Update on Equifax
20 September 2017: Yet Another Update on Equifax
16 October 2017: Two More Crypto Holes
16 October 2017: Another Thought About KRACK
19 July 2018: Posting PDFs
8 August 2018: Foldering
Spectre
Stuxnet
1 June 2012: Flame On!
Susan Landau
7 July 2015: Keys under the Doormat
systems properties
tulip bulbs
usability
13 February 2008: Teach a Man to Phish
11 November 2010: Firewall Configuration Study
Usenet
voting
5 November 2008: Working the Polls
15 May 2012: An Interesting Recount
30 May 2012: Update on Hand Recount
1 September 2017: Security is a System Property
27 October 2018: A Voting Disaster Foretold
Washington
18 January 2012: USACM SOPA and PIPA Letters
19 June 2012: Fixing Holes
23 August 2013: I'm Back...
7 July 2015: Keys under the Doormat
wiretapping
16 February 2008: A Technical Mistake