|
You are here |
www.schneier.com | ||
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | Recently I came across a fantastic new paper by a group of NYU and Cornell researchers entitled "How to think about end-to-end encryption and AI." I'm extremely grateful to see this paper, because while I don't agree with every one of its conclusions, it's a good first stab at an incredibly important set of questions.... | |
| | | | |
www.eff.org
|
|
| | | | | Apples new program for scanning images sent on iMessage steps back from the companys prior support for the privacy and security of encrypted messages. The program, initially limited to the United States, narrows the understanding of end-to-end encryption to allow for client-side scanning. While... | |
| | | | |
educatedguesswork.org
|
|
| | | | | ||
| | | | |
www.nytimes.com
|
|
| | | Thousands of local and state police departments are customers for Clearview's facial recognition tool, the company says. | ||