|
You are here |
www.schneier.com | ||
| | | | |
educatedguesswork.org
|
|
| | | | | ||
| | | | |
www.eff.org
|
|
| | | | | Apples new program for scanning images sent on iMessage steps back from the companys prior support for the privacy and security of encrypted messages. The program, initially limited to the United States, narrows the understanding of end-to-end encryption to allow for client-side scanning. While... | |
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | Recently I came across a fantastic new paper by a group of NYU and Cornell researchers entitled "How to think about end-to-end encryption and AI." I'm extremely grateful to see this paper, because while I don't agree with every one of its conclusions, it's a good first stab at an incredibly important set of questions.... | |
| | | | |
economicsfromthetopdown.com
|
|
| | | I take a dive into the world of software and look at the problem of managing dependencies. From the Unix design, we've inherited many problems. Can we nix them with 'Nix'? | ||