|
You are here |
blog.xot.nl | ||
| | | | |
dkg.fifthhorseman.net
|
|
| | | | | ||
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | Yesterday I happened upon a Wired piece by Steven Levy that covers Ray Ozzie's proposal for "CLEAR".I'm quoted at the end of the piece (saying nothing much), so I knew the piece was coming. But since many of the things I said to Levy were fairly skeptical -- and most didn't make it into the... | |
| | | | |
www.eff.org
|
|
| | | | | Apples new program for scanning images sent on iMessage steps back from the companys prior support for the privacy and security of encrypted messages. The program, initially limited to the United States, narrows the understanding of end-to-end encryption to allow for client-side scanning. While... | |
| | | | |
soatok.blog
|
|
| | | In a recent blog post, I laid out the argument that, if you have securely implemented end-to-end encryption in your software, then the jurisdiction where your ciphertext is stored is almost irrelevant. Where jurisdiction does come into play, unfortunately, is where your software is developed and whether or not the local government will employ rubber-hose... | ||